Semi 1
Semi 1
Overview
Methodology
Protocols Targeted
Advantages vs Disadvantages
Areas of Applications
overview of Ethical Hacking and Penetration Testing
1970s: U.S. Air Force conducted first formal penetration tests (Multics)
Key Contributors:
Government agencies (NSA, GCHQ)
Academic researchers and hacker community
Security professionals (e.g., Dan Farmer, Wietse Venema - SATAN tool)
Kevin Mitnick: Former black-hat turned ethical hacker
Disadvantages
If Hacking is done with the destructive intent, then it could be dangerous. It can affect:
Enormous security fissure.
Unauthorized system access on the private/secretive information.
Privacy destruction.
Fettering system operation.
Denial of service attacks.
Malicious attack on the system/network
Areas of Applications
Ethical hacking and penetration testing are applied across various sectors to secure digital
assets:
Finance: Securing online banking systems and transaction gateways.
Healthcare: Protecting patient data and IoT medical devices.
Government: Safeguarding critical infrastructure and classified data.
E-Commerce: Ensuring secure payment processing.
Education: Defending against ransomware attacks on academic networks.
Network Infrastructure: Testing routers, switches, firewalls, IDS/IPS systems, VPNs,
and overall network segmentation.
Thank You!!