SlideShare una empresa de Scribd logo
1 de 16
Hacking
Authorized or unauthorized
attempts to bypass the
security mechanisms of an
information system or
network.
Who is a “HACKER” ?
 A person who bypasses the
 system’s access controls by
 taking advantage of security
 weaknesses left in the system by
 developers.
Types of Hackers
   The good guys who identify the
    security weakness of the system
    or network and inform the owner
    about them.
◦ A black hat hacker is the villain or
  bad guy, who crash into victim’s
  security to steal information and
  destroy the victims security
  network.
◦ A grey hat hacker, in the hacking
  community, refers to a skilled hacker
  who is somewhere in between white
  and black hat hackers.
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3
th1s wh3|| 1 h4ck3d 1n



I did not hack this page, it was like
this when I hacked in.
 To make security stronger ( Ethical Hacking ).
 Just for fun.
 Hack other systems secretly.
 Steal important information.
 Destroy enemy’s computer network.
ETHICAL HACKING
 This is a positive approach of hacking.
 In this type of hacking company’s own
  software engineers Hack into its server and
  crack its password.
 If the password is cracked one time nobody
  can crack it again so the server is kept
  secured.
World’s famous hackers


• Stephen Wozniac




• Tsutomu Shimomura
World’s famous hackers


• Kevin Mitnick




• Kevin Poulsen
Cybercrime in World
Did you know ?
 Social networking sites like
  ‘FACEBOOK’,’GMAIL’,’YAHOO”
  comprised of 60% of direct or
  indirect hacking incidents.
 The average age group of hackers
  are aged between 14-24 yrs. …
Preventive
measures
 Install a strong anti-virus software.
 Always run a anti-virus check before
  you download a program or a file from
  the internet.
 Avoid disclosing personal details like
  phone number, credit card details to
  strangers.
Thank You
 PRESENTED BY
 D H RU M I L K H A T R I .
 V I R A L C H H A T BA R .
 R I S H I T C H AU H A N .
 NA K U L K A NA R .
 MIRAJ THACKER.

Más contenido relacionado

La actualidad más candente (19)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking..!!
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackers
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hackers
HackersHackers
Hackers
 

Destacado

Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IPAshish Chandurkar
 
Ethical Hacking JtR Presentation
Ethical Hacking JtR PresentationEthical Hacking JtR Presentation
Ethical Hacking JtR PresentationGerasimos Zapantis
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKINGNAWAZ KHAN
 
Who and what is BOM?
Who and what is BOM?Who and what is BOM?
Who and what is BOM?Jonathan Shaw
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hackingAmanpreet Singh
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 
Fundamentos circuitos eletric
Fundamentos circuitos  eletricFundamentos circuitos  eletric
Fundamentos circuitos eletricTiago Viana
 
Tactical Fingerprinting using metadata, hidden info and lost data
Tactical Fingerprinting using metadata, hidden info and lost dataTactical Fingerprinting using metadata, hidden info and lost data
Tactical Fingerprinting using metadata, hidden info and lost dataChema Alonso
 
Jack The Ripper
Jack The RipperJack The Ripper
Jack The RipperPTentacle
 
The Ultimate Defence - Think Like a Hacker
The Ultimate Defence - Think Like a HackerThe Ultimate Defence - Think Like a Hacker
The Ultimate Defence - Think Like a HackerPeter Wood
 

Destacado (20)

Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IP
 
Ethical Hacking JtR Presentation
Ethical Hacking JtR PresentationEthical Hacking JtR Presentation
Ethical Hacking JtR Presentation
 
Ethical_Hacking
Ethical_HackingEthical_Hacking
Ethical_Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Who and what is BOM?
Who and what is BOM?Who and what is BOM?
Who and what is BOM?
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
IMT-CDL
IMT-CDLIMT-CDL
IMT-CDL
 
Fundamentos circuitos eletric
Fundamentos circuitos  eletricFundamentos circuitos  eletric
Fundamentos circuitos eletric
 
Tactical Fingerprinting using metadata, hidden info and lost data
Tactical Fingerprinting using metadata, hidden info and lost dataTactical Fingerprinting using metadata, hidden info and lost data
Tactical Fingerprinting using metadata, hidden info and lost data
 
Jack The Ripper
Jack The RipperJack The Ripper
Jack The Ripper
 
Hacking
HackingHacking
Hacking
 
The Ultimate Defence - Think Like a Hacker
The Ultimate Defence - Think Like a HackerThe Ultimate Defence - Think Like a Hacker
The Ultimate Defence - Think Like a Hacker
 

Similar a Ethical hacking (20)

Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Hacking
HackingHacking
Hacking
 
hacking
hackinghacking
hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
All About Hacking.!!
All About Hacking.!! All About Hacking.!!
All About Hacking.!!
 

Ethical hacking

  • 1.
  • 2. Hacking Authorized or unauthorized attempts to bypass the security mechanisms of an information system or network.
  • 3. Who is a “HACKER” ?  A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers.
  • 5. The good guys who identify the security weakness of the system or network and inform the owner about them.
  • 6. ◦ A black hat hacker is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.
  • 7. ◦ A grey hat hacker, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.
  • 8. 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|| 1 h4ck3d 1n I did not hack this page, it was like this when I hacked in.
  • 9.  To make security stronger ( Ethical Hacking ).  Just for fun.  Hack other systems secretly.  Steal important information.  Destroy enemy’s computer network.
  • 10. ETHICAL HACKING  This is a positive approach of hacking.  In this type of hacking company’s own software engineers Hack into its server and crack its password.  If the password is cracked one time nobody can crack it again so the server is kept secured.
  • 11. World’s famous hackers • Stephen Wozniac • Tsutomu Shimomura
  • 12. World’s famous hackers • Kevin Mitnick • Kevin Poulsen
  • 14. Did you know ?  Social networking sites like ‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 60% of direct or indirect hacking incidents.  The average age group of hackers are aged between 14-24 yrs. …
  • 15. Preventive measures  Install a strong anti-virus software.  Always run a anti-virus check before you download a program or a file from the internet.  Avoid disclosing personal details like phone number, credit card details to strangers.
  • 16. Thank You  PRESENTED BY  D H RU M I L K H A T R I .  V I R A L C H H A T BA R .  R I S H I T C H AU H A N .  NA K U L K A NA R .  MIRAJ THACKER.