SlideShare una empresa de Scribd logo
1 de 28
Introduction 
to 
Ethical Hacking 
BY: TEAM CEH
O verview 
1.Introduction 
2.Types of Hackers 
3.Purpose Of Hacking 
4.Hacking Methodology 
5.Hacking Techniques 
6.How to get rid of? 
7.References
What is Hacking ? 
 Hacking is the art of finding solutions to real 
life problems. 
 The word “ Hack “ is not directly related to 
computers.
Hacking and Computers 
 The concept of hacking entered the computer 
culture at the MIT University in the 1960s. 
 There are two kinds of students 
1. Tools 
2. Hackers
1. Tools 
 A ``tool'' is someone who attends class in the 
college regularly 
 is always to be found in the library when no 
class is meeting, 
 Always Try to get Excellent grades in the 
examination. 
 Sole Aim: get placed in high paying Company
2. Hacker 
 A ``hacker'' is the opposite: someone who 
never goes to class, 
 who in fact sleeps all day, 
 and who spends the night pursuing 
recreational activities rather than studying 
text books. 
What does this have to do with computers? 
Originally, nothing.
Hackers vs Tools 
 There are standards for success as a hacker, 
just as grades form a standard for success as a 
tool. 
 Overall Hackers are more successful in life 
and they emerge as a leader in their field.
Types Of Hackers
1.White Hat Hacker 
2.Grey Hat Hacker 
3.Black Hat Hacker
White Hat Hackers - 
They use their knowledge and skill set for good, 
constructive intents. They find out new security loopholes 
and their solutions. 
A white hat that does VAPT is also known as Pentester.
Black Hat Hacker- 
They use their knowledge and skill set for illegal activities, 
destructive intents, without authorization. 
Black hat hackers are also referred to as the "crackers" within 
the security industry and by modern programmers. Crackers 
keep the awareness of the vulnerabilities to themselves and 
do not notify the general public or the manufacturer for 
patches to be applied.
Grey Hat Hacker- 
They exhibits traits from both white hats & black hats. 
Like a white hat, he'll inform the administrator of the 
website of the vulnerabilities, he found after hacking 
through the site. 
Like a black hat, he’ll hack any site freely and without any 
authorization from owners whatsoever. 
He'll even offer to repair the vulnerable site, that he exposed .
Purpose Of Hacking 
#To make security stronger ( Ethical Hacking ) 
#Just for fun 
#Show off 
#Hack other systems secretly & Steal important 
information
Hacking Methodology
Reconnaissance 
Also called as Information Gathering. 
To gain vital information about target. 
Where an attacker seeks to gather as much information as 
possible about a target. 
Whatever methods (Art of Googling, Social Engineering) are 
used to perform reconnaissance, hackers will usually collect 
a large amount of information which may be useful during 
their attacks.
S Scanning 
Attackers use a method called scanning before they attack a network. 
Scanning can be considered a logical extension (and overlap) of active 
reconnaissance since the attacker uses details gathered during 
reconnaissance to identify specific vulnerabilities. Often attackers use 
automated tools such as network/host scanners and war dialers to 
locate systems and attempt to discover vulnerabilities. 
Every machine using TCP/IP has 65,535 ports 
Each port like a doorway to a system 
Different programs use different ports (80, 25, 21,22 etc)
Gaining Access 
Vulnerabilities exposed during the reconnaissance and 
scanning phase are now exploited to gain access. 
The hacker can gain access at operating system level, 
application level or network level. 
The hacker has control and can use that system as they 
wish.
Maintaining Access 
In this procedure the Hacker Gains more access. 
He break into more sensitive administrator root accounts. 
Install Trojan horse program or backdoors to maintain his 
access and to gather additional information.
Covering Tracks 
This is the last & final stage where a hacker deletes all 
logs showing his malicious behavior. 
So, They don’t get caught. 
1.Clearing the event log 
2.Evidence Elimination 
3.Hiding
Hacking Techniques 
Low Tech Methods 
High Tech Methods
Low Tech Methods 
Social Engineering 
•Hacker takes advantage of trusting human being to get 
information from them 
•eg a ploy to install new security update on your system 
Shoulder Surfing 
Guessing 
•weak password like death of birth, pet name, nick name etc..
High Tech Methods 
Phishing 
Brute Force Attacks 
Sniffing 
LFI(Local File Inclusion) 
Metasploit 
Dos Attack 
SQL Injection
Hacking Tools 
Password Cracking : AirCrack, Cain and Able , THC 
Hydra 
Network Scanning : Nmap, AngryIPScanner , 
Wireshark 
System Hacking : Lost Door, Olllydgb , Keylogger 
Exploitation : Metasploit , Sqlmap , Social Engineering 
Toolkit
Hacking Operating Systems 
BackTrack 
Kali Linux 
BugTraq 
BackBox
How to get rid of? 
• Keep system softwares up to date 
• Avoid Downloading/Installing unknown programs 
• Use Internet Security 
• Keep firewall ON 
• Use strong passwords(uppercase , lowercase letters with 
numbers & special symbols) 
•Avoid storing important data in system like bank account 
information, any important documents etc..
Reference 
www.google.com/ 
http://sectools.org/ 
Wikipedia 
http://thehackernews.com/
ANY QUESTIONS?
THANK YOU !

