SlideShare a Scribd company logo
1 of 25
Career in
Ethical Hacking
52-61-74-6e-65-73-68-20-44-68-65-65-72-61-6a
Presenter:
Objective
How to do
Hacking Tools
Live Hacking
Security
Self Declaration
I, <my_name/> swear that,
I will never misuse hacking skills for my
personal/organizational benefit or
interest.
01001000 01000001 01000011 01001011
01000101 01010010 01010011 00100000
01000001 01010010 01000101 00100000
01001000 01000101 01010010 01000101
Crack the code
The First Hacking
 The first hacker appeared in 1960’s at Massachusetts Institute of
Technology(MIT)
 During 1970’s different types hackers appeared as Phone Hackers
 1980’s hackers migrated to Computer, ”Bulletin Board System (BBS)
 1990’s Internet came and hackers were multiplied
Hacker and Ethical Hacker
 Hacker
 Access computer System or network without authorization
 Breaks the law
 Ethical Hackers
 Performs the same activities with the Owner’s Permission
 Employed the companies to perform the Penetration Tests
Active Hacker Groups on the Earth
 Fancy Bear (aka. Sofacy, Pawn Storm) / Cozy Bear (aka. CozyDuke, Office Monkeys)
 Rival agencies in the Russian spy services
 Lazarus Group (aka. DarkSeoul, Guardians of Peace)
 Widely believed to be associated with North Korea
 Equation Group
 This is the nickname given by Russian antivirus firm Kaspersky
 Comment Crew (aka. APT1, Shanghai Group)
 China sponsors a plethora of hacking groups
 Sandworm (a.k.a. Electrum)
 Named for allusions to the sci-fi classic Dune found in its code,
Sandworm is another group believed to be associated with the Russians
Hackers Types
 White Hat
 Good Guys
 Don’t use their Skill for illegal purpose
 Computer Security experts and help to protect from Black Hats
 Black Hat
 Bad Guys
 Use the skill for malicious purpose
 Hack banks, websites, credit cards
 Grey Hat
 Combination of black hat and white hat
Hacking Process
Footprinting
(information
gathering)
Scanning
Enumerations
Attack and
Gaining
Access
Escalating
privilege,
Covering
Tracks, and
Creating
Backdoors
Tools and TechnologiesFootprinting
Whois, Ping, Bigbrother
Traceroute, nslookup
www.samspade.org,
www.geektools.com,
www.whois.net,
www.demon.net
Scanning
nmap
Nessus
OpenVAS
InSSIder
Enumeration
Netcat
tcpdump
Telnet
Firewalk
Encryption
Encryption is an interesting piece of technology that works by scrambling
data so it is unreadable by unintended parties
01d59a3b5e0ad59fe56710fd3114d97e
Password hashed using MD5 algorithm
A password, hacked recently
Hacking
Password
“Windows 10”
Hacking Windows 10 Video
Revealing Password from Browser
javascript: var p=r(); function r(){var g=0;var x=false;var
x=z(document.forms);g=g+1;var w=window.frames;for(var k=0;k<w.length;k++) {var
x = ((x) || (z(w[k].document.forms)));g=g+1;}if (!x) alert('Password not found in ' +
g + ' forms');}function z(f){var b=false;for(var i=0;i<f.length;i++) {var
e=f[i].elements;for(var j=0;j<e.length;j++) {if (h(e[j])) {b=true}}}return b;}function
h(ej){var s='';if (ej.type=='password'){s=ej.value;if (s!=''){prompt('Password found ',
s)}else{alert('Password is blank')}return true;}}
Attacks
1. Eavesdropping
2. Data Modification
3. Identity Spoofing (IP Address Spoofing)
4. Password-Based Attacks
5. Denial-of-Service Attack
6. Man-in-the-Middle Attack
7. Compromised-Key Attack
8. Sniffer Attack
9. Application-Layer Attack
https://technet.microsoft.com/en-us/library/cc959354.aspx
Operating System for Hacking and Pen Test
 Parrot Security OS
 Kali Linux
 BackBox
 Samurai Web Testing Framework
 Pentoo Linux
 DEFT Linux
 Caine
 Network Security Toolkit (NST)
 BlackArch Linux
 Bugtraq
 ArchStrike Linux
 Fedora Security Spin
Curriculum
Ethical
Hacking
Footprinting
Scanning
Networks
Enumerations
System
Hacking
Malware and
Sniffing
Web Servers
hacking
Hacking
Mobile
Platforms
Social
Engineering
Cloud
Computing
Cryptography
Honeypots
and Firewalls
WeTrainOn
Our Training Methodology
HACK THE LAB
Who will get benefitted
https://www.softwareadvice.com/resources/how-to-get-a-job-as-an-ethical-hacker/
Why neosphere?
OCR model classroom [experiential learning]
Trainers from Industry
Career Guidance
Internship
Placement Assistance
Career and Internship Partner
Our Academic Partners
Certification exams we conduct
Want to hack…
Call Us at
+977 9801200111
01-555 15 15
Or write us
info@neosphere.com.np

More Related Content

What's hot

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 

What's hot (20)

trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
Metasploit
MetasploitMetasploit
Metasploit
 
Introduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitIntroduction To Exploitation & Metasploit
Introduction To Exploitation & Metasploit
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Stuxnet worm
Stuxnet wormStuxnet worm
Stuxnet worm
 
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorPractical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware Behavior
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Ppt
PptPpt
Ppt
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 

Similar to Career in Ethical Hacking

Similar to Career in Ethical Hacking (20)

Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Hacking
HackingHacking
Hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 

More from neosphere

More from neosphere (8)

C programming Workshop
C programming WorkshopC programming Workshop
C programming Workshop
 
Java Programming Workshop
Java Programming WorkshopJava Programming Workshop
Java Programming Workshop
 
Digital Marketing in Business
Digital Marketing in BusinessDigital Marketing in Business
Digital Marketing in Business
 
CCNP Presentation- neosphere
CCNP Presentation- neosphereCCNP Presentation- neosphere
CCNP Presentation- neosphere
 
Digital marketing
Digital marketingDigital marketing
Digital marketing
 
Career in Software Development
Career in Software Development  Career in Software Development
Career in Software Development
 
Building career in Information Technology
Building career in Information TechnologyBuilding career in Information Technology
Building career in Information Technology
 
Career as network specialist
Career as network specialistCareer as network specialist
Career as network specialist
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

Career in Ethical Hacking

Editor's Notes

  1. Decode using excel Convert Binary to Decimal Decimal to character
  2. Footprinting: is the first and most convenient way that hackers use to gather information about computer systems and the companies they belong to. The purpose of footprinting to learn as much as you can about a system, it's remote access capabilities, its ports and services, and the aspects of its security. Scanning: is the process to find out from which door or the way a hacker can enter in the Victim computer Enumeration: The process of enumeration, finding find what services are running, versions, open shares, account details, or possible points of entry Access and Attack: Successful gain to the Victim computer/device and start doing your Job Backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device
  3. Show them traceroute command WMIC [Windows Management Instrumentation (WMI)] wmic OS wmic /output:c:\data\test.csv computersystem list full /format:csv wmic /output:c:\data\test.csv os /format:csv
  4. http://www.md5online.org Use the link to decrypt the password.
  5. http://unminify.com/
  6. At neosphere, we provide optical classroom training, where one student will have access to one machine and that is very important from the “Cone of Learning” point of view. Trainer’s are from the industry which will help you to understand the live software development training methodologies Our career partners will guide you in finding the jobs as well as designing the Resume and interview cracking techniques, we will also assist you in getting Job We will provide you the leading companies in Nepal where you can do your Internship