SlideShare a Scribd company logo
Ethical hacking
Hacking
Authorized or unauthorized
attempts to bypass the
security mechanisms of an
information system or
network.
Who is a “HACKER” ?
 A person who bypasses the
 system’s access controls by
 taking advantage of security
 weaknesses left in the system by
 developers.
Types of Hackers
   The good guys who identify the
    security weakness of the system
    or network and inform the owner
    about them.
◦ A black hat hacker is the villain or
  bad guy, who crash into victim’s
  security to steal information and
  destroy the victims security
  network.
◦ A grey hat hacker, in the hacking
  community, refers to a skilled hacker
  who is somewhere in between white
  and black hat hackers.
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3
th1s wh3|| 1 h4ck3d 1n



I did not hack this page, it was like
this when I hacked in.
 To make security stronger ( Ethical Hacking ).
 Just for fun.
 Hack other systems secretly.
 Steal important information.
 Destroy enemy’s computer network.
ETHICAL HACKING
 This is a positive approach of hacking.
 In this type of hacking company’s own
  software engineers Hack into its server and
  crack its password.
 If the password is cracked one time nobody
  can crack it again so the server is kept
  secured.
World’s famous hackers


• Stephen Wozniac




• Tsutomu Shimomura
World’s famous hackers


• Kevin Mitnick




• Kevin Poulsen
Cybercrime in World
Did you know ?
 Social networking sites like
  ‘FACEBOOK’,’GMAIL’,’YAHOO”
  comprised of 60% of direct or
  indirect hacking incidents.
 The average age group of hackers
  are aged between 14-24 yrs. …
Preventive
measures
 Install a strong anti-virus software.
 Always run a anti-virus check before
  you download a program or a file from
  the internet.
 Avoid disclosing personal details like
  phone number, credit card details to
  strangers.
Thank You
 PRESENTED BY
 D H RU M I L K H A T R I .
 V I R A L C H H A T BA R .
 R I S H I T C H AU H A N .
 NA K U L K A NA R .
 MIRAJ THACKER.

More Related Content

PPTX
Ethical hacking
PPTX
Hacking final
PPTX
Ethical hacking basics
PPTX
ICT ~Hacking~
PPTX
ETHICAL HACKING PRESENTATION
PPTX
Ethical hacking
PPT
Ethical Hacking
PPTX
Ethical hacking
Ethical hacking
Hacking final
Ethical hacking basics
ICT ~Hacking~
ETHICAL HACKING PRESENTATION
Ethical hacking
Ethical Hacking
Ethical hacking

What's hot (19)

PPTX
Ethical Hacking
PPTX
Ethical hacking
PDF
White hat and black hat hackers
DOCX
Full seminar report on ethical hacking
PPT
Ethical hacking
PPTX
Hacking
PPTX
Ethical Hacking
PPTX
PPT
Hacking
PPTX
Hacking
PPT
Ethical Hacking Powerpoint
PPT
Power Point Hacker
PPTX
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
PPTX
Ethical hacking
PPT
Ethical hacking presentation
PPTX
Ethical hacking
PPTX
Ethical Hacking
Ethical Hacking
Ethical hacking
White hat and black hat hackers
Full seminar report on ethical hacking
Ethical hacking
Hacking
Ethical Hacking
Hacking
Hacking
Ethical Hacking Powerpoint
Power Point Hacker
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
Ethical hacking
Ethical hacking presentation
Ethical hacking
Ethical Hacking

Viewers also liked (20)

PDF
Mobile Networking through Mobile IP
PPTX
Ethical Hacking JtR Presentation
PPTX
Ethical_Hacking
PPT
Course on Ehtical Hacking - Introduction
PPTX
Introduction To Ethical Hacking
PPTX
Ethical hacking presentation
PDF
Ethical hacking & Information Security
PPTX
Ethical hacking
PPTX
ETHICAL HACKING
PPTX
Ethical Hacking
PDF
Who and what is BOM?
PPTX
Parag presentation on ethical hacking
PPT
Security & ethical hacking
PPT
Ethical hacking
PPT
IMT-CDL
PDF
Fundamentos circuitos eletric
PPT
Tactical Fingerprinting using metadata, hidden info and lost data
PPTX
Jack The Ripper
PPTX
Hacking
PDF
The Ultimate Defence - Think Like a Hacker
Mobile Networking through Mobile IP
Ethical Hacking JtR Presentation
Ethical_Hacking
Course on Ehtical Hacking - Introduction
Introduction To Ethical Hacking
Ethical hacking presentation
Ethical hacking & Information Security
Ethical hacking
ETHICAL HACKING
Ethical Hacking
Who and what is BOM?
Parag presentation on ethical hacking
Security & ethical hacking
Ethical hacking
IMT-CDL
Fundamentos circuitos eletric
Tactical Fingerprinting using metadata, hidden info and lost data
Jack The Ripper
Hacking
The Ultimate Defence - Think Like a Hacker

Similar to Ethical hacking (20)

PPTX
Hacking
PPTX
PPT
Hacking
PPTX
Hacking & Attack vector
PPTX
Hacking Presentation v2 By Raffi
PPTX
Hacking
PPTX
Hacking & Hackers
PPTX
PPTX
Hacking
PPTX
Hacking Presentation
PPTX
Hacking
PPTX
Hacking
PPTX
Hacking (cs192 report )
PPTX
Ethical hacking 2016
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
Engineering report ca2_Kritakbiswas.pptx
PPTX
ethical hacking in the modern times
PPTX
1861229635078720084665000 131012131913-phpapp02
Hacking
Hacking
Hacking & Attack vector
Hacking Presentation v2 By Raffi
Hacking
Hacking & Hackers
Hacking
Hacking Presentation
Hacking
Hacking
Hacking (cs192 report )
Ethical hacking 2016
Ethical hacking
Ethical hacking
Engineering report ca2_Kritakbiswas.pptx
ethical hacking in the modern times
1861229635078720084665000 131012131913-phpapp02

Ethical hacking

  • 2. Hacking Authorized or unauthorized attempts to bypass the security mechanisms of an information system or network.
  • 3. Who is a “HACKER” ?  A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers.
  • 5. The good guys who identify the security weakness of the system or network and inform the owner about them.
  • 6. ◦ A black hat hacker is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.
  • 7. ◦ A grey hat hacker, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.
  • 8. 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|| 1 h4ck3d 1n I did not hack this page, it was like this when I hacked in.
  • 9.  To make security stronger ( Ethical Hacking ).  Just for fun.  Hack other systems secretly.  Steal important information.  Destroy enemy’s computer network.
  • 10. ETHICAL HACKING  This is a positive approach of hacking.  In this type of hacking company’s own software engineers Hack into its server and crack its password.  If the password is cracked one time nobody can crack it again so the server is kept secured.
  • 11. World’s famous hackers • Stephen Wozniac • Tsutomu Shimomura
  • 12. World’s famous hackers • Kevin Mitnick • Kevin Poulsen
  • 14. Did you know ?  Social networking sites like ‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 60% of direct or indirect hacking incidents.  The average age group of hackers are aged between 14-24 yrs. …
  • 15. Preventive measures  Install a strong anti-virus software.  Always run a anti-virus check before you download a program or a file from the internet.  Avoid disclosing personal details like phone number, credit card details to strangers.
  • 16. Thank You  PRESENTED BY  D H RU M I L K H A T R I .  V I R A L C H H A T BA R .  R I S H I T C H AU H A N .  NA K U L K A NA R .  MIRAJ THACKER.