SlideShare a Scribd company logo
welcome
Ethical hacking
What is hacking?
History of hacking?
Types of hackers.
Hacking methods.
Process of Ethical hacking.
The pros of ethical hacking.
The cons of ethical hacking.
What is hacking?
 It is unconventional way of using
 a system beyond the original
  intentions of the manufacturer.

Hacking is not limited to computers.
What is ethical hacking?
It is the use of programming skills
 to determine vulnerabilities in
 computer systems.

It is also known as the intrusion testing,
 penetration testing or red teaming.
History of hacking.
the first hackers appeared in the 1960's
  at the Massachusetts Institute of
  Technology (MIT).

During the 1970's, a different kind
 of hacker appeared: the perhaps or
 phone hackers.
History of hacking.
In the 1980's, phreaks started to migrate
 to computers, and the first Bulletin Board
 Systems(BBS) appeared.

During the 1990's, when the use of the
 internet widespread around the world,
 hackers multiplied.
Types of hackers
White Hat hackers also referred as
 Ethical hacker.

Black Hat hackers also referred as
 cracker.

Grey Hat hackers also referred as
 Skilled Hacker.
Hacking Methods
Phishing Method.
Brute Force Hack.
Fake Login Hack.
Cookie Steal Hack.
Web Mail Hack
Process of Ethical hacking.
Preparation.
Foot printing.
Enumeration and fingerprinting.
Identification of vulnerabilities.
Attack-exploit the vulnerabilities.
The pros of ethical hacking .
It enables you to find out the problem.

Helps you build up a risk management
 program.

Helps you to think like the enemy
The cons of ethical hacking.
It provides only a snapshot of what is
 happening.

Losing data.

Being given a false sense of security.
End.
Testing is an essential part of any data
 security program.
An ethical hack can reduce the potential
 exposure of the company to criminal
 hackers.
 “It takes a Thief to Catch a Thief”.
The periodic ethical hacking and review
 exercise would enhance the security and
 mitigate possible loopholes being exploited.
Quries??
visit me at memywld.blogspot.com



THANK YOU.
HAVE A NICE DAY.

More Related Content

PPT
Introduction To Ethical Hacking
PPT
Ethical Hacking Powerpoint
PDF
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
PPT
PPTX
Ethical Hacking
PPTX
Ethical Hacking
PPTX
Cyber security with ai
PPTX
Social engineering
Introduction To Ethical Hacking
Ethical Hacking Powerpoint
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Ethical Hacking
Ethical Hacking
Cyber security with ai
Social engineering

What's hot (20)

PPTX
Introduction To Ethical Hacking
PPTX
Cyber security
PPT
Ethical hacking presentation
PPTX
Network forensics and investigating logs
PPTX
ETHICAL HACKING PRESENTATION
PPT
Social Engineering | #ARMSec2015
PPTX
Ethical Hacking
PPTX
Cyber security ppt final
PPT
Ethical hacking a licence to hack
PDF
AI in security
PPTX
System hacking
 
PPTX
Ethical hacking
PPTX
Types of Hacker
PPTX
Ethical hacking presentation
PPTX
Ip spoofing ppt
PPTX
Ethical hacking
PPT
Ethical hacking
PPTX
CSE-Ethical-Hacking-ppt.pptx
PDF
Anatomy of a cyber attack
Introduction To Ethical Hacking
Cyber security
Ethical hacking presentation
Network forensics and investigating logs
ETHICAL HACKING PRESENTATION
Social Engineering | #ARMSec2015
Ethical Hacking
Cyber security ppt final
Ethical hacking a licence to hack
AI in security
System hacking
 
Ethical hacking
Types of Hacker
Ethical hacking presentation
Ip spoofing ppt
Ethical hacking
Ethical hacking
CSE-Ethical-Hacking-ppt.pptx
Anatomy of a cyber attack

Viewers also liked (20)

