SlideShare una empresa de Scribd logo
1 de 23
NOTHING IS ILLEGAL UNTIL
YOU GET CAUGHT
HACKING IS NOT A CRIME
Hacking is the practice of modifying the features of a
system, in order to accomplish a goal outside of the
creator's original purpose. The person who is
consistently engaging in hacking activities, and has
accepted hacking as a lifestyle and philosophy of their
choice, is called a hacker.
TYPES OF HACKERS
1. Black Hat Hackers
2. White Hat Hackers
3. Grey Hat Hackers
4. Script kiddies
1. Black Hat hackers always do illegal work. They
Work for black money . They hack into to Bank
Websites , credit card websites and stole
Money from accounts in bank websites.

2. They are professionals in their fields.

3. They use their knowledge for illegal purposes.
1 . White hat hackers are like Ethical Hackers .
They use their skills for good purposes.

2. They work for organizations for stop the illegal
activities through black hat hackers.
1. Grey Hat hackers have both qualities like
   black hat hackers and white hat hackers .

2. They use their knowledge for bad purposes
   and good purposes too.
1. Script kiddies hacks into computer
   or websites using the tools available
   on the internet .
2. They don’t have knowledge of
   programming .
WHAT IS ETHICAL HACKING

Independent computer security
Professionals breaking into the
computer systems.

Neither damage the target systems
nor steal information.

Evaluate target systems security and
report back to owners about the
vulnerabilities found
INTRODUCTION TO ETHICAL HACKING
  Ethical hackers
    Employed by companies to perform penetration tests


  Penetration test
    Legal attempt to break into a company’s network to find
     its weakest link
    Tester only reports findings, does not solve problems
THE ROLE OF SECURITY AND
  PENETRATION TESTS
 Hackers
   Access computer system or network without authorization

   Breaks the law; can go to prison

 Crackers
   Break into systems to steal or destroy data
   U.S. Department of Justice calls both hackers

 Ethical hacker
   Performs most of the same activities but with owner’s
    permission
BENEFITS OF ETHICAL HACKING

 1. Certified Ethical Hacker

 2. Perform hacking operation into network
    with owner’s permission

 3. Penetrate the websites and networks with
 Authorization
STEPS TO PERFORM ETHICAL
HACKING
•Information gathering

•Scanning

•Analyze System

•Prepare for attack

•Access the system

•Maintaining Access
SOME BLACK HAT HACKERS
1. Kevin Poulsen

2. Kevin d Mitnick

3. Adrain Lamo

4. George Hotz

5. Jonathan james
SOME WHITE HAT HACKERS

1. Tim berner Lee

2. Bill Gates

3. Linus Tovaldes

4. Steve Jobs

5. Steve Wozniak
Extremely high end proffesional ethical hacking presentation

Más contenido relacionado

Destacado

presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking Amol Deshmukh
 
Prezi : mode d'emploi
Prezi : mode d'emploiPrezi : mode d'emploi
Prezi : mode d'emploiAureleib
 
Collaboration, Big Data and the search for the Higgs Boson
Collaboration, Big Data and the  search for the Higgs BosonCollaboration, Big Data and the  search for the Higgs Boson
Collaboration, Big Data and the search for the Higgs BosonSuma Pria Tunggal
 
Advanced penetration testing - Amarendra Godbole
Advanced penetration testing - Amarendra GodboleAdvanced penetration testing - Amarendra Godbole
Advanced penetration testing - Amarendra GodboleIndicThreads
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
Easiest way to start with Shell scripting
Easiest way to start with Shell scriptingEasiest way to start with Shell scripting
Easiest way to start with Shell scriptingAkshay Siwal
 
Vodafone beta factory - GEC 2015
Vodafone beta factory - GEC 2015Vodafone beta factory - GEC 2015
Vodafone beta factory - GEC 2015Marcello Viti
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
y3dips hacking priv8 network
y3dips hacking priv8 networky3dips hacking priv8 network
y3dips hacking priv8 networkidsecconf
 
What The Heck Is Hacking?
What The Heck Is Hacking? What The Heck Is Hacking?
What The Heck Is Hacking? Lars Zimmermann
 
Advanced growth hacking
Advanced growth hackingAdvanced growth hacking
Advanced growth hackingVasil Azarov
 
Travel Hacking 101
Travel Hacking 101Travel Hacking 101
Travel Hacking 101nbuchan1
 

Destacado (15)

Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hacking Techniques
Hacking TechniquesHacking Techniques
Hacking Techniques
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
 
