SlideShare a Scribd company logo
Ethical hacking
 WARNING :
•THIS IS PURELY FOR EDUCATIONAL
PURPOSE AND I AM NOT RESPONSIBLE IF
YOU CRCK SOMWTHING AND GO TO JAIL
FOR YEARS
HACKER
H-HIDE IP
A-AIM VICTIM
C-CRACK ENCRYPT
K-KILL FIREWALL
E-ENTER INTO DATABASE
R-RETURN ANONYMOUS
WHAT IS ETHICAL HACKING?
IT IS LEGAL
PERMISSION IS OBTAINED FROM THE TARGET
PART OF AN OVERALL SECURITY PROGRAM
IDENTIFY VULNERABILITIES VISIBLE FROM INTERNET AT PARTICULAR POINT OF
TIME
ETHICAL HACKERS POSSESSES SAME SKILLS, MINDSET AND TOOLS OF A HACKER
BUT THE ATTACKS ARE DONE IN A NON-DESTRUCTIVE MANNER
WHAT IS HACKING..?
&
WHO IS ETHICAL HACKER..?
HACKING is Nothing But an art of using some software and other
resources.
Using these skill for a good Purpose will make you an ethical
hacker and using it with bad intent will make you a malicious Hacker.
WHY DO HACKERS HACK ?
JUST FOR FUN.
SHOW OFF.
HACK OTHER SYSTEMS SECRETLY.
NOTIFY MANY PEOPLE THEIR THOUGHT.
STEAL IMPORTANT INFORMATION.
DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.
SKILLS NEEDED
TECHNICAL KNOWLEDGE.
SOFT SKILLS / SOCIAL
ENGINEERING.
 BECOMING A CERTIFIED
ETHICAL HACKER (CEH).
TYPES OF HACKING
WEBSITE HACKING
NETWORK HACKING
EMAIL HACKING
 PASSWORD HACKING
 ONLINE BANKING HACKING
 COMPUTER HACKING
ADVANTAGES OF HACKING
CAN BE USED TO RECOVER LOST INFORMATION WHERE THE
COMPUTER PASSWORD HAS BEEN LOST.
TEACHES YOU THAT NO TECHNOLOGY IS 100% SECURE.
TO TEST HOW GOOD SECURITY IS ON YOUR OWN NETWORK.
THEY CALL IT WHITE HAT COMPUTER HACKING.
DISADVANTAGES OF HACKING
CRIMINALS CAN USE IT TO THEIR ADVANTAGE.
IT CAN HARM SOMEONE'S PRIVACY
IT'S ILLEGAL
Some Famous Hacker
Ian Murphy Kevin Mitnick Johan Helsinguis
Linus Torvald Mark Abene Robert Morris
WHAT TO DO AFTER BEING HACKED?
SHUTDOWN THE SYSTEM
CLEAR THE MEMORY USING CLEANERS (LIKE CCLEANER)
SCAN INFECTED SECTIONS WITH GOOD ANTIVIRUS
SEPARATE THE SYSTEM FROM NETWORK (DO NOT USE INTERNET)
RESTORE THE SYSTEM WITH THE BACKUP (IF O/S PROBLEM)
FINALLY, CONNECT THE SYSTEM TO THE NETWORK
 Tips on how to not get hacked :
 Never entertain any pop-up windows.
Always use VIRTUAL KEYPAD to prevent keyloggers.
 Never click suspicious link of an email.
 Differentiate original link and fake links properly.
(For example :200.122.14.0/onlinesbi.com is a fake link.)
Always remain updated.
Be Careful Of What you download.
Please change your Password regularly and remember
to use alphanumeric password.
 (For Example : StRongPasswor@145.)
CONCLUSION
KEEP YOUR PASSWORD PROTECTED. WRITE YOUR PASSWORD
SHOULD BE WITH COMBINATION OF CHARACTERS, DIGITS,
SPECIAL SYMBOLS. DO NOT RESPOND TO FECK ON FISHING EMAIL.
WHEN YOU ARE DOING ANY ONLINE TRANSECTION ALWAYS KEEP
WATCH ON SITE WHETHER THE PROTOCOL OF SITE IS HTTPS &
WHETHER THERE IS A LOCK SYMBOL .
“Parctice Makes a Man Perfect”
Ethical hacking
Ethical hacking

More Related Content

PPTX
Hacking
PPTX
A survey of ethical hacking process and security
PPTX
Ethical hacking
PPTX
Hacking intro
PPT
Ethical hacking
PDF
Cybersecurity Awareness Month Tips
PPTX
Internet Threats
Hacking
A survey of ethical hacking process and security
Ethical hacking
Hacking intro
Ethical hacking
Cybersecurity Awareness Month Tips
Internet Threats

What's hot (19)

PPTX
Cyber Security
PDF
Computer Security
PPTX
Hacking Presentation
PDF
14 tips to increase cybersecurity awareness
PDF
10 most important cyber security tips for your users
PPTX
Online safety, Security, Ethics and Etiquette
PPTX
Basic Internet Security
PPTX
Hacking Vs Cracking in Computer Networks
PDF
Empowerment Technologies - Online Safety, Ethics and Etiquette
PPTX
Internet Threats
PPTX
Ethical hacking basics
PPTX
Document from Sidra Saghir Asim.pptx
PPTX
Ethical hacking
PPTX
Cybersecurity Awareness
PPTX
ID cuffs: Hackers targeting international travelers
PPTX
Internet security
PDF
15 Tips to Protect Yourself from Cyber Attacks
PPT
Understanding security and safe computing
PPTX
Ethical Hacking
Cyber Security
Computer Security
Hacking Presentation
14 tips to increase cybersecurity awareness
10 most important cyber security tips for your users
Online safety, Security, Ethics and Etiquette
Basic Internet Security
Hacking Vs Cracking in Computer Networks
Empowerment Technologies - Online Safety, Ethics and Etiquette
Internet Threats
Ethical hacking basics
Document from Sidra Saghir Asim.pptx
Ethical hacking
Cybersecurity Awareness
ID cuffs: Hackers targeting international travelers
Internet security
15 Tips to Protect Yourself from Cyber Attacks
Understanding security and safe computing
Ethical Hacking

Viewers also liked (8)

PDF
PHP Basic and Fundamental Questions and Answers with Detail Explanation
PPTX
Facebook thrift
PPTX
PPTX
Gprs architecture ppt
PPTX
Gprs ppt
PPTX
Ethical hacking presentation
DOCX
Best topics for seminar
PPTX
Hacking & its types
PHP Basic and Fundamental Questions and Answers with Detail Explanation
Facebook thrift
Gprs architecture ppt
Gprs ppt
Ethical hacking presentation
Best topics for seminar
Hacking & its types

Similar to Ethical hacking (20)

PPTX
Ethical hacking
PPTX
Hacking final
PPTX
Introduction to Cyber Security
PPTX
Ethical hacking
PPTX
Summer training in jaipur
PPTX
Ethical hacking
PPTX
Hacking Presentation v2 By Raffi
PPTX
Cyber security
PPTX
Jaishreeethicalhackingppt-171011183223.pptx
PPTX
Hacking
PPTX
Presentation on Ethical Hacking ppt
PPTX
ethical hacking
PPTX
Ethical hacking ppt by shantanu arora
PPTX
Ethical hacking
PPSX
Cyber Crime and Ethical Hacking
PPTX
Cyber Crime and Ethical Hacking
PDF
Cyber Crime and Ethical Hacking
PPTX
Hacking (1)
PDF
Hacking for Beginners The Ultimate Guide For Newbie Hackers
PPSX
Ethical Hacking, Its relevance and Its Prospects
Ethical hacking
Hacking final
Introduction to Cyber Security
Ethical hacking
Summer training in jaipur
Ethical hacking
Hacking Presentation v2 By Raffi
Cyber security
Jaishreeethicalhackingppt-171011183223.pptx
Hacking
Presentation on Ethical Hacking ppt
ethical hacking
Ethical hacking ppt by shantanu arora
Ethical hacking
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
Hacking (1)
Hacking for Beginners The Ultimate Guide For Newbie Hackers
Ethical Hacking, Its relevance and Its Prospects

Recently uploaded (20)

PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Internet___Basics___Styled_ presentation
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
Digital Literacy And Online Safety on internet
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Funds Management Learning Material for Beg
PPTX
innovation process that make everything different.pptx
PPT
tcp ip networks nd ip layering assotred slides
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
artificial intelligence overview of it and more
Slides PPTX World Game (s) Eco Economic Epochs.pptx
presentation_pfe-universite-molay-seltan.pptx
Module 1 - Cyber Law and Ethics 101.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Internet___Basics___Styled_ presentation
Triggering QUIC, presented by Geoff Huston at IETF 123
Digital Literacy And Online Safety on internet
RPKI Status Update, presented by Makito Lay at IDNOG 10
QR Codes Qr codecodecodecodecocodedecodecode
WebRTC in SignalWire - troubleshooting media negotiation
Funds Management Learning Material for Beg
innovation process that make everything different.pptx
tcp ip networks nd ip layering assotred slides
An introduction to the IFRS (ISSB) Stndards.pdf
Slides PDF The World Game (s) Eco Economic Epochs.pdf
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Cloud-Scale Log Monitoring _ Datadog.pdf
artificial intelligence overview of it and more

Ethical hacking

  • 2.  WARNING : •THIS IS PURELY FOR EDUCATIONAL PURPOSE AND I AM NOT RESPONSIBLE IF YOU CRCK SOMWTHING AND GO TO JAIL FOR YEARS
  • 3. HACKER H-HIDE IP A-AIM VICTIM C-CRACK ENCRYPT K-KILL FIREWALL E-ENTER INTO DATABASE R-RETURN ANONYMOUS
  • 4. WHAT IS ETHICAL HACKING? IT IS LEGAL PERMISSION IS OBTAINED FROM THE TARGET PART OF AN OVERALL SECURITY PROGRAM IDENTIFY VULNERABILITIES VISIBLE FROM INTERNET AT PARTICULAR POINT OF TIME ETHICAL HACKERS POSSESSES SAME SKILLS, MINDSET AND TOOLS OF A HACKER BUT THE ATTACKS ARE DONE IN A NON-DESTRUCTIVE MANNER
  • 5. WHAT IS HACKING..? & WHO IS ETHICAL HACKER..? HACKING is Nothing But an art of using some software and other resources. Using these skill for a good Purpose will make you an ethical hacker and using it with bad intent will make you a malicious Hacker.
  • 6. WHY DO HACKERS HACK ? JUST FOR FUN. SHOW OFF. HACK OTHER SYSTEMS SECRETLY. NOTIFY MANY PEOPLE THEIR THOUGHT. STEAL IMPORTANT INFORMATION. DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.
  • 7. SKILLS NEEDED TECHNICAL KNOWLEDGE. SOFT SKILLS / SOCIAL ENGINEERING.  BECOMING A CERTIFIED ETHICAL HACKER (CEH).
  • 8. TYPES OF HACKING WEBSITE HACKING NETWORK HACKING EMAIL HACKING  PASSWORD HACKING  ONLINE BANKING HACKING  COMPUTER HACKING
  • 9. ADVANTAGES OF HACKING CAN BE USED TO RECOVER LOST INFORMATION WHERE THE COMPUTER PASSWORD HAS BEEN LOST. TEACHES YOU THAT NO TECHNOLOGY IS 100% SECURE. TO TEST HOW GOOD SECURITY IS ON YOUR OWN NETWORK. THEY CALL IT WHITE HAT COMPUTER HACKING.
  • 10. DISADVANTAGES OF HACKING CRIMINALS CAN USE IT TO THEIR ADVANTAGE. IT CAN HARM SOMEONE'S PRIVACY IT'S ILLEGAL
  • 11. Some Famous Hacker Ian Murphy Kevin Mitnick Johan Helsinguis Linus Torvald Mark Abene Robert Morris
  • 12. WHAT TO DO AFTER BEING HACKED? SHUTDOWN THE SYSTEM CLEAR THE MEMORY USING CLEANERS (LIKE CCLEANER) SCAN INFECTED SECTIONS WITH GOOD ANTIVIRUS SEPARATE THE SYSTEM FROM NETWORK (DO NOT USE INTERNET) RESTORE THE SYSTEM WITH THE BACKUP (IF O/S PROBLEM) FINALLY, CONNECT THE SYSTEM TO THE NETWORK
  • 13.  Tips on how to not get hacked :  Never entertain any pop-up windows. Always use VIRTUAL KEYPAD to prevent keyloggers.  Never click suspicious link of an email.  Differentiate original link and fake links properly. (For example :200.122.14.0/onlinesbi.com is a fake link.)
  • 14. Always remain updated. Be Careful Of What you download. Please change your Password regularly and remember to use alphanumeric password.  (For Example : StRongPasswor@145.)
  • 15. CONCLUSION KEEP YOUR PASSWORD PROTECTED. WRITE YOUR PASSWORD SHOULD BE WITH COMBINATION OF CHARACTERS, DIGITS, SPECIAL SYMBOLS. DO NOT RESPOND TO FECK ON FISHING EMAIL. WHEN YOU ARE DOING ANY ONLINE TRANSECTION ALWAYS KEEP WATCH ON SITE WHETHER THE PROTOCOL OF SITE IS HTTPS & WHETHER THERE IS A LOCK SYMBOL .
  • 16. “Parctice Makes a Man Perfect”