PPTX
History of hacking
PPT
Brit India Wiki
PDF
Originales y pre impresi
PDF
Cyber Security Experts Forum
PPTX
Ethical Hacking
PDF
CMS Hacking Tricks - DerbyCon 4 - 2014
PDF
Open Source Information Gathering Brucon Edition
PDF
Advanced Threats and Lateral Movement Detection
PDF
Lateral Movement - Hacker Halted 2016
PPTX
Information security & ethical hacking
PPSX
Information Security and Ethical Hacking
PPT
Course on Ehtical Hacking - Introduction
PPTX
Hacktrikz - Introduction to Information Security & Ethical Hacking
PPTX
Hacking - Breaking Into It
PDF
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
PPT
Computer Hardware
PPT
Computer Hardware
PPTX
Basic concepts in computer security
PPTX
Introduction To Ethical Hacking
History of hacking
Brit India Wiki
Originales y pre impresi
Cyber Security Experts Forum
Ethical Hacking
CMS Hacking Tricks - DerbyCon 4 - 2014
Open Source Information Gathering Brucon Edition
Advanced Threats and Lateral Movement Detection
Lateral Movement - Hacker Halted 2016
Information security & ethical hacking
Information Security and Ethical Hacking
Course on Ehtical Hacking - Introduction
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacking - Breaking Into It
Passive Intelligence Gathering and Analytics - It's All Just Metadata!
Computer Hardware
Computer Hardware
Basic concepts in computer security
Introduction To Ethical Hacking

Similar to ethical hacking (20)

PPTX
Ethical Hacking
PPTX
Ethical_Hacking
PPTX
Ethical hacking
PPT
Ethical hacking
PPTX
CSSE-Ethical-Hacking-ppt.pptx
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
this ppt is based on ethica l hacking _
DOCX
Ethical hacking.
PPTX
EthicalHacking_AakashTakale
PPTX
Seminar PPT on ETHICAL HACKING .pptx
PPTX
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
PPTX
Ethical hacking
PPTX
Ethical Hacking.pptx Hacker Presentation
DOCX
Ethical Hacking
PPTX
Ethical Hacking.pptx
PPT
Hacking
PPTX
Ethical Hacking - An Overview
PPTX
Cse ethical hacking ppt
PPTX
Cse ethical hacking ppt
PPTX
Cyber Security PPT
Ethical Hacking
Ethical_Hacking
Ethical hacking
Ethical hacking
CSSE-Ethical-Hacking-ppt.pptx
Ethical hacking-presentation-updated(1by )Rasheed
this ppt is based on ethica l hacking _
Ethical hacking.
EthicalHacking_AakashTakale
Seminar PPT on ETHICAL HACKING .pptx
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
Ethical hacking
Ethical Hacking.pptx Hacker Presentation
Ethical Hacking
Ethical Hacking.pptx
Hacking
Ethical Hacking - An Overview
Cse ethical hacking ppt
Cse ethical hacking ppt
Cyber Security PPT

Recently uploaded (20)

