This document discusses the concept of ethical hacking. It defines ethical hacking as testing systems for security purposes, while distinguishing it from criminal hacking. It describes different types of hackers like white hat and black hat hackers. The document then covers various hacking techniques like email hacking through phishing and keyloggers, hacking Windows systems by exploiting the SAM database, and use of trojans for remote access or data theft. Prevention methods are also highlighted for some attacks.
Related topics: