Ethical Hacking

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

CONTENT :

• Introduction
• Ethical hacking
• Who are ethical hacker
• Why do hackers hack
• Types of hackers
• Hacking process
CONTENT :
• Why do we need ethical
hacking
• Advantages
• Disadvantages
• Future enhancement
• Language for hacking
• Common hacking techniques
• Conclusion
INTRODUCTION :
• Definition. Ethical hacking
involves an authorized attempt
to gain unauthorized access to
a computer system,
application, or data. Carrying
out an ethical hack involves
duplicating strategies and actions
of malicious attackers .
EHTICAL HACKING :
• Independent computer security
professional breaking into the computer
system
• Neither damage the traget sysytem nor
steal the information
• Evaluate traget system
Security and report back to
owners about the bugs found
WHO ARE ETHICAL
HACKERS :
• Ethical hackers help in
increasing the capabilities of
any organization or firm in
protecting their IT and
information assets. Get Free
Certificate of Merit in Cyber
Security Now! 6.
WHY DO HACKERS HACK :

• The biggest motivation is


often financial gain.
Hackers can make money
by stealing your
passwords, accessing
your bank or credit card
details, holding your
TYPES OF HACKERS :
• There are three main types of
hackers . WHITE HAT HACKER ,
BLACK HAT HACKER , GREY HAT
HACKER
BLACK HAT HACKER :
• A black hat hacker is a person who attempts to find
computer security vulnerabilities and exploit them for
personal financial gain or other malicious reasons.
This differs from white hat hackers, which are security
specialists employed to use hacking methods to find
security flaws that black hat hackers may exploit.
• Black hat hackers can inflict major damage on
Both individual computer users and large
organisation by stealing personal financial
Information compromising the security of major
System or shutting down or alerting the functions
Of websites and networks
GREY HAT HACKER :
• As logic would suggest, a grey hat hacker falls somewhere
between a white hat and a black hat hacker. Unlike Certified
Ethical Hacking, grey hat hacking is still illegal. This is because
the hacker has not received permission from the organisation to
attempt to infiltrate their systems, although grey hat hackers
tend not to have intentions as troublesome as their black hat
counterparts.
WHITE HAT HACKER :
• White hat hackers have all of the required knowledge to exploit software, networks, or
systems, but choose to use their powers for good, working alongside organisations
rather than against them. A white hat hacker will look for and try to exploit
vulnerabilities, but only with the permission of their target. They will then inform the
company of the issue and help to resolve it, potentially saving them millions.
• White hat hackers are so critical to robust security, that many larger companies
actively encourage white hat hacking as an organic way of testing the security of their
systems. They support the work of these ethical hackers by offering bounties on bugs,
rewarding them for disclosing any vulnerabilities they find
HACKING PROCESS :
• After gathering all the target
organization's information, the
exploitable vulnerabilities are
scanned by the hacker in the
network. In this scan, the hacker
will look for weaknesses like
outdated applications, open
services, open ports, and the
equipment types used on the
network.
WHY DO WE NEED ETHICAL HACKING:
After gathering all the target
organization's information, the
exploitable vulnerabilities are
scanned by the hacker in the
network. In this scan, the hacker will
look for weaknesses like outdated
applications, open services, open ports,
and the equipment types used on the
network.
ADVANTAGES :
• Its used to test how good security is on your
network . It is use dto recover the lost of
Information , especially when you lost your
password .It is used to perform penetration
testing to increase the security of the computer
and network
DISADVANTAGES :
• It is used to test how
good security is on
your network. It is used
to recover the lost of
information, especially
when you lost your
password. It is used to
FUTURE ENCHANCEMENT :
• Ethical hacking has an infinite
future. Many areas, including
government, corporate
enterprises, health care,
entertainment, banking, and
others, are quickly expanding in
this arena.
LANGUAGE FOR ETHICAL
HACKING
• there are over 300 programming
languages and many overlap
categories. The C programming
language is the oldest of a family of
languages that are different but
overlap. For example, C is a procedural
language, C++ is an extension, and
C# is an object-oriented language also
built as an extension of C.
COMMON HACKING
TECHNIQUES

• Bait and switch


• Cookie theft
• Click jacking attacks
• Virus , trojan , etc …
• Phishing
• Eavesdropping ( PASSIVE ATTACKS )
• Fakewap
• Waterhole attacks
• Denial of service
• Key logger
CONCLUSION :
• In the preceding sections we saw the
methodology of hacking, why should we aware
Of hacking and some tools which a hacker may use
• Now we can see what can we do against hacking
or to protect ourselves from hacking

• The first thing we should do is to keep ourselves


update about those software we and
Using for officials and reliable sources .

• Educate the employees and the users against


hacking

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy