SlideShare a Scribd company logo
ETHICALETHICAL HACKINGHACKING
Presented By:
Manas Ranjan Das
Regd No:1121297048
Branch:ECE
1
Guided By:
Mr. Baroda Prashnna Sahoo
Dept. Of ECE
HIGHLIGHTSHIGHLIGHTS
• Introduction.
• Is hacking a crime?
• Hacking Vs Cracking.
• Why Ethical H4cking?
• Types of hackers.
• Types of Attacks.
• Security & Counter Measure.
2
INTRODUCTIONINTRODUCTION
The explosive growth of the Internet has brought many good things :
electronic commerce, easy access to vast stores of reference material,
collaborative computing, e-mail, and new avenues for advertising and
information distribution , to name a few. As with most technological
advances , there is also a dark side : criminal hackers. Governments,
companies, and private citizens around the world are anxious to be a part of
this revolution, but they are afraid that some hacker will break into their
Web server and replace their logo with pornography, read their e-mail, steal
their credit card number from an on-line shopping site, or implant software
that will secretly transmit their organization’s secrets to the open Internet.
With these concerns and others, the ethical hacker can help.
3
Is hacking a crime??Is hacking a crime??
NO NOT AT ALL
HACKING IS NOT A
CRIME 4
Hacker is a word that has two meanings:
 Traditionally, a hacker is someone who likes to
tinker with software or electronic systems. Hackers
enjoy exploring and learning how computer systems
operate. They love discovering new ways to work
electronically.
 Recently, hacker has taken on a new meaning —
someone who maliciously breaks into systems for
personal gain. Technically, these criminals are
crackers (criminal hackers).They are out for
personal gain: fame, profit, and even revenge.
5
Is hacking a crimeIs hacking a crime????
Hacking Vs CrackingHacking Vs Cracking
• Hacking with malicious intention is cracking.
• The basic difference is hackers do not do
anything disastrous.
• Cracking yield more devastating results.
• Cracking is crime.
• Cyber crime are the results of cracking ,not
hacking.
6
Why Ethical Hacking?
• It is Legal.
• Permission is obtained from the target.
• It is a part of an overall security program.
• Identify vulnerabilities visible from Internet
at particular point of time.
• Ethical hackers possesses same skills, mindset
and tools of a hacker but the attacks are
done in a non-destructive manner.
7
Types of hackersTypes of hackers
Distinction on the basis of knowledge:
 CODERS.
ADMINS.
SCRIPT KIDDES.
Distinction on the basis of legality:
WHITE HAT HACKERS.
GREY HAT HACKERS.
BLACK HAT HACKERS.
8
CODERS
• They have full
knowledge.
• They know what
exactly they are doing.
• Well aware about the
different codes.
• They have complete
idea what is going
beyond coding.
9
ADMINS
• They knows what they
are doing.
• They don’t have idea
that what exactly going
beyond codes.
• Result oriented persons
• They are not so
harmful.
10
SCRIPT KIDDESSCRIPT KIDDES
• Young in-experienced
hackers.
• Copy codes and techniques
from knowledgeable hackers
• Don’t know what’s going
beyond the coding.
• Use techniques for fun
purpose.
• Sometimes could be very
dangerous for the system.
11
WHITE HATWHITE HAT
HACKERSHACKERS
• White hat hackers are good hackers.
• They have genuine license to hack.
• They have registered police records.
• They involves themselves in good works.
• Generally owned by companies for security
designing.
• They have high pay scales.
• Generally these are coders
12
BLACK HATBLACK HAT
HACKERSHACKERS
• Black hat hackers are very dangerous persons.
• They always have motive to earn huge profit.
• These are highly paid persons.
• They evolves themselves mostly in criminal
activities.
• These could be coders, admins as well as script
kiddies.
13
GREY HATGREY HAT
HACKERSHACKERS
• Grey hat hackers are also known as red hats.
• They perform both tasks fair as well as unfair.
• Generally these are admins.
• They have little high pay than white hats.
• Generally these are not so dangerous, but
sometimes could be.
14
TYPES OF ATTACKSTYPES OF ATTACKS
 Brute force attacks.
 Buffer Overflow attacks.
 Denial of Service (DoS) attacks.
 Distributed Denial of Service (DDoS) attacks.
 Misconfigurations.
 Abuse of Trust.
 Back doors and Trojans.
15
HACKING PRONE AREASHACKING PRONE AREAS
16
17
18
SECURITY & COUNTER MEASURESECURITY & COUNTER MEASURE
• Use of anti-viruses.
• Proper logout after use of mail id.
• Manual opening browser
• Don't open spam.
• Password protected admin account.
• Always use strong password.
19
REFERENCE
• www.google.com
• www.darshangajara.wordpress.com
• www.way2project.in
20
21

More Related Content

PPTX
Mobile Device Security
PPTX
Hacking & its types
PPTX
Computer misuse and criminal law
PDF
End-to-End Analysis of a Domain Generating Algorithm Malware Family
PDF
Systems Analysis and Design 8th Edition Kendall Solutions Manual
PDF
Password Management
PDF
Lab 1 Introduction to Computer
PDF
Chapter 11 laws and ethic information security
Mobile Device Security
Hacking & its types
Computer misuse and criminal law
End-to-End Analysis of a Domain Generating Algorithm Malware Family
Systems Analysis and Design 8th Edition Kendall Solutions Manual
Password Management
Lab 1 Introduction to Computer
Chapter 11 laws and ethic information security

What's hot (20)

PPTX
Dark web presentation
PPTX
Static and Dynamic webpage
PPTX
Ethical hacking
PPTX
Offensive Payment Security
PPT
TYPES OF HACKING
PPTX
Digital arrest scam in India - A brief introduction
PPTX
Database Security, Threats & Countermeasures.pptx
PPTX
system Security
PPTX
Illuminating the dark web
ODP
Side channel attacks
PPS
Physical security.ppt
PPTX
ETHICAL HACKING PRESENTATION
PPTX
Super Market Management System
PPTX
Operating system security
PPTX
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
PPTX
Cyber Threat Simulation Training
DOCX
E farming
PDF
Secure by Design - Security Design Principles for the Rest of Us
PDF
Blockchain Security Issues and Challenges
PPTX
cyber security presentation.pptx
Dark web presentation
Static and Dynamic webpage
Ethical hacking
Offensive Payment Security
TYPES OF HACKING
Digital arrest scam in India - A brief introduction
Database Security, Threats & Countermeasures.pptx
system Security
Illuminating the dark web
Side channel attacks
Physical security.ppt
ETHICAL HACKING PRESENTATION
Super Market Management System
Operating system security
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Cyber Threat Simulation Training
E farming
Secure by Design - Security Design Principles for the Rest of Us
Blockchain Security Issues and Challenges
cyber security presentation.pptx

Viewers also liked (9)

PPT
Ethical hacking
PPT
Security & ethical hacking
PPTX
Parag presentation on ethical hacking
PPTX
Erectile Dysfunction Symptoms And Treatment
PPSX
Hacking
PPTX
ETHICAL HACKING PPT
PPTX
Introduction To Ethical Hacking
PPTX
Ethical hacking presentation
PPTX
Hacking ppt
Ethical hacking
Security & ethical hacking
Parag presentation on ethical hacking
Erectile Dysfunction Symptoms And Treatment
Hacking
ETHICAL HACKING PPT
Introduction To Ethical Hacking
Ethical hacking presentation
Hacking ppt

Similar to Ethical hacking (20)

PPTX
Ethical hacking
PPTX
Introduction of Cyber Security
PPTX
Intro
PDF
10 types of_hackers
PPTX
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
PDF
What is a Hacker (part 1): Types, tools and techniques
PPTX
Ethical Hacking (basics)
PPTX
Ethical hacking
PDF
E thical hacking
PPTX
1861229635078720084665000 131012131913-phpapp02
PPTX
ethical hacking in the modern times
PDF
hackers
PPTX
Ethical Hacking.pptx
PPTX
Arya
PPTX
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
DOCX
hacking
PPTX
Hackers ethics presentation
PPTX
Ethical Hacking & Network Security
PPTX
Hack and Crack Slide
PDF
Cyber ethics
Ethical hacking
Introduction of Cyber Security
Intro
10 types of_hackers
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
What is a Hacker (part 1): Types, tools and techniques
Ethical Hacking (basics)
Ethical hacking
E thical hacking
1861229635078720084665000 131012131913-phpapp02
ethical hacking in the modern times
hackers
Ethical Hacking.pptx
Arya
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
hacking
Hackers ethics presentation
Ethical Hacking & Network Security
Hack and Crack Slide
Cyber ethics

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Modernizing your data center with Dell and AMD
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Electronic commerce courselecture one. Pdf
PPTX
A Presentation on Artificial Intelligence
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Network Security Unit 5.pdf for BCA BBA.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
Review of recent advances in non-invasive hemoglobin estimation
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Modernizing your data center with Dell and AMD
Chapter 3 Spatial Domain Image Processing.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectral efficient network and resource selection model in 5G networks
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Electronic commerce courselecture one. Pdf
A Presentation on Artificial Intelligence
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
Reach Out and Touch Someone: Haptics and Empathic Computing
Unlocking AI with Model Context Protocol (MCP)
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Network Security Unit 5.pdf for BCA BBA.

