SlideShare a Scribd company logo
Fundamental of Ethical Hacking by
Waseem Rauf
Points to be discuss in this session
 Objectives of this Session
 Computer/Network Security
 Hacking
 Ethical Hacking and Types of Hackers
 Cyber Crime
 Common Terminology used in the Ethical Hacking
 Kali Linux
 Virtualization ( Virtual Machine ) Concept
 How to install Kali Linux on Virtual Machine
 Kali Linux Overview and Basic Commands of Linux
 Career in Ethical Hacking
 Future Sessions Discussion and Technical talks
Objective of this Session
 The Objective of this session is to give you awareness of ethical hacking .
 Session for beginner
 Teach only useful information
 Don’t share with you any illegal information about hacking
 After attending this session, you should have solid understanding of Ethical
hacking
 Specially for those who want to start their career as a ethical hacker
I hope, you will enjoy and love this session
Why Computer Security ?
Computer systems are ubiquitous in our daily life
 Computers store and process our data and information
 Computers access and control our resources
Valuable Data Private Data Dangerous Data
The Sony Breach
 An Example: The Playstation Network (PSN) Attack
 Illegal intrusion into network around April 2011
 Severe consequences for users and companies
 Financial damage of over 24 billion dollars
Fundamental of ethical hacking
Hacking
 According to cyber.laws.com, “ Computer hacking refers to the
practice of modifying or altering computer software and
hardware to accomplish a goal that is considered to be outside
of the creator’s original objective”. Those individuals who
engage in computer hacking activities are typically referred to
as “hackers.”
Ethical Hacking
 Ethical hacking is when an expert attempts to hack a computer or network
with the express written permission of the assets owner.
 Also called White Hat Hacking
 Penetration Testing
 It is legal and Permission is obtained from the target
 Part of overall Security Program
 The ethical hackers are paid to find these vulnerabilities first and make the
company aware of the risks
Types of Hackers
 Black Hat Hackers : ( Bad Guys )
 White Hat Hackers : ( Good Guys )
 Gray Hat Hackers : (Combination of Black Hat and
White Hat )
Black Hat Hackers : ( Bad Guys )
 They hack the system/network/web without owner permission
 The intention of black hat hacker is very bad
 A black hat hacker may try to steal information such as social security
numbers, credit cards, personal identifiable information, bank account
Information and much more
 They do hacking for illegal purpose
 The have excellent computing and programming skills
 They hack the system for their own benefits
 Their main goal is to do damage and to expose or steal data
White Hat Hackers : ( Good Guys )
 They hack systems with the owner permission
 Company hire white hat hackers
 They are professional hackers who works in Industry
 They are also called ethical hackers
 They work for legal purpose
 They secure network/web of the company
Gray Hat Hackers : (Combination of
Black Hat and White Hat )
 The gray hat hacker is a unique type of hacker because they are freelancers
and operate without written consent
 They are known to discover systems weaknesses, without permission but
without malicious intent
 Their goal is to bring these flaws to the attention of the system owner so
they can be corrected
Pre-Requisite
 What should we know to enter in the field of Ethical Hacking
 You should have basic and solid Understanding of Programming
 You should have basic and solid Understanding of Networking
 You should have basic and solid Understanding of Linux OS etc.
Essential Terminology
Cryptography :
 Art and Science of keeping information secure
 Penetration testing (also called pen testing) is the practice of testing or evaluating
a computer system, network or Web application to find vulnerabilities that an
attacker could exploit.
 Vulnerability : Weakness in a System ex. Hardware/Software vulnerabilities
 Exploit : A method to intrude/penetrate in a System
 Metasploit : Metasploit is one of the most powerful and widely used tools for
penetration testing
 SQL Injection : SQL injection is a code injection technique that might destroy
your database. SQL injection is one of the most common web hacking
SQL injection is the placement of malicious code in SQL statements, via web page
input.
 Brute force Attack : a simple brute-force attack may have a dictionary of all
words or commonly used passwords and cycle through those words until it gains
access to the account.
 Keylogger : A keylogger, sometimes called a keystroke logger or system monitor,
is a type of surveillance technology used to monitor and record each keystroke
typed on a specific computer's keyboard.
 Phishing attack : Phishing is the attempt to obtain sensitive
information such as usernames, passwords, and credit card details (and,
indirectly, money), often for malicious reasons, by disguising as a
trustworthy entity in an electronic communication.
 Bug bounty Program : A bug bounty program is a deal offered by many
websites and software developers by which individuals can receive
recognition and compensation for reporting bugs, especially those
pertaining to exploits and vulnerabilities
 Footprinting : It is the process of gathering data about certain target
Or Information gathering
 Cyber Crime : Crime relevant to Computer
 Cloud Computing : Internet based computing
Virtual Machines
 A Software Computer
• A Computer within a computer
• Can be used just like any other computer
 Why use VMs
• A VM is stored on a physical HDD - thus extremely versatile
• You can transfer a VM just like any other file on your computer
• You can clone/repurpose VMs very easily
 Terminology
• Host Computer
• Guest VM
 A Host Computer can host Several VMs
 A Guest VM generally resides on a single host
 A Host Computer is generally a very powerful server that is designed to run
multiple Guest VMs
 Tips : Keep resources as low as possible and Turn off VMs when you are not using
KALI LINUX
 It is an Open Source
 Linux OS
 Specially designed for Hackers
 All tools are built in relevant to Hacking
 More than 300 penetration testing tools
Download and Install Virtual Box and
Kali Linux
 Step # 1 : Download Virtual Box
 https://www.virtualbox.org/wiki/Downloads
 Step # 2 : Install Virtual Box
 Step # 3 : Download Kali Linux
 https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-
download/
 Step # 4 : Follow these steps ( Upcoming Slides )
 Default User Name is root and password is toor .
Fundamental of ethical hacking
Fundamental of ethical hacking
Fundamental of ethical hacking
Fundamental of ethical hacking
Fundamental of ethical hacking
Fundamental of ethical hacking
Fundamental of ethical hacking
Fundamental of ethical hacking
Fundamental of ethical hacking
Fundamental of ethical hacking
Let’s Explore Kali Linux
Tips ( How to Secure your Network )
 Always clear your browsers cookies
 Password should be strong
Career in Ethical Hacking
 Bright Career
 Information (Network/Computer/Cyber) Security is one the highest paid and
fastest growing job segment with a huge skill gap. According to
Forbes, there will be a global shortage of two million cyber security
professionals by 2019. Moreover, Info security complements all aspect of
computer science from mobile, networks, cloud, OS to web.
My next Sessions
 Mobile Application Development
 Web Designing and Development
 Introduction to Cloud Computing
 Artificial Intelligence and more ….
Contact with me on Facebook and Gmail:
waseemrauf7@gmail.com
THANK YOU
Please Subscribe my YouTube Channel for
further upcoming updates

More Related Content

What's hot (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
Vikram Khanna
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Gaurav Yadav
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
Meenesh Jain
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
Rishabha Garg
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
Harshit Upadhyay
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Harshit Upadhyay
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
anonymousrider
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
kawsarahmedchoudhuryzzz
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Binit Kumar
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hacking
nitish mehta
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Sourabh Badve
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Namrata Raiyani
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
S Sai Karthik
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rishab garg
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
Sunny Sundeep
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
Vikram Khanna
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
Meenesh Jain
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
Rishabha Garg
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
anonymousrider
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hacking
nitish mehta
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
Sunny Sundeep
 

Similar to Fundamental of ethical hacking (20)

ethical hacking
ethical hackingethical hacking
ethical hacking
samprada123
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Nitheesh Adithyan
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
BABATUNDE OLANREWAJU GEORGE
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
AKSHAY KHATRI
 
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptxDr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
FerozaMirajkar1
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
Being Uniq Sonu
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
SiddheshSurve10
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptxDr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
FerozaMirajkar1
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
Being Uniq Sonu
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
SiddheshSurve10
 

Recently uploaded (20)

Fundamentals of PR: Wk 4 - Strategic Communications
Fundamentals of PR: Wk 4 - Strategic CommunicationsFundamentals of PR: Wk 4 - Strategic Communications
Fundamentals of PR: Wk 4 - Strategic Communications
Jordan Williams
 