Prezi : mode d'emploi
Prezi : mode d'emploiPrezi : mode d'emploi
Prezi : mode d'emploi
 
Collaboration, Big Data and the search for the Higgs Boson
Collaboration, Big Data and the  search for the Higgs BosonCollaboration, Big Data and the  search for the Higgs Boson
Collaboration, Big Data and the search for the Higgs Boson
 
Advanced penetration testing - Amarendra Godbole
Advanced penetration testing - Amarendra GodboleAdvanced penetration testing - Amarendra Godbole
Advanced penetration testing - Amarendra Godbole
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
 
Easiest way to start with Shell scripting
Easiest way to start with Shell scriptingEasiest way to start with Shell scripting
Easiest way to start with Shell scripting
 
Vodafone beta factory - GEC 2015
Vodafone beta factory - GEC 2015Vodafone beta factory - GEC 2015
Vodafone beta factory - GEC 2015
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
y3dips hacking priv8 network
y3dips hacking priv8 networky3dips hacking priv8 network
y3dips hacking priv8 network
 
What The Heck Is Hacking?
What The Heck Is Hacking? What The Heck Is Hacking?
What The Heck Is Hacking?
 
Advanced growth hacking
Advanced growth hackingAdvanced growth hacking
Advanced growth hacking
 
Travel Hacking 101
Travel Hacking 101Travel Hacking 101
Travel Hacking 101
 

Más de thetechnicalzone

Más de thetechnicalzone (7)

AT mega8 basics
AT mega8 basicsAT mega8 basics
AT mega8 basics
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
All dos commands
All dos commandsAll dos commands
All dos commands
 
Ccna new syllabus
Ccna new syllabusCcna new syllabus
Ccna new syllabus
 
Computer harware complete notes
Computer harware complete notesComputer harware complete notes
Computer harware complete notes
 
Network engg
Network enggNetwork engg
Network engg
 
Ccna
CcnaCcna
Ccna
 

Último

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Último (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Extremely high end proffesional ethical hacking presentation

  • 1.
  • 2.
  • 3. NOTHING IS ILLEGAL UNTIL YOU GET CAUGHT
  • 4. HACKING IS NOT A CRIME
  • 5. Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
  • 6. TYPES OF HACKERS 1. Black Hat Hackers 2. White Hat Hackers 3. Grey Hat Hackers 4. Script kiddies
  • 7.
  • 8. 1. Black Hat hackers always do illegal work. They Work for black money . They hack into to Bank Websites , credit card websites and stole Money from accounts in bank websites. 2. They are professionals in their fields. 3. They use their knowledge for illegal purposes.
  • 9.
  • 10. 1 . White hat hackers are like Ethical Hackers . They use their skills for good purposes. 2. They work for organizations for stop the illegal activities through black hat hackers.
  • 11.
  • 12. 1. Grey Hat hackers have both qualities like black hat hackers and white hat hackers . 2. They use their knowledge for bad purposes and good purposes too.
  • 13.
  • 14. 1. Script kiddies hacks into computer or websites using the tools available on the internet . 2. They don’t have knowledge of programming .
  • 15.
  • 16. WHAT IS ETHICAL HACKING Independent computer security Professionals breaking into the computer systems. Neither damage the target systems nor steal information. Evaluate target systems security and report back to owners about the vulnerabilities found
  • 17. INTRODUCTION TO ETHICAL HACKING  Ethical hackers  Employed by companies to perform penetration tests  Penetration test  Legal attempt to break into a company’s network to find its weakest link  Tester only reports findings, does not solve problems
  • 18. THE ROLE OF SECURITY AND PENETRATION TESTS  Hackers  Access computer system or network without authorization  Breaks the law; can go to prison  Crackers  Break into systems to steal or destroy data  U.S. Department of Justice calls both hackers  Ethical hacker  Performs most of the same activities but with owner’s permission
  • 19. BENEFITS OF ETHICAL HACKING 1. Certified Ethical Hacker 2. Perform hacking operation into network with owner’s permission 3. Penetrate the websites and networks with Authorization
  • 20. STEPS TO PERFORM ETHICAL HACKING •Information gathering •Scanning •Analyze System •Prepare for attack •Access the system •Maintaining Access
  • 21. SOME BLACK HAT HACKERS 1. Kevin Poulsen 2. Kevin d Mitnick 3. Adrain Lamo 4. George Hotz 5. Jonathan james
  • 22. SOME WHITE HAT HACKERS 1. Tim berner Lee 2. Bill Gates 3. Linus Tovaldes 4. Steve Jobs 5. Steve Wozniak