SlideShare una empresa de Scribd logo
1 de 20
Government Polytechnic, Ahmedabad
Government Polytechnic, Ahmedabad
Communities of
Categories
Hackers
of Hacker
1. White Hat
1.White Hat
2. Grey Hat
2.Grey Hat
3. Black Hat
3.Black Hat
4. Phreaker
4.Phreaker
5. Script Kiddies
5.Script Kiddies
6. Hactivist
6.Hacktivist

Government Polytechnic, Ahmedabad

Government Polytechnic, Ahmedabad
1. White Hat :
A white hat is the hero or good guy, especially in
computing, where it refers to an Ethical Hacker or
Penetration Tester who focuses on securing and
protecting IT systems.
Such
people
are
Employed by Companies
where these Professionals
are sometimes called
Tiger Teams or
Red Teams.

Government Polytechnic, Ahmedabad
2. Grey Hat :
A
grey
hat,
refers to a skilled
hacker
who
sometimes acts
legally,
sometimes
in
good will, and
sometimes not.

They are a hybrid between white and black hat hackers.

Government Polytechnic, Ahmedabad
3. Black Hat : A black hat is the villain or bad guy. It
refers to a hacker that breaks into networks or
computers, or creates computer viruses.
They are specialized in unauthorized penetration of
information systems.
They may use computers to attack systems for profit,
for fun, or for political motivations or as a part of a
social cause. Hence they should not be confused with
ethical hackers.
Government Polytechnic, Ahmedabad
4. Phreaker :
The person
who
acts
of
gaining
unauthorized
access
to
Telecommunication
systems, especially
to obtain Free Calls.

Government Polytechnic, Ahmedabad
5. Script Kiddies :
Script kiddies are
like amateur kids
who gains illegal
access
to
computer
systems, often by
using
hacking
programs
downloaded
from the internet.
Their objective is to try to impress their friends.

Government Polytechnic, Ahmedabad
6.
Hacktivist
:
Hacktivist
is
a
mixture
of
the
words Hacker and
Activist.
They have taken to
defacing websites
or
computer
systems for
political reasons
or social aim.

Government Polytechnic, Ahmedabad
Some Malicious Hacking Strategies :
As there are steps to develop any software so as Every hackers do
follow some predefined rules or steps to hack into the system.
1. Information : The basic information gathering about the target
system.
2. Scanning : Scanning the target system for open ports and services
running on the open ports etc.
3. Gaining Access : Gaining the actual access of the particular
target system by exploiting the system.
4. Maintaining Access : Keeping the access of the system.
5. Clearing Tracks : To remove the footprints if any so as to remain
undetected from the victim.
Government Polytechnic, Ahmedabad
Not all Hackers do evil work.
Here's what you need to know to use your
Hacking Skills to do Good.

'Ethical Hacking' Is A Form of
'Legal Hacking' That Is Done
With The Permission of An
Organization
To
Help
Increase Its Security.

Government Polytechnic, Ahmedabad
Why Do We Need Ethical Hacking
Social
Engineering
Automated
Attacks

Organizational
Attacks

Restricted
Data
Accidental
Breaches in
Security

Viruses, Trojan
Horses,
and Worms

Government Polytechnic, Ahmedabad

Government Polytechnic, Ahmedabad

Denial of
Service (DoS)
Who are CEH? :
Certified
Ethical
Hackers
are
Technically Skilled IT Professionals With
A Strong Desire To Solve Problems And
Prevent
Malicious
Hackers
From
Causing Damage To Network Systems.
Government Polytechnic, Ahmedabad
How To Be Ethical Hacker :
One Can Become A Ethical Hacker by
Getting Just A Formal Training in Ethical
Hacking to Learn The Basic Fundamentals of
Hacking.

As You Became A Ethical Hacker You Need
Motivation, Dedication, Initiative,
Self-education And Tough Knowledge
To Improve Your-Self
As Per The New Innovations.

