SlideShare a Scribd company logo
Ethical Hacking
• Hacking is accessing unauthorized data by any method 
other than the direct method. 
H 
A 
C 
K 
I 
N 
g
• In 1988 a "worm program" written by a college student 
shut down about 10 percent of computers connected to 
the Internet. This was the beginning of the era of 
cyber attacks. 
• Today we have about 10,000 incidents of cyber attacks 
which are reported and the number grows. 
• A 16-year-old music student called Richard Pryce, 
better known by the hacker alias Datastream Cowboy, is 
arrested and charged with breaking into hundreds of 
computers including those at the Griffiths Air Force 
base, NASA and the Korean Atomic Research Institute. 
His online mentor, "Kuji", is never found. 
• Also this year, a group directed by Russian hackers 
broke into the computers of Citibank and transferred 
more than $10 million from customers' accounts. 
Eventually, Citibank recovered all but $400,000 of the 
pilfered money. 
B 
E 
G 
I 
n 
N 
I 
n 
g
W 
h 
Y 
? 
In this era, where world depends on technology and huge 
amount of data worth a lot of money stored in computers 
and hacking is all about accessing data for…
Ethical Hacking
• The number of exploits gets minimized when the number of 
weaknesses are reduced. 
• The functionality of the system gets minimized. 
• Moving towards security means moving away from 
functionality and ease of use. 
THE 
T 
R 
I 
A 
N 
G 
L 
E 
SECURITY 
FUNCTIONALITY EASE OF USE
• Hacking includes the following types of 
activity: 
• Hacker (programmer subculture), activity within the 
computer programmer subculture 
• Hacker (computer security), to access computer 
networks, legally or otherwise 
• Computer crime 
H 
A 
C 
K 
I 
N 
G 
TRY 
NEXT 
YES 
NO 
Success 
?
Can Hacking be Ethical ? 
H 
A 
C 
K 
I 
N 
G
• Coders: These are the one who revise the methods 
and create tools that are available in the 
market. These are the Real Hackers. 
• Admins: They uses the tools and exploits 
prepared by the coders. They do not develop 
their own techniques. 
• Script kiddies: They are the guys who take 
advantage of the Hacking tools and documentation 
available for free on the Internet but don’t 
have any knowledge of what’s going on behind the 
scenes. 
T 
Y 
P 
E
T 
Y 
P 
E
• Threat – An action or event that might prejudice 
security. A threat is a potential violation of 
security. 
• Vulnerability – Existence of a weakness, design, 
or implementation error that can lead to an 
unexpected, undesirable event compromising the 
security of the system. 
• Target of Evaluation – An IT system, product, or 
component that is identified/subjected as 
requiring security evaluation. 
• Attack – An assault on system security that 
derives from an intelligent threat. An attack is 
any action that attempts to or violates 
security. 
• Exploit – A defined way to breach the security 
of an IT system through vulnerability. 
T 
E 
R 
M 
I 
N 
O 
L 
O 
G 
Y
Ethical Hacking
Ethical Hacking
M 
O 
D 
E 
• Over the Internet 
• Over LAN 
• Locally 
• Offline 
• Theft 
• Deception
• Phishing 
• Key Loggers 
• RAT 
• Whatsapp Hacking 
• Wifi Hacking –Through Kali Linux 
• Email Bombing 
• SMS Bombing 
For 
B 
E 
G 
I 
N 
N 
E 
R 
s
SQL 
I 
N 
J 
E 
C 
T 
I 
O 
n 
• Let's say that the original purpose of the code 
was to create an SQL statement to select a user 
with a given user id. 
• If there is nothing to prevent a user from 
entering "wrong" input, the user can enter some 
"smart" input like this: 
“1=1” 
The SQL above is valid. It will return all rows 
from the table 
Users, since WHERE 1=1 is always true.
X 
S 
S 
• Cross-Site Scripting (XSS) attacks are a type of 
injection, in which malicious scripts are injected 
into otherwise benign and trusted web sites. 
• XSS attacks occur when an attacker uses a 
web application to send malicious code, generally 
in the form of a browser side script, to a different 
end user. Flaws that allow these attacks to succeed 
are quite widespread and occur anywhere a 
web application uses input from a user within 
the output it generates without validating or encoding 
it.
R 
E 
Q 
U 
I 
R 
E 
M 
E 
N 
T 
S 
• Hypertext Markup Language (HTML) is the basics 
for creating web pages and other information 
that can be displayed in a web browser. So if 
you don't know HTML you should first learn it. 
• JavaScript:Learning java script. Will help you 
understand the basics of Cross Site Scripting. 
• PHP/SQL:Majority of web applications are 
written using PHP and MySQL.So it is a must to 
learn PHP. 
• C & C++:More than 60 % of the exploits you will 
find on the web are written in C & C 
++, Learning C & C++ will help you understand 
about Buffer overflows, Stack overflow etc, So 
learning C and C ++ is must for every 
hacker/Pen tester.
R 
E 
Q 
U 
I 
R 
E 
M 
E 
N 
T 
S 
• Assembly:Learning assembly will help you in 
Writing/understanding Shell codes , Will Help 
you in Reverse Engineering applications and 
software's 
• Python:It is a very powerful high 
level language , Its Easy to learn and code, 
most of the tools and scripts for automation 
are written in Python . Knowing Python socket 
programming will help you a lot in Exploit 
writing 
• Ruby:It is an another language which is used to 
write scripts, tools. Metasploit Frame Work is 
written in Ruby. so learning ruby will help you 
understand the in and outs of msf. 
• Bash:Learning Bash is very Useful in writing 
small scripts for automation.
Thank You

