SlideShare una empresa de Scribd logo
1 de 17
Ethical Hacking
By: Renelyn Tuazon
4CpE-1
What is Hacking?
• act of finding the possible entry points that
exist in a computer system or a computer
network and finally entering into them.
• usually done to gain unauthorized access to
a computer system or a computer network,
either to harm the systems or to steal
sensitive information available on the
computer.
• A computer expert who does the act of
hacking is called a “Hacker".
• Hackers are those who seek knowledge,
to understand how systems operate, how
they are designed, and then attempt to
play with these systems.
Ethical Hacking
• Hacking is usually legal as long as it is
being done to find weaknesses and help
identify potential threats in a computer or
network system for testing purpose. This
sort of hacking is what we call Ethical
Hacking.
• An ethical hacker attempts to bypass
system security and search for any
weak points that could be exploited by
malicious hackers.
Ethical Hacker Commandments:
• Work Ethically
• Respect Privacy
• Avoid Crashes of your Systems
Ethical Hacking - Process
Reconnaissance
• Reconnaissance is a set of
processes and techniques
used to covertly discover
and collect information
about a target system.
• refers to preparatory phase
where an attacker learns
about all of the possible
attack vectors that can be
used in their plan.
Scanning and Enumeration
• Scanning is the process
where the attacker begins
to actively probe a target
machine or network for
vulnerabilities that can be
exploited.
• Enumeration is the ability
of the hacker to convince
some servers to give them
information that is vital to
them to make an attack.
Gaining Access
• In this process, the
vulnerability is located
and you attempt to exploit
it in order to enter
into the system.
• This is the actual hacking
phase in which the
hacker gains access to
the system.
Maintaining Access
• After gaining access,
the hacker installs some
backdoors in order to
enter into the system
when he needs access
in this owned system in
future.
Clearing Tracks
• “Everybody knows a
good hacker but
nobody knows a great
hacker.”
• This process is
actually an unethical
activity. It has to do
with the deletion of
logs of all the activities
that take place during
the hacking process.
Reporting
• Reporting is the last step
of finishing the ethical
hacking process. Here the
Ethical Hacker compiles a
report with his findings
and the job that was done
such as the tools used,
the success rate,
vulnerabilities found, and
the exploit processes .
Ethical Hacking Tools
• Nmap (Network Mapper)
• Metasploit
• Burp Suite
• Angry IP Scanner
• Cain and Abel
Advantages:
• Helps in closing the open holes in the
system network
• Provides security to banking and financial
establishments
• Prevents website defacements
Disadvantages:
• All depends upon the trustworthiness of
the ethical hacker.
• Hiring professionals is expensive.
References:
• http://www.dummies.com/programming/netwo
• https://www.tutorialspoint.com/ethical_hac
king/ethical_hacking_pdf_version.htm

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking Tools
Ethical Hacking ToolsEthical Hacking Tools
Ethical Hacking Tools
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Social engineering
Social engineering Social engineering
Social engineering
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 

Destacado

Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
leminhvuong
 
Types of Advertisement
Types of AdvertisementTypes of Advertisement
Types of Advertisement
ashvindabhi
 

Destacado (20)

Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cain
CainCain
Cain
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
09 Cain And Abel
09 Cain And Abel09 Cain And Abel
09 Cain And Abel
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Li fi technology - The Future Wireless Communication
Li fi technology - The Future Wireless CommunicationLi fi technology - The Future Wireless Communication
Li fi technology - The Future Wireless Communication
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Types of Advertisement
Types of AdvertisementTypes of Advertisement
Types of Advertisement
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Wireless Poewr Transmission
Wireless Poewr TransmissionWireless Poewr Transmission
Wireless Poewr Transmission
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 

Similar a Ethical Hacking Powerpoint

Similar a Ethical Hacking Powerpoint (20)

ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGEETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGE
 
Vulnerability assessment on cyber security
Vulnerability assessment on cyber securityVulnerability assessment on cyber security
Vulnerability assessment on cyber security
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical_Hacking
Ethical_HackingEthical_Hacking
Ethical_Hacking
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Types of attack -Part2
Types of attack -Part2Types of attack -Part2
Types of attack -Part2
 