PPTX
Role, role conflict and ascribed and achieved role.pptx
PDF
Renovating a Midwest Ranch Rustic Modern Charm with Carved Doors
PDF
The Top Life Coach in Haarlem is Life Coach Rudolfo.pdf
PPTX
James 1 Bible verses sermonbbbbbbbbbb.pptx
PPTX
The-World-of-Fashion-Trends-and-Innovation-2025.pptx
PPTX
GEE2-BEED-II: Ibaloi Indigenous People .pptx
PDF
Pranotsava Monsoon Retreat - Fazlani Nature's Nest
DOC
学历学位硕士ACAP毕业证,澳大利亚凯斯林大学毕业证留学未毕业
PDF
Economic and Financial Abuse - Hidden Tools of Power in Domestic Violence
DOCX
Free Pomodoro Tecnique Effect Guide -25mint - pomodorotimer.com.au
PDF
Echoes of Tomorrow - A Sustainable Legacy for Future Generations.pdf
PDF
4 Mindset Shifts to Turn Frustration into Focus
PDF
John Baptist Scalabrini Novena - Fr Luciano Final eddition.pdf
PDF
PrayerPetals- Empowering Women Through Faith-Based Support.pdf
PPTX
Hyperlipidemia current medication with lifestyle.
PDF
8 Effective Mosquito Control Tips for Gardens in the Monsoon Season
PPTX
PPT ARIEZ'S TOUR FINAL Pulogebang on.pptx
PDF
Student Housing Security From Metal Keys to Smart Access.pdf
PDF
Special Needs Dogs – How to Care for Them with Love .pdf
PDF
5 Popular Designs of Kashmir Silk Handmade Carpets.pdf
Role, role conflict and ascribed and achieved role.pptx
Renovating a Midwest Ranch Rustic Modern Charm with Carved Doors
The Top Life Coach in Haarlem is Life Coach Rudolfo.pdf
James 1 Bible verses sermonbbbbbbbbbb.pptx
The-World-of-Fashion-Trends-and-Innovation-2025.pptx
GEE2-BEED-II: Ibaloi Indigenous People .pptx
Pranotsava Monsoon Retreat - Fazlani Nature's Nest
学历学位硕士ACAP毕业证,澳大利亚凯斯林大学毕业证留学未毕业
Economic and Financial Abuse - Hidden Tools of Power in Domestic Violence
Free Pomodoro Tecnique Effect Guide -25mint - pomodorotimer.com.au
Echoes of Tomorrow - A Sustainable Legacy for Future Generations.pdf
4 Mindset Shifts to Turn Frustration into Focus
John Baptist Scalabrini Novena - Fr Luciano Final eddition.pdf
PrayerPetals- Empowering Women Through Faith-Based Support.pdf
Hyperlipidemia current medication with lifestyle.
8 Effective Mosquito Control Tips for Gardens in the Monsoon Season
PPT ARIEZ'S TOUR FINAL Pulogebang on.pptx
Student Housing Security From Metal Keys to Smart Access.pdf
Special Needs Dogs – How to Care for Them with Love .pdf
5 Popular Designs of Kashmir Silk Handmade Carpets.pdf

ethical hacking

  • 3. What is hacking? History of hacking? Types of hackers. Hacking methods. Process of Ethical hacking. The pros of ethical hacking. The cons of ethical hacking.
  • 4. What is hacking?  It is unconventional way of using a system beyond the original intentions of the manufacturer. Hacking is not limited to computers.
  • 5. What is ethical hacking? It is the use of programming skills to determine vulnerabilities in computer systems. It is also known as the intrusion testing, penetration testing or red teaming.
  • 6. History of hacking. the first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT). During the 1970's, a different kind of hacker appeared: the perhaps or phone hackers.
  • 7. History of hacking. In the 1980's, phreaks started to migrate to computers, and the first Bulletin Board Systems(BBS) appeared. During the 1990's, when the use of the internet widespread around the world, hackers multiplied.
  • 8. Types of hackers White Hat hackers also referred as Ethical hacker. Black Hat hackers also referred as cracker. Grey Hat hackers also referred as Skilled Hacker.
  • 9. Hacking Methods Phishing Method. Brute Force Hack. Fake Login Hack. Cookie Steal Hack. Web Mail Hack
  • 10. Process of Ethical hacking. Preparation. Foot printing. Enumeration and fingerprinting. Identification of vulnerabilities. Attack-exploit the vulnerabilities.
  • 11. The pros of ethical hacking . It enables you to find out the problem. Helps you build up a risk management program. Helps you to think like the enemy
  • 12. The cons of ethical hacking. It provides only a snapshot of what is happening. Losing data. Being given a false sense of security.
  • 13. End. Testing is an essential part of any data security program. An ethical hack can reduce the potential exposure of the company to criminal hackers.  “It takes a Thief to Catch a Thief”. The periodic ethical hacking and review exercise would enhance the security and mitigate possible loopholes being exploited.
  • 15. visit me at memywld.blogspot.com THANK YOU. HAVE A NICE DAY.