More Related Content

PPTX
Ethical Hacking
PPTX
Hacking and Hackers
PPT
Ethical hacking presentation
PPTX
ETHICAL HACKING PRESENTATION
PPT
It security &_ethical_hacking
PDF
ISACA Ethical Hacking Presentation 10/2011
PPT
What is Ethical hacking
Ethical Hacking
Hacking and Hackers
Ethical hacking presentation
ETHICAL HACKING PRESENTATION
It security &_ethical_hacking
ISACA Ethical Hacking Presentation 10/2011
What is Ethical hacking

What's hot (20)

PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Ethical hacking
PPT
Ethical hacking
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Hacking and Types of Hacker.
PPTX
Ethical hacking
PPTX
Ethical Hacking Overview
PPTX
Hacking (cs192 report )
PPTX
ethical hacking
PPT
All about Hacking
PPTX
Ethical Hacking
PPT
Introduction To Computer Security
PPT
Ethical Hacking
PPTX
Hacking
PDF
Ethical Hacking Certification Path You Should Follow
PPTX
Ethical hacking
PDF
Computer hacking – Is it Ethical PPT
PPTX
Ethical Hacking & Network Security
PDF
Ethical Hacking Tools
Inetsecurity.in Ethical Hacking presentation
Ethical hacking
Ethical hacking
Ethical hacking-presentation-updated(1by )Rasheed
Hacking and Types of Hacker.
Ethical hacking
Ethical Hacking Overview
Hacking (cs192 report )
ethical hacking
All about Hacking
Ethical Hacking
Introduction To Computer Security
Ethical Hacking
Hacking
Ethical Hacking Certification Path You Should Follow
Ethical hacking
Computer hacking – Is it Ethical PPT
Ethical Hacking & Network Security
Ethical Hacking Tools

Viewers also liked (18)

PPTX
Colors
PPTX
Varls lens: Marketing Management Project
PPTX
Kitchen stuff
PPTX
Linea del tiempo cuautitlan izcalli
PPTX
Alma Fiesta-IIT Bhubaneswar
PPTX
Slangs
PDF
Portfolio
PPTX
Cine wave
PPTX
Phrasal verbs
PPTX
Present continuous high
PPT
Parasitic bat fly fitness and survival after separation from host
PPTX
Easter time
PPTX
School material
PDF
Creating Competitive Advantage
PPTX
Environment and landscape 1
PPTX
Wedding Vocabulary
PDF
Nestle Philippines Financial Statement Analysis for year ended 2013
PPTX
Definite and Indefinite Articles
Colors
Varls lens: Marketing Management Project
Kitchen stuff
Linea del tiempo cuautitlan izcalli
Alma Fiesta-IIT Bhubaneswar
Slangs
Portfolio
Cine wave
Phrasal verbs
Present continuous high
Parasitic bat fly fitness and survival after separation from host
Easter time
School material
Creating Competitive Advantage
Environment and landscape 1
Wedding Vocabulary
Nestle Philippines Financial Statement Analysis for year ended 2013
Definite and Indefinite Articles

Similar to Ethical Hacking (20)

PDF
Introduction of hacking and cracking
PDF
Real life hacking101
PPT
Ethical_Hacking_ppt
PPT
PPTX
Internet security powerpoint
PPTX
CyberSecurity and Importance of cybersecurity
PPTX
Internet security powerpoint
PPT
Ethical Hacking - Introduction to Computer Security
PPT
Ethical Hacking - Introduction to Computer Security
PPTX
Cyper security & Ethical hacking
PPT
Computer Security
PPT
Computer Security
PPT
Hackers Cracker Network Intruder
PPT
ETHICAL HACKING
PPT
Ethi mini1 - ethical hacking
PPTX
Parag presentation on ethical hacking
PPTX
Ethical hacking
PPTX
Computer security system Unit1.pptx
PPTX
Computer hacking
PPTX
Hacking intro
Introduction of hacking and cracking
Real life hacking101
Ethical_Hacking_ppt
Internet security powerpoint
CyberSecurity and Importance of cybersecurity
Internet security powerpoint
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Cyper security & Ethical hacking
Computer Security
Computer Security
Hackers Cracker Network Intruder
ETHICAL HACKING
Ethi mini1 - ethical hacking
Parag presentation on ethical hacking
Ethical hacking
Computer security system Unit1.pptx
Computer hacking
Hacking intro