Ethical hacking

  • 1. ETHICALETHICAL HACKINGHACKING Presented By: Manas Ranjan Das Regd No:1121297048 Branch:ECE 1 Guided By: Mr. Baroda Prashnna Sahoo Dept. Of ECE
  • 2. HIGHLIGHTSHIGHLIGHTS • Introduction. • Is hacking a crime? • Hacking Vs Cracking. • Why Ethical H4cking? • Types of hackers. • Types of Attacks. • Security & Counter Measure. 2
  • 3. INTRODUCTIONINTRODUCTION The explosive growth of the Internet has brought many good things : electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution , to name a few. As with most technological advances , there is also a dark side : criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet. With these concerns and others, the ethical hacker can help. 3
  • 4. Is hacking a crime??Is hacking a crime?? NO NOT AT ALL HACKING IS NOT A CRIME 4
  • 5. Hacker is a word that has two meanings:  Traditionally, a hacker is someone who likes to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate. They love discovering new ways to work electronically.  Recently, hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals are crackers (criminal hackers).They are out for personal gain: fame, profit, and even revenge. 5 Is hacking a crimeIs hacking a crime????
  • 6. Hacking Vs CrackingHacking Vs Cracking • Hacking with malicious intention is cracking. • The basic difference is hackers do not do anything disastrous. • Cracking yield more devastating results. • Cracking is crime. • Cyber crime are the results of cracking ,not hacking. 6
  • 7. Why Ethical Hacking? • It is Legal. • Permission is obtained from the target. • It is a part of an overall security program. • Identify vulnerabilities visible from Internet at particular point of time. • Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner. 7
  • 8. Types of hackersTypes of hackers Distinction on the basis of knowledge:  CODERS. ADMINS. SCRIPT KIDDES. Distinction on the basis of legality: WHITE HAT HACKERS. GREY HAT HACKERS. BLACK HAT HACKERS. 8
  • 9. CODERS • They have full knowledge. • They know what exactly they are doing. • Well aware about the different codes. • They have complete idea what is going beyond coding. 9
  • 10. ADMINS • They knows what they are doing. • They don’t have idea that what exactly going beyond codes. • Result oriented persons • They are not so harmful. 10
  • 11. SCRIPT KIDDESSCRIPT KIDDES • Young in-experienced hackers. • Copy codes and techniques from knowledgeable hackers • Don’t know what’s going beyond the coding. • Use techniques for fun purpose. • Sometimes could be very dangerous for the system. 11
  • 12. WHITE HATWHITE HAT HACKERSHACKERS • White hat hackers are good hackers. • They have genuine license to hack. • They have registered police records. • They involves themselves in good works. • Generally owned by companies for security designing. • They have high pay scales. • Generally these are coders 12
  • 13. BLACK HATBLACK HAT HACKERSHACKERS • Black hat hackers are very dangerous persons. • They always have motive to earn huge profit. • These are highly paid persons. • They evolves themselves mostly in criminal activities. • These could be coders, admins as well as script kiddies. 13
  • 14. GREY HATGREY HAT HACKERSHACKERS • Grey hat hackers are also known as red hats. • They perform both tasks fair as well as unfair. • Generally these are admins. • They have little high pay than white hats. • Generally these are not so dangerous, but sometimes could be. 14
  • 15. TYPES OF ATTACKSTYPES OF ATTACKS  Brute force attacks.  Buffer Overflow attacks.  Denial of Service (DoS) attacks.  Distributed Denial of Service (DDoS) attacks.  Misconfigurations.  Abuse of Trust.  Back doors and Trojans. 15
  • 16. HACKING PRONE AREASHACKING PRONE AREAS 16
  • 17. 17
  • 18. 18
  • 19. SECURITY & COUNTER MEASURESECURITY & COUNTER MEASURE • Use of anti-viruses. • Proper logout after use of mail id. • Manual opening browser • Don't open spam. • Password protected admin account. • Always use strong password. 19
  • 21. 21

Editor's Notes