SlideShare a Scribd company logo
Ethical hacking
Ethical hacking













The first hacker was appeared in 1960’s at the
Massachusetts Institute Of Technology(MIT)
During the 1970’s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
 In the 1980’s, phreaks started to migrate to
computers, and the first Bulletin Board
System (BBS) appeared
During the 1990’s, when the use of internet
widespread around the world, hackers
multiplied
Hacker
 Access computer system or network without
authorization
 Breaks the law
 Ethical Hacker
 Performs most of the same activities but with
owner’s permission
 Employed by companies to perform
Penetration Tests
Ethical hacking
 White Hat Hacker
 Good guys
 Don’t use their skill for illegal purpose
 Computer security experts and help to protect from
Black Hats.
 Black hack Hat Hacker
 Bad guys
 Use their skill maliciously for personal gain
 Hack banks, steal credit cards and deface websites
 Grey Hat Hacker
 It is a combination of White hat n Black Hat Hackers
 Goal of grey hat hackers is to provide national security
 Script Kiddie:
 A Script Kiddie is basically a hacker amateur who
doesn’t has much knowledge to program tools to
breaks into computer networks. He often use
downloaded hacking tools from internet written by
other hackers/security experts.
 Phreaker:
Phreaker is a telecom network hacker who
hacks a telephone system illegally to make calls
without paying for them.
Ethical hacking
Ethical hacking
 Website hacking
 Network hacking
 Email hacking
 Password hacking
 Online banking hacking
 Computer hacking
Ethical hacking
Advantages
 Provides security to banking and financial
establishments
 Prevents website defacements
 An evolving technique
 To catch a thief you have to think like a thief
Disadvantages
 All depends upon the trustworthiness of the
ethical hacker
 Hiring professionals is expensive.
Ethical hacking
Ethical hacking
 Next generation patch management tool released- Secunia
CSI 7.0
 Anonymity tool TOR gains more than 1.2 million users
since NSA PRISM Scandal
 Fear of NSA PRISM : Indian Government may ban US
email services for official Communication
 CISCO vulnerability allows remote attacker to take control
of Windows System
 New York Times. Twitter and Huffington Post Domains
hijacked by Syrian Electronic Army
 FBI uses Anonymous