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Approach and Philosophy of On baking technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Modernizing your data center with Dell and AMD
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Unlocking AI with Model Context Protocol (MCP)
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
Approach and Philosophy of On baking technology

Ethical Hacking

  • 2. • Hacking is accessing unauthorized data by any method other than the direct method. H A C K I N g
  • 3. • In 1988 a "worm program" written by a college student shut down about 10 percent of computers connected to the Internet. This was the beginning of the era of cyber attacks. • Today we have about 10,000 incidents of cyber attacks which are reported and the number grows. • A 16-year-old music student called Richard Pryce, better known by the hacker alias Datastream Cowboy, is arrested and charged with breaking into hundreds of computers including those at the Griffiths Air Force base, NASA and the Korean Atomic Research Institute. His online mentor, "Kuji", is never found. • Also this year, a group directed by Russian hackers broke into the computers of Citibank and transferred more than $10 million from customers' accounts. Eventually, Citibank recovered all but $400,000 of the pilfered money. B E G I n N I n g
  • 4. W h Y ? In this era, where world depends on technology and huge amount of data worth a lot of money stored in computers and hacking is all about accessing data for…
  • 6. • The number of exploits gets minimized when the number of weaknesses are reduced. • The functionality of the system gets minimized. • Moving towards security means moving away from functionality and ease of use. THE T R I A N G L E SECURITY FUNCTIONALITY EASE OF USE
  • 7. • Hacking includes the following types of activity: • Hacker (programmer subculture), activity within the computer programmer subculture • Hacker (computer security), to access computer networks, legally or otherwise • Computer crime H A C K I N G TRY NEXT YES NO Success ?
  • 8. Can Hacking be Ethical ? H A C K I N G
  • 9. • Coders: These are the one who revise the methods and create tools that are available in the market. These are the Real Hackers. • Admins: They uses the tools and exploits prepared by the coders. They do not develop their own techniques. • Script kiddies: They are the guys who take advantage of the Hacking tools and documentation available for free on the Internet but don’t have any knowledge of what’s going on behind the scenes. T Y P E
  • 10. T Y P E
  • 11. • Threat – An action or event that might prejudice security. A threat is a potential violation of security. • Vulnerability – Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system. • Target of Evaluation – An IT system, product, or component that is identified/subjected as requiring security evaluation. • Attack – An assault on system security that derives from an intelligent threat. An attack is any action that attempts to or violates security. • Exploit – A defined way to breach the security of an IT system through vulnerability. T E R M I N O L O G Y
  • 14. M O D E • Over the Internet • Over LAN • Locally • Offline • Theft • Deception
  • 15. • Phishing • Key Loggers • RAT • Whatsapp Hacking • Wifi Hacking –Through Kali Linux • Email Bombing • SMS Bombing For B E G I N N E R s
  • 16. SQL I N J E C T I O n • Let's say that the original purpose of the code was to create an SQL statement to select a user with a given user id. • If there is nothing to prevent a user from entering "wrong" input, the user can enter some "smart" input like this: “1=1” The SQL above is valid. It will return all rows from the table Users, since WHERE 1=1 is always true.
  • 17. X S S • Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. • XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.
  • 18. R E Q U I R E M E N T S • Hypertext Markup Language (HTML) is the basics for creating web pages and other information that can be displayed in a web browser. So if you don't know HTML you should first learn it. • JavaScript:Learning java script. Will help you understand the basics of Cross Site Scripting. • PHP/SQL:Majority of web applications are written using PHP and MySQL.So it is a must to learn PHP. • C & C++:More than 60 % of the exploits you will find on the web are written in C & C ++, Learning C & C++ will help you understand about Buffer overflows, Stack overflow etc, So learning C and C ++ is must for every hacker/Pen tester.
  • 19. R E Q U I R E M E N T S • Assembly:Learning assembly will help you in Writing/understanding Shell codes , Will Help you in Reverse Engineering applications and software's • Python:It is a very powerful high level language , Its Easy to learn and code, most of the tools and scripts for automation are written in Python . Knowing Python socket programming will help you a lot in Exploit writing • Ruby:It is an another language which is used to write scripts, tools. Metasploit Frame Work is written in Ruby. so learning ruby will help you understand the in and outs of msf. • Bash:Learning Bash is very Useful in writing small scripts for automation.