SPRING FESTIVITIES - UK AND USA -
SPRING FESTIVITIES - UK AND USA            -SPRING FESTIVITIES - UK AND USA            -
SPRING FESTIVITIES - UK AND USA -
Colégio Santa Teresinha
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Unit 4: Long term- Capital budgeting and its types
Unit 4: Long term- Capital budgeting and its typesUnit 4: Long term- Capital budgeting and its types
Unit 4: Long term- Capital budgeting and its types
bharath321164
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Timber Pitch Roof Construction Measurement-2024.pptx
Timber Pitch Roof Construction Measurement-2024.pptxTimber Pitch Roof Construction Measurement-2024.pptx
Timber Pitch Roof Construction Measurement-2024.pptx
Tantish QS, UTM
 
Unit 5: Dividend Decisions and its theories
Unit 5: Dividend Decisions and its theoriesUnit 5: Dividend Decisions and its theories
Unit 5: Dividend Decisions and its theories
bharath321164
 
Envenomation---Clinical Toxicology. pptx
Envenomation---Clinical Toxicology. pptxEnvenomation---Clinical Toxicology. pptx
Envenomation---Clinical Toxicology. pptx
rekhapositivity
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACYUNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
DR.PRISCILLA MARY J
 
How to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of saleHow to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of sale
Celine George
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
High Performance Liquid Chromatography .pptx
High Performance Liquid Chromatography .pptxHigh Performance Liquid Chromatography .pptx
High Performance Liquid Chromatography .pptx
Ayush Srivastava
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Fundamentals of PR: Wk 4 - Strategic Communications
Fundamentals of PR: Wk 4 - Strategic CommunicationsFundamentals of PR: Wk 4 - Strategic Communications
Fundamentals of PR: Wk 4 - Strategic Communications
Jordan Williams
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Unit 4: Long term- Capital budgeting and its types
Unit 4: Long term- Capital budgeting and its typesUnit 4: Long term- Capital budgeting and its types
Unit 4: Long term- Capital budgeting and its types
bharath321164
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Timber Pitch Roof Construction Measurement-2024.pptx
Timber Pitch Roof Construction Measurement-2024.pptxTimber Pitch Roof Construction Measurement-2024.pptx
Timber Pitch Roof Construction Measurement-2024.pptx
Tantish QS, UTM
 
Unit 5: Dividend Decisions and its theories
Unit 5: Dividend Decisions and its theoriesUnit 5: Dividend Decisions and its theories
Unit 5: Dividend Decisions and its theories
bharath321164
 
Envenomation---Clinical Toxicology. pptx
Envenomation---Clinical Toxicology. pptxEnvenomation---Clinical Toxicology. pptx
Envenomation---Clinical Toxicology. pptx
rekhapositivity
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACYUNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
DR.PRISCILLA MARY J
 
How to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of saleHow to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of sale
Celine George
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
High Performance Liquid Chromatography .pptx
High Performance Liquid Chromatography .pptxHigh Performance Liquid Chromatography .pptx
High Performance Liquid Chromatography .pptx
Ayush Srivastava
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 

