0% found this document useful (0 votes)
165 views14 pages

Hacking Presentation

The document outlines the key topics and terminology related to ethical hacking. It discusses 18 main topics of ethical hacking including footprinting, scanning, enumeration, system hacking, malware threats, sniffing, social engineering, and denial of services. It also defines essential terminology such as hack value, vulnerability, exploit, and bot. Additionally, it covers security concepts, attack vectors, types of hackers, and the hacking methodology.

Uploaded by

pamukumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
165 views14 pages

Hacking Presentation

The document outlines the key topics and terminology related to ethical hacking. It discusses 18 main topics of ethical hacking including footprinting, scanning, enumeration, system hacking, malware threats, sniffing, social engineering, and denial of services. It also defines essential terminology such as hack value, vulnerability, exploit, and bot. Additionally, it covers security concepts, attack vectors, types of hackers, and the hacking methodology.

Uploaded by

pamukumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

PAMU KUMAR SWAMY

 1.Introduction to Ethical hacking


 2.Foot printing and Reconnaissance
 3.scanning networks
 4.Enumeration
 5.System hacking
 6.Malware threats
 7.Sniffing
 8. Social Engineering
 9.Denial of services
 10.Session Hijacking
 11.Hacking webservers
 12.Hacking web applications
 13.SQL Injection
 14.Hacking wireless networks
 15.hacking Mobile platforms
 16.Evading , IDS, firewall and honeypot
 17.cloud computing
 18.cryptography
 Essential terminology
◦ Hack value
◦ Vulnerability
◦ Exploit
◦ Payload
◦ Zero-day-attack
◦ Daisy chaining
◦ Doxing
◦ Bot
 Confidentiality
 Integrity
 Availability
 Authenticity
 Non-repudiation
Functionality

Usability Security
 Attacks = Motives + Method + Vulnerability

 Main motives
◦ Disruption of Business continuity
◦ Information Theft
◦ Manipulating data
◦ Creating fear and chaos of critical infrastructure
◦ Propagating religious and political beliefs
◦ achieving state military objectives
◦ Damaging reputation of target
◦ Taking revenge
 Cloud computing threats
 Advance persistent Threats (APT)
 Virus and worms
 Mobile Threats
 Botnet
 Insider attack
 Network Threat
 Host Threat
 Application Threat
 OS attacks
 Misconfiguration attacks
 Application level attacks
 Shrink wrap code
 Hacking refers to exploiting the system
vulnerabilities and compromise security controls
and gain unauthorized access to the system
 Class of hackers
◦ Black hats
◦ White hats
◦ Gray Hats
◦ Suicide Hackers
◦ Script kiddies
◦ Cyber terrorist
◦ State sponsored hackers
◦ Hacktivist
 Reconnaissance
 Scanning
 Gaining access
 Maintaining access
 Clearing tracks
 Hacking done with prior approval of the
target, and verify the existence of exploit
vulnerability in the system security

You might also like