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similar a Introduction To Ethical Hacking

Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical HackingAkashy Kale
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfvinsys2
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paperBilal Hameed
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking OverviewSubhoneel Datta
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 

Similar a Introduction To Ethical Hacking (20)

Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 

Último

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Último (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

Introduction To Ethical Hacking

  • 1. Introduction to Ethical Hacking BY: TEAM CEH
  • 2. O verview 1.Introduction 2.Types of Hackers 3.Purpose Of Hacking 4.Hacking Methodology 5.Hacking Techniques 6.How to get rid of? 7.References
  • 3. What is Hacking ?  Hacking is the art of finding solutions to real life problems.  The word “ Hack “ is not directly related to computers.
  • 4. Hacking and Computers  The concept of hacking entered the computer culture at the MIT University in the 1960s.  There are two kinds of students 1. Tools 2. Hackers
  • 5. 1. Tools  A ``tool'' is someone who attends class in the college regularly  is always to be found in the library when no class is meeting,  Always Try to get Excellent grades in the examination.  Sole Aim: get placed in high paying Company
  • 6. 2. Hacker  A ``hacker'' is the opposite: someone who never goes to class,  who in fact sleeps all day,  and who spends the night pursuing recreational activities rather than studying text books. What does this have to do with computers? Originally, nothing.
  • 7. Hackers vs Tools  There are standards for success as a hacker, just as grades form a standard for success as a tool.  Overall Hackers are more successful in life and they emerge as a leader in their field.
  • 9. 1.White Hat Hacker 2.Grey Hat Hacker 3.Black Hat Hacker
  • 10. White Hat Hackers - They use their knowledge and skill set for good, constructive intents. They find out new security loopholes and their solutions. A white hat that does VAPT is also known as Pentester.
  • 11. Black Hat Hacker- They use their knowledge and skill set for illegal activities, destructive intents, without authorization. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers. Crackers keep the awareness of the vulnerabilities to themselves and do not notify the general public or the manufacturer for patches to be applied.
  • 12. Grey Hat Hacker- They exhibits traits from both white hats & black hats. Like a white hat, he'll inform the administrator of the website of the vulnerabilities, he found after hacking through the site. Like a black hat, he’ll hack any site freely and without any authorization from owners whatsoever. He'll even offer to repair the vulnerable site, that he exposed .
  • 13. Purpose Of Hacking #To make security stronger ( Ethical Hacking ) #Just for fun #Show off #Hack other systems secretly & Steal important information
  • 15. Reconnaissance Also called as Information Gathering. To gain vital information about target. Where an attacker seeks to gather as much information as possible about a target. Whatever methods (Art of Googling, Social Engineering) are used to perform reconnaissance, hackers will usually collect a large amount of information which may be useful during their attacks.
  • 16. S Scanning Attackers use a method called scanning before they attack a network. Scanning can be considered a logical extension (and overlap) of active reconnaissance since the attacker uses details gathered during reconnaissance to identify specific vulnerabilities. Often attackers use automated tools such as network/host scanners and war dialers to locate systems and attempt to discover vulnerabilities. Every machine using TCP/IP has 65,535 ports Each port like a doorway to a system Different programs use different ports (80, 25, 21,22 etc)
  • 17. Gaining Access Vulnerabilities exposed during the reconnaissance and scanning phase are now exploited to gain access. The hacker can gain access at operating system level, application level or network level. The hacker has control and can use that system as they wish.
  • 18. Maintaining Access In this procedure the Hacker Gains more access. He break into more sensitive administrator root accounts. Install Trojan horse program or backdoors to maintain his access and to gather additional information.
  • 19. Covering Tracks This is the last & final stage where a hacker deletes all logs showing his malicious behavior. So, They don’t get caught. 1.Clearing the event log 2.Evidence Elimination 3.Hiding
  • 20. Hacking Techniques Low Tech Methods High Tech Methods
  • 21. Low Tech Methods Social Engineering •Hacker takes advantage of trusting human being to get information from them •eg a ploy to install new security update on your system Shoulder Surfing Guessing •weak password like death of birth, pet name, nick name etc..
  • 22. High Tech Methods Phishing Brute Force Attacks Sniffing LFI(Local File Inclusion) Metasploit Dos Attack SQL Injection
  • 23. Hacking Tools Password Cracking : AirCrack, Cain and Able , THC Hydra Network Scanning : Nmap, AngryIPScanner , Wireshark System Hacking : Lost Door, Olllydgb , Keylogger Exploitation : Metasploit , Sqlmap , Social Engineering Toolkit
  • 24. Hacking Operating Systems BackTrack Kali Linux BugTraq BackBox
  • 25. How to get rid of? • Keep system softwares up to date • Avoid Downloading/Installing unknown programs • Use Internet Security • Keep firewall ON • Use strong passwords(uppercase , lowercase letters with numbers & special symbols) •Avoid storing important data in system like bank account information, any important documents etc..
  • 26. Reference www.google.com/ http://sectools.org/ Wikipedia http://thehackernews.com/