Fundamental of ethical hacking

  • 1. Fundamental of Ethical Hacking by Waseem Rauf
  • 2. Points to be discuss in this session  Objectives of this Session  Computer/Network Security  Hacking  Ethical Hacking and Types of Hackers  Cyber Crime  Common Terminology used in the Ethical Hacking  Kali Linux  Virtualization ( Virtual Machine ) Concept  How to install Kali Linux on Virtual Machine  Kali Linux Overview and Basic Commands of Linux  Career in Ethical Hacking  Future Sessions Discussion and Technical talks
  • 3. Objective of this Session  The Objective of this session is to give you awareness of ethical hacking .  Session for beginner  Teach only useful information  Don’t share with you any illegal information about hacking  After attending this session, you should have solid understanding of Ethical hacking  Specially for those who want to start their career as a ethical hacker I hope, you will enjoy and love this session
  • 4. Why Computer Security ? Computer systems are ubiquitous in our daily life  Computers store and process our data and information  Computers access and control our resources Valuable Data Private Data Dangerous Data
  • 5. The Sony Breach  An Example: The Playstation Network (PSN) Attack  Illegal intrusion into network around April 2011  Severe consequences for users and companies  Financial damage of over 24 billion dollars
  • 7. Hacking  According to cyber.laws.com, “ Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective”. Those individuals who engage in computer hacking activities are typically referred to as “hackers.”
  • 8. Ethical Hacking  Ethical hacking is when an expert attempts to hack a computer or network with the express written permission of the assets owner.  Also called White Hat Hacking  Penetration Testing  It is legal and Permission is obtained from the target  Part of overall Security Program  The ethical hackers are paid to find these vulnerabilities first and make the company aware of the risks
  • 9. Types of Hackers  Black Hat Hackers : ( Bad Guys )  White Hat Hackers : ( Good Guys )  Gray Hat Hackers : (Combination of Black Hat and White Hat )
  • 10. Black Hat Hackers : ( Bad Guys )  They hack the system/network/web without owner permission  The intention of black hat hacker is very bad  A black hat hacker may try to steal information such as social security numbers, credit cards, personal identifiable information, bank account Information and much more  They do hacking for illegal purpose  The have excellent computing and programming skills  They hack the system for their own benefits  Their main goal is to do damage and to expose or steal data
  • 11. White Hat Hackers : ( Good Guys )  They hack systems with the owner permission  Company hire white hat hackers  They are professional hackers who works in Industry  They are also called ethical hackers  They work for legal purpose  They secure network/web of the company
  • 12. Gray Hat Hackers : (Combination of Black Hat and White Hat )  The gray hat hacker is a unique type of hacker because they are freelancers and operate without written consent  They are known to discover systems weaknesses, without permission but without malicious intent  Their goal is to bring these flaws to the attention of the system owner so they can be corrected
  • 13. Pre-Requisite  What should we know to enter in the field of Ethical Hacking  You should have basic and solid Understanding of Programming  You should have basic and solid Understanding of Networking  You should have basic and solid Understanding of Linux OS etc.
  • 15. Cryptography :  Art and Science of keeping information secure
  • 16.  Penetration testing (also called pen testing) is the practice of testing or evaluating a computer system, network or Web application to find vulnerabilities that an attacker could exploit.  Vulnerability : Weakness in a System ex. Hardware/Software vulnerabilities  Exploit : A method to intrude/penetrate in a System  Metasploit : Metasploit is one of the most powerful and widely used tools for penetration testing  SQL Injection : SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking SQL injection is the placement of malicious code in SQL statements, via web page input.  Brute force Attack : a simple brute-force attack may have a dictionary of all words or commonly used passwords and cycle through those words until it gains access to the account.  Keylogger : A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
  • 17.  Phishing attack : Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.  Bug bounty Program : A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities  Footprinting : It is the process of gathering data about certain target Or Information gathering  Cyber Crime : Crime relevant to Computer  Cloud Computing : Internet based computing
  • 18. Virtual Machines  A Software Computer • A Computer within a computer • Can be used just like any other computer  Why use VMs • A VM is stored on a physical HDD - thus extremely versatile • You can transfer a VM just like any other file on your computer • You can clone/repurpose VMs very easily  Terminology • Host Computer • Guest VM
  • 19.  A Host Computer can host Several VMs  A Guest VM generally resides on a single host  A Host Computer is generally a very powerful server that is designed to run multiple Guest VMs  Tips : Keep resources as low as possible and Turn off VMs when you are not using
  • 20. KALI LINUX  It is an Open Source  Linux OS  Specially designed for Hackers  All tools are built in relevant to Hacking  More than 300 penetration testing tools
  • 21. Download and Install Virtual Box and Kali Linux  Step # 1 : Download Virtual Box  https://www.virtualbox.org/wiki/Downloads  Step # 2 : Install Virtual Box  Step # 3 : Download Kali Linux  https://www.offensive-security.com/kali-linux-vmware-virtualbox-image- download/  Step # 4 : Follow these steps ( Upcoming Slides )  Default User Name is root and password is toor .
  • 33. Tips ( How to Secure your Network )  Always clear your browsers cookies  Password should be strong
  • 34. Career in Ethical Hacking  Bright Career  Information (Network/Computer/Cyber) Security is one the highest paid and fastest growing job segment with a huge skill gap. According to Forbes, there will be a global shortage of two million cyber security professionals by 2019. Moreover, Info security complements all aspect of computer science from mobile, networks, cloud, OS to web.
  • 35. My next Sessions  Mobile Application Development  Web Designing and Development  Introduction to Cloud Computing  Artificial Intelligence and more …. Contact with me on Facebook and Gmail: [email protected]
  • 36. THANK YOU Please Subscribe my YouTube Channel for further upcoming updates