SlideShare a Scribd company logo
Introduction
to
Ethical Hacking
BY: TEAM CEH
Overview
1.Introduction
2.Types of Hackers
3.Purpose Of Hacking
4.Hacking Methodology
5.Hacking Techniques
6.How to get rid of?
7.References
What is Hacking ?
 Hacking is the art of finding solutions to real
life problems.
 The word “ Hack “ is not directly related to
computers.
Hacking and Computers
 The concept of hacking entered the computer
culture at the MIT University in the 1960s.
 There are two kinds of students
1. Tools
2. Hackers
1. Tools
 A ``tool'' is someone who attends class in the
college regularly
 is always to be found in the library when no
class is meeting,
 Always Try to get Excellent grades in the
examination.
 Sole Aim: get placed in high paying Company
2. Hacker
 A ``hacker'' is the opposite: someone who
never goes to class,
 who in fact sleeps all day,
 and who spends the night pursuing
recreational activities rather than studying
text books.
What does this have to do with computers?
Originally, nothing.
Hackers vs Tools
 There are standards for success as a hacker,
just as grades form a standard for success as a
tool.
 Overall Hackers are more successful in life
and they emerge as a leader in their field.
Types Of Hackers
1.White Hat Hacker
2.Grey Hat Hacker
3.Black Hat Hacker
White Hat Hackers -
They use their knowledge and skill set for good,
constructive intents. They find out new security loopholes
and their solutions.
A white hat that does VAPT is also known as Pentester.
Black Hat Hacker-
They use their knowledge and skill set for illegal activities,
destructive intents, without authorization.
Black hat hackers are also referred to as the "crackers" within
the security industry and by modern programmers. Crackers
keep the awareness of the vulnerabilities to themselves and
do not notify the general public or the manufacturer for
patches to be applied.
Grey Hat Hacker-
They exhibits traits from both white hats & black hats.
Like a white hat, he'll inform the administrator of the
website of the vulnerabilities, he found after hacking
through the site.
Like a black hat, he’ll hack any site freely and without any
authorization from owners whatsoever.
He'll even offer to repair the vulnerable site, that he exposed .
Purpose Of Hacking
#To make security stronger ( Ethical Hacking )
#Just for fun
#Show off
#Hack other systems secretly & Steal important
information
Hacking Methodology
Reconnaissance
Also called as Information Gathering.
To gain vital information about target.
Where an attacker seeks to gather as much information as
possible about a target.
Whatever methods (Art of Googling, Social Engineering) are
used to perform reconnaissance, hackers will usually collect
a large amount of information which may be useful during
their attacks.
S Scanning
Attackers use a method called scanning before they attack a network.
Scanning can be considered a logical extension (and overlap) of active
reconnaissance since the attacker uses details gathered during
reconnaissance to identify specific vulnerabilities. Often attackers use
automated tools such as network/host scanners and war dialers to
locate systems and attempt to discover vulnerabilities.
Every machine using TCP/IP has 65,535 ports
Each port like a doorway to a system
Different programs use different ports (80, 25, 21,22 etc)
Gaining Access
Vulnerabilities exposed during the reconnaissance and
scanning phase are now exploited to gain access.
The hacker can gain access at operating system level,
application level or network level.
The hacker has control and can use that system as they
wish.
Maintaining Access
In this procedure the Hacker Gains more access.
He break into more sensitive administrator root accounts.
Install Trojan horse program or backdoors to maintain his
access and to gather additional information.
Covering Tracks
This is the last & final stage where a hacker deletes all
logs showing his malicious behavior.
So, They don’t get caught.
1.Clearing the event log
2.Evidence Elimination
3.Hiding
Hacking Techniques
Low Tech Methods
High Tech Methods
Low Tech Methods
Social Engineering
•Hacker takes advantage of trusting human being to get
information from them
•eg a ploy to install new security update on your system
Shoulder Surfing
Guessing
•weak password like death of birth, pet name, nick name etc..
High Tech Methods
Phishing
Brute Force Attacks
Sniffing
LFI(Local File Inclusion)
Metasploit
Dos Attack
SQL Injection
Hacking Tools
Password Cracking : AirCrack, Cain and Able , THC
Hydra
Network Scanning : Nmap, AngryIPScanner ,
Wireshark
System Hacking : Lost Door, Olllydgb , Keylogger
Exploitation : Metasploit , Sqlmap , Social Engineering
Toolkit
Hacking Operating Systems
BackTrack
Kali Linux
BugTraq
BackBox
How to get rid of?
• Keep system softwares up to date
• Avoid Downloading/Installing unknown programs
• Use Internet Security
• Keep firewall ON
• Use strong passwords(uppercase , lowercase letters with
numbers & special symbols)
•Avoid storing important data in system like bank account
information, any important documents etc..
Reference
www.google.com/
http://sectools.org/
Wikipedia
http://thehackernews.com/
ANY QUESTIONS?
THANK YOU !