Government Polytechnic, Ahmedabad
Job :
There Are Lucrative
Jobs Available In
Government
Organizations,
Banks,
Financial
Institutions,
Military
Establishments And
Private Companies.

India will need more than 4 lakh ethical
hackers by 2015. -Rediff.com

Government Polytechnic, Ahmedabad
What to Learn :
Learn
Operating
Systems like Windows,
Mac and especially
UNIX as it is regarded
as
the
original
operating system built
by hackers.
Evaluate your strengths and interests and gain
some basic programming knowledge such as
C,C++, or Java.
Experience with various networking devices
and networking protocols.
Government Polytechnic, Ahmedabad
As a Ethical Hacker Keep in Mind :
* Always keep learning new things.

* Don’t do it just for fun.
* Never do it just for money.
* Keep you focus intact in your job.
* Always work within the law and never try
to break it.

Government Polytechnic, Ahmedabad
“The one who can hack it, can only
secure it”
Always Stay connected …
To The Hacker Community By Sharing Technical
Information And Ideas.
Government Polytechnic, Ahmedabad
Government Polytechnic
Ahmedabad

TechNet 2014
Gunjan Panara
(126170307057)

Vishwa Soni
(126170307020)

Government Polytechnic, Ahmedabad

Pooja Mahida
(126170307029)

Más contenido relacionado

La actualidad más candente

Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2ShivamSharma909
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
MasterSnacks: Cryptocurrency - Fraud and Forensic Accounting for Digital Assets
MasterSnacks: Cryptocurrency - Fraud and Forensic Accounting for Digital AssetsMasterSnacks: Cryptocurrency - Fraud and Forensic Accounting for Digital Assets
MasterSnacks: Cryptocurrency - Fraud and Forensic Accounting for Digital AssetsCitrin Cooperman
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 

La actualidad más candente (20)

Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
MasterSnacks: Cryptocurrency - Fraud and Forensic Accounting for Digital Assets
MasterSnacks: Cryptocurrency - Fraud and Forensic Accounting for Digital AssetsMasterSnacks: Cryptocurrency - Fraud and Forensic Accounting for Digital Assets
MasterSnacks: Cryptocurrency - Fraud and Forensic Accounting for Digital Assets
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 

Destacado

ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking   Chapter 9 - Linux Vulnerabilities - Eric VanderburgEthical hacking   Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric VanderburgEric Vanderburg
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 

Destacado (8)

ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking   Chapter 9 - Linux Vulnerabilities - Eric VanderburgEthical hacking   Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Similar a Ethical Hacking - Explained

Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfvinsys2
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfJawaidAbdulHameed
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSSifs India
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfuzair
 
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingDivy Singh Rathore
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical HackingMasih Karimi
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxSiddheshSurve10
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical HackingAkashy Kale
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 

Similar a Ethical Hacking - Explained (20)

Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Hacking
HackingHacking
Hacking
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
 
Cyber security
Cyber security Cyber security
Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Ethical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of HackingEthical hacking - Good Aspect of Hacking
Ethical hacking - Good Aspect of Hacking
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Ethical Hacking - Explained

  • 1.
  • 4. Communities of Categories Hackers of Hacker 1. White Hat 1.White Hat 2. Grey Hat 2.Grey Hat 3. Black Hat 3.Black Hat 4. Phreaker 4.Phreaker 5. Script Kiddies 5.Script Kiddies 6. Hactivist 6.Hacktivist Government Polytechnic, Ahmedabad Government Polytechnic, Ahmedabad
  • 5. 1. White Hat : A white hat is the hero or good guy, especially in computing, where it refers to an Ethical Hacker or Penetration Tester who focuses on securing and protecting IT systems. Such people are Employed by Companies where these Professionals are sometimes called Tiger Teams or Red Teams. Government Polytechnic, Ahmedabad
  • 6. 2. Grey Hat : A grey hat, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not. They are a hybrid between white and black hat hackers. Government Polytechnic, Ahmedabad
  • 7. 3. Black Hat : A black hat is the villain or bad guy. It refers to a hacker that breaks into networks or computers, or creates computer viruses. They are specialized in unauthorized penetration of information systems. They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Hence they should not be confused with ethical hackers. Government Polytechnic, Ahmedabad
  • 8. 4. Phreaker : The person who acts of gaining unauthorized access to Telecommunication systems, especially to obtain Free Calls. Government Polytechnic, Ahmedabad
  • 9. 5. Script Kiddies : Script kiddies are like amateur kids who gains illegal access to computer systems, often by using hacking programs downloaded from the internet. Their objective is to try to impress their friends. Government Polytechnic, Ahmedabad
  • 10. 6. Hacktivist : Hacktivist is a mixture of the words Hacker and Activist. They have taken to defacing websites or computer systems for political reasons or social aim. Government Polytechnic, Ahmedabad
  • 11. Some Malicious Hacking Strategies : As there are steps to develop any software so as Every hackers do follow some predefined rules or steps to hack into the system. 1. Information : The basic information gathering about the target system. 2. Scanning : Scanning the target system for open ports and services running on the open ports etc. 3. Gaining Access : Gaining the actual access of the particular target system by exploiting the system. 4. Maintaining Access : Keeping the access of the system. 5. Clearing Tracks : To remove the footprints if any so as to remain undetected from the victim. Government Polytechnic, Ahmedabad
  • 12. Not all Hackers do evil work. Here's what you need to know to use your Hacking Skills to do Good. 'Ethical Hacking' Is A Form of 'Legal Hacking' That Is Done With The Permission of An Organization To Help Increase Its Security. Government Polytechnic, Ahmedabad
  • 13. Why Do We Need Ethical Hacking Social Engineering Automated Attacks Organizational Attacks Restricted Data Accidental Breaches in Security Viruses, Trojan Horses, and Worms Government Polytechnic, Ahmedabad Government Polytechnic, Ahmedabad Denial of Service (DoS)
  • 14. Who are CEH? : Certified Ethical Hackers are Technically Skilled IT Professionals With A Strong Desire To Solve Problems And Prevent Malicious Hackers From Causing Damage To Network Systems. Government Polytechnic, Ahmedabad
  • 15. How To Be Ethical Hacker : One Can Become A Ethical Hacker by Getting Just A Formal Training in Ethical Hacking to Learn The Basic Fundamentals of Hacking. As You Became A Ethical Hacker You Need Motivation, Dedication, Initiative, Self-education And Tough Knowledge To Improve Your-Self As Per The New Innovations. Government Polytechnic, Ahmedabad
  • 16. Job : There Are Lucrative Jobs Available In Government Organizations, Banks, Financial Institutions, Military Establishments And Private Companies. India will need more than 4 lakh ethical hackers by 2015. -Rediff.com Government Polytechnic, Ahmedabad
  • 17. What to Learn : Learn Operating Systems like Windows, Mac and especially UNIX as it is regarded as the original operating system built by hackers. Evaluate your strengths and interests and gain some basic programming knowledge such as C,C++, or Java. Experience with various networking devices and networking protocols. Government Polytechnic, Ahmedabad
  • 18. As a Ethical Hacker Keep in Mind : * Always keep learning new things. * Don’t do it just for fun. * Never do it just for money. * Keep you focus intact in your job. * Always work within the law and never try to break it. Government Polytechnic, Ahmedabad
  • 19. “The one who can hack it, can only secure it” Always Stay connected … To The Hacker Community By Sharing Technical Information And Ideas. Government Polytechnic, Ahmedabad
  • 20. Government Polytechnic Ahmedabad TechNet 2014 Gunjan Panara (126170307057) Vishwa Soni (126170307020) Government Polytechnic, Ahmedabad Pooja Mahida (126170307029)