Ethical Hacking Course-PPT.pptx
Ethical Hacking Course-PPT.pptxEthical Hacking Course-PPT.pptx
Ethical Hacking Course-PPT.pptx
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 

Último

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Último (20)

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 

Ethical Hacking Powerpoint

  • 2. What is Hacking? • act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. • usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer.
  • 3. • A computer expert who does the act of hacking is called a “Hacker". • Hackers are those who seek knowledge, to understand how systems operate, how they are designed, and then attempt to play with these systems.
  • 4. Ethical Hacking • Hacking is usually legal as long as it is being done to find weaknesses and help identify potential threats in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.
  • 5. • An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers.
  • 6. Ethical Hacker Commandments: • Work Ethically • Respect Privacy • Avoid Crashes of your Systems
  • 8. Reconnaissance • Reconnaissance is a set of processes and techniques used to covertly discover and collect information about a target system. • refers to preparatory phase where an attacker learns about all of the possible attack vectors that can be used in their plan.
  • 9. Scanning and Enumeration • Scanning is the process where the attacker begins to actively probe a target machine or network for vulnerabilities that can be exploited. • Enumeration is the ability of the hacker to convince some servers to give them information that is vital to them to make an attack.
  • 10. Gaining Access • In this process, the vulnerability is located and you attempt to exploit it in order to enter into the system. • This is the actual hacking phase in which the hacker gains access to the system.
  • 11. Maintaining Access • After gaining access, the hacker installs some backdoors in order to enter into the system when he needs access in this owned system in future.
  • 12. Clearing Tracks • “Everybody knows a good hacker but nobody knows a great hacker.” • This process is actually an unethical activity. It has to do with the deletion of logs of all the activities that take place during the hacking process.
  • 13. Reporting • Reporting is the last step of finishing the ethical hacking process. Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used, the success rate, vulnerabilities found, and the exploit processes .
  • 14. Ethical Hacking Tools • Nmap (Network Mapper) • Metasploit • Burp Suite • Angry IP Scanner • Cain and Abel
  • 15. Advantages: • Helps in closing the open holes in the system network • Provides security to banking and financial establishments • Prevents website defacements
  • 16. Disadvantages: • All depends upon the trustworthiness of the ethical hacker. • Hiring professionals is expensive.

Notas del editor

  1. You might want to explain or define different types of hacking (e.g Black-hat hacking, White-hat Hacking, Gray-Hat hacking, etc)
  2. Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed. Ethical hacking is an example of white-hat hacking. Explain why.
  3. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks. You might want to identify the skills an ethical hacker should have.
  4. The word ethical in this context means working with high professional morals and principles. Whether you’re performing ethical hacking tests against your own systems or for someone who has hired you, everything you do as an ethical hacker must be aboveboard and must support the company’s goals. No hidden agendas allowed!  Treat the information you gather with the utmost respect. All information you obtain during your testing — from web application flaws to clear text e-mail passwords to personally identifiable information and beyond — must be kept private. One of the biggest mistakes people make when trying to hack their own systems is inadvertently crashing the systems they’re trying to keep running. Poor planning is the main cause of this mistake. These testers often misunderstand the use and power of the security tools and techniques at their disposal.
  5. Nmap - It is an open source tool that is used widely for network discovery and security auditing. Nmap was originally designed to scan large networks, but it can work equally well for single hosts. Network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Metasploit - one of the most powerful exploit tools. With Metasploit, you can perform the following operations: Conduct basic penetration tests on small networks, Run spot checks on the exploitability of vulnerabilities, Discover the network or import scan data and Browse exploit modules and run individual exploits on hosts. Burp Suite - a popular platform that is widely used for performing security testing of web applications. It has various tools that work in collaboration to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities. Angry IP Scanner - a lightweight, cross-platform IP address and port scanner. It can scan IP addresses in any range. It can be freely copied and used anywhere. In order to increase the scanning speed, it uses multithreaded approach, wherein a separate scanning thread is created for each scanned IP address. Cain and Abel - Cain & Abel is a password recovery tool for Microsoft Operating Systems. It helps in easy recovery of various kinds of passwords by employing any of the following methods: sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysisattacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. Cain & Abel is a useful tool for security consultants, professional penetration testers and everyone else who plans to use it for ethical reasons.