0% found this document useful (0 votes)
57 views16 pages

FIRST

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views16 pages

FIRST

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

ETHICAL

HACKING .

PRESENTED BY
- J.TEJASWINI
CONTENTS:

What is Hacking
Types of Hacking
T
h
i
s
P
h
o

Types of Hackers
t
o
.
b
y
U
n

What is Ethical Hacking


k
n
o
w
.
n
A

Why do we need Ethical


u
t
h
o
r
i
s

Hacking
li
c
e
n
s
e

What are the Programming


d
u
n
d
e
r
C

languages used
C
B
Y
-
S
A

What to do after Hacked


Skills for Ethical Hacking
Phases in Ethical Hacking
Goals of Ethical Hacking
Tools for Ethical Hacking
WHAT IS HACKING..?
The process of finding vulnerabilities in a system and
using these found vulnerabilities to gain unauthorised Access
into the system to perform malicious activities ranging from
deleting system files or stealing sensitive information.
For Example ,
Steal personal information for identity theft, including
social security numbers, credit cards, bank accounts, and
more.
TYPES OF HACKING

• Hacking is basically classified into two types. They are: ETHICAL


HACKING AND UNETHICAL HACKING
TYPES OF HACKERS

• Hackers fall into three categories: BLACK HAT


HACKERS, WHITE HAT HACKERS, GRAY HAT HACKERS.
WHAT IS ETHICAL HACKING…?
Ethical hacking involves an authorized attempt to gain unauthorized
access to a computer system, application,or data. Carrying out an ethical hack
involves duplicating strategies and actions of malicious attackers.
WHY DO WE NEED ETHICAL HACKING
• Ethical hacking is used to secure important data from enemies. It works as a safeguard of
your computer from blackmail by the people who want to exploit the vulnerability. Using
ethical hacking, a company or organization can find out security vulnerability and risks.
• Governments use State-sponsored hacking to prevent intelligence information about
influence politics, an enemy state, etc. Ethical hacking can ensure the safety of the nation by
preventing cyber-terrorism and terrorist attacks.

• In a company, the trained ethical hackers are the main strength. To ensure the functions of
software aptly, ethical hackers can apply quick security tests under extreme and standard
conditions.
WHAT ARE THE PROGRAMMING LANGUAGES
USED
Description Reason to learn
Languages
HTML forms are used to
enter data all over the
HTML Used for creating web internet. Being able to
pages. construct your own forms
for analyzing
vulnerabilities helps to
figure out security issues
in the code
JavaScript code is
Client-side scripting executed on the client
Javascript language. Also used for browser. Knowledge of JS
writing backend services. can be used to read saved
cookies and perform cross-
site scripting etc.,
Using SQL injection, to by-
Used for interacting with pass web application login
SQL databases. algorithms that are weak,
delete data from the
SKILLS FOR ETHICAL HACKING

• Routers : Knowledge routers, routing protocols and access control lists .


• Mainframes : Knowledge of mainframes.
• Network Protocols : TCP/IP ; how they function and can be manipulated.
• Project Management : Leading , Planning, Organizing , and controlling a
pentration testing team.
• Microsoft : Skills in operation, configuration and management.
• Linux : Knowledge of Linux/Unix , security settings, configuration , and
services.
• Firewalls : Configurations , and operation of instruction detection system.
WHAT TO DO AFTER HACKED

Shutdown or turnoff the system


Separate the system from network
Restore the system with the backup or
reinstall all programs
Connect the system to the network
It can be good to call the police
PHASES IN ETHICAL HACKING

• Organizations recruit ethical hackers to replicate an actual cyberattack on their systems


and networks. This attack consists of several phases, and it requires a ton of expertise and
works for ethical hackers to discover all vulnerabilities and leverage them properly.
GOALS OF ETHICAL HACKING
• Protect the privacy of the organisation been hacked.
• Transparently report all the identified weakness in the
computer system to the organization.
• Inform hardware and software vendors of the
identified
weakness.
• To create and maintain remote access to the system.
TOOLS OF ETHICAL HACKING
• Ethical Hacking Tools are basically computer programs and scripts that can detect
vulnerabilities in computer systems, servers web applications, and network.

Tool Name Platform Best for Type


ACUNETIX Windows, End-to-end Web
Mac, RedHat web security Application
8, etc. & Web- scanning. Security
based Scanner.
INTRUDER Cloud-based Finding & Computer &
fixing Network
vulnerabilitie security.
s in your
infrastructure
.
NMAP Mac OS, Computer Computer
Linux, security & security &
OpenBSD, Network Network
PROS AND CONS

• Ethical hacking nowadays is a backbone of network security. Each day its


relevance is increasing, the major pros and cons of ethical hacking :
• PROS:
To catch a thief you have to think like a thief.
Help in closing the open holes in the network.
Provides security to banking and financial establishments.
Prevents website defacements.
• CONS:
All depends upon the trustworthiness of the ethical hacker.
Hiring professional is expensive.
CONCLUSION
• One of the main aims of the seminar is to make others understand that
there are so many tools through which a hacker can get into a system .
Let’s check its various needs from various perspectives.
 Student
A student should understand that no software is made with zero
vulnerability. So while they are studying they should study the various
possibilities and should study how to prevent that they are professionals of
tomorrow.
 Professionals
Professionals should understand that business is directly related to security.
So they should make new software with vulnerabilities as less possible. If
they are not aware of these then they won’t be cautious in security matters.
.

You might also like