More Related Content

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rajan Chhangani
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ganesh Vadulekar
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
chakrekevin
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
Amol Deshmukh
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Harshit Upadhyay
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rishab garg
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Gaurav Yadav
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
tangytangling
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sayantan Sur
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
Mayur Sutariya
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Damisetty Bala Naga Rama Sesha Sai
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
talhaabid
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Namrata Raiyani
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
chakrekevin
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
Amol Deshmukh
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
tangytangling
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
talhaabid
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 

Viewers also liked (8)

Facebook_Oauth
Facebook_OauthFacebook_Oauth
Facebook_Oauth
Akashy Kale
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
Mohammed Saqib
 
aaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaa
CustomEssayOrder
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
aashish2cool4u
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
rashidirazali
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Synack
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
Mohammed Saqib
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
rashidirazali
 
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Synack
 

Similar to Introduction TO Ethical Hacking (20)

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
ethical hacking
ethical hackingethical hacking
ethical hacking
samprada123
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
ShahrabanAbdullah2
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
vinsys2
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptxGEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
AnjieVillarba1
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Jaishreeethicalhackingppt-171011183223.pptx
Jaishreeethicalhackingppt-171011183223.pptxJaishreeethicalhackingppt-171011183223.pptx
Jaishreeethicalhackingppt-171011183223.pptx
jaiswalanita056588
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
giridhar_sadasivuni
 
Hackers
HackersHackers
Hackers
Reyansh Vishwakarma
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
Masih Karimi
 
Hacking
HackingHacking
Hacking
Yhannah
 
Hacking
HackingHacking
Hacking
Dianna Marie Manalo
 
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptxJshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
atulkumaratulkumar18
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Nitheesh Adithyan
 
Hacking
HackingHacking
Hacking
Paidi Dinesh
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
vinsys2
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptxGEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
AnjieVillarba1
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Jaishreeethicalhackingppt-171011183223.pptx
Jaishreeethicalhackingppt-171011183223.pptxJaishreeethicalhackingppt-171011183223.pptx
Jaishreeethicalhackingppt-171011183223.pptx
jaiswalanita056588
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
Masih Karimi
 
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptxJshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
atulkumaratulkumar18
 

Recently uploaded (19)

Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 

Introduction TO Ethical Hacking

  • 2. Overview 1.Introduction 2.Types of Hackers 3.Purpose Of Hacking 4.Hacking Methodology 5.Hacking Techniques 6.How to get rid of? 7.References
  • 3. What is Hacking ?  Hacking is the art of finding solutions to real life problems.  The word “ Hack “ is not directly related to computers.
  • 4. Hacking and Computers  The concept of hacking entered the computer culture at the MIT University in the 1960s.  There are two kinds of students 1. Tools 2. Hackers
  • 5. 1. Tools  A ``tool'' is someone who attends class in the college regularly  is always to be found in the library when no class is meeting,  Always Try to get Excellent grades in the examination.  Sole Aim: get placed in high paying Company
  • 6. 2. Hacker  A ``hacker'' is the opposite: someone who never goes to class,  who in fact sleeps all day,  and who spends the night pursuing recreational activities rather than studying text books. What does this have to do with computers? Originally, nothing.
  • 7. Hackers vs Tools  There are standards for success as a hacker, just as grades form a standard for success as a tool.  Overall Hackers are more successful in life and they emerge as a leader in their field.
  • 9. 1.White Hat Hacker 2.Grey Hat Hacker 3.Black Hat Hacker
  • 10. White Hat Hackers - They use their knowledge and skill set for good, constructive intents. They find out new security loopholes and their solutions. A white hat that does VAPT is also known as Pentester.
  • 11. Black Hat Hacker- They use their knowledge and skill set for illegal activities, destructive intents, without authorization. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers. Crackers keep the awareness of the vulnerabilities to themselves and do not notify the general public or the manufacturer for patches to be applied.
  • 12. Grey Hat Hacker- They exhibits traits from both white hats & black hats. Like a white hat, he'll inform the administrator of the website of the vulnerabilities, he found after hacking through the site. Like a black hat, he’ll hack any site freely and without any authorization from owners whatsoever. He'll even offer to repair the vulnerable site, that he exposed .
  • 13. Purpose Of Hacking #To make security stronger ( Ethical Hacking ) #Just for fun #Show off #Hack other systems secretly & Steal important information
  • 15. Reconnaissance Also called as Information Gathering. To gain vital information about target. Where an attacker seeks to gather as much information as possible about a target. Whatever methods (Art of Googling, Social Engineering) are used to perform reconnaissance, hackers will usually collect a large amount of information which may be useful during their attacks.
  • 16. S Scanning Attackers use a method called scanning before they attack a network. Scanning can be considered a logical extension (and overlap) of active reconnaissance since the attacker uses details gathered during reconnaissance to identify specific vulnerabilities. Often attackers use automated tools such as network/host scanners and war dialers to locate systems and attempt to discover vulnerabilities. Every machine using TCP/IP has 65,535 ports Each port like a doorway to a system Different programs use different ports (80, 25, 21,22 etc)
  • 17. Gaining Access Vulnerabilities exposed during the reconnaissance and scanning phase are now exploited to gain access. The hacker can gain access at operating system level, application level or network level. The hacker has control and can use that system as they wish.
  • 18. Maintaining Access In this procedure the Hacker Gains more access. He break into more sensitive administrator root accounts. Install Trojan horse program or backdoors to maintain his access and to gather additional information.
  • 19. Covering Tracks This is the last & final stage where a hacker deletes all logs showing his malicious behavior. So, They don’t get caught. 1.Clearing the event log 2.Evidence Elimination 3.Hiding
  • 20. Hacking Techniques Low Tech Methods High Tech Methods
  • 21. Low Tech Methods Social Engineering •Hacker takes advantage of trusting human being to get information from them •eg a ploy to install new security update on your system Shoulder Surfing Guessing •weak password like death of birth, pet name, nick name etc..
  • 22. High Tech Methods Phishing Brute Force Attacks Sniffing LFI(Local File Inclusion) Metasploit Dos Attack SQL Injection
  • 23. Hacking Tools Password Cracking : AirCrack, Cain and Able , THC Hydra Network Scanning : Nmap, AngryIPScanner , Wireshark System Hacking : Lost Door, Olllydgb , Keylogger Exploitation : Metasploit , Sqlmap , Social Engineering Toolkit
  • 25. How to get rid of? • Keep system softwares up to date • Avoid Downloading/Installing unknown programs • Use Internet Security • Keep firewall ON • Use strong passwords(uppercase , lowercase letters with numbers & special symbols) •Avoid storing important data in system like bank account information, any important documents etc..