Cyber Security
Cyber Security
Cyber Security
J.Sripranav
(20AG1A0425)
Contents
Introduction
Ethical hacking
Who are hackers
Why do hackers hack
Types of hackers
What should do after hack
Hacking process
Why do we need ethical hacking
Required skills of an ethical hacker
What do hackers do after hacking
Advantages
Disadvantages
Future enhancements
Conclusion
Introduction
Ethical hacking also known as penetration
testing or white-hat hacking,involves the same
tools, tricks, and techniques that hackers use,
but with one major difference that ethical
hacking legal.
Ethical hacking
Gaining access
Maintaining access
Foot printing
Whois lookup
Ns lookup
Ip lookup
Scanning
Port scanning
Network scanning
Finger printing
Fire walking
Gaining Access
Password attacks
Social engineering
viruses
Maintaining Access
Os BackDoors
Trojans
Clears Tracks
Requried skills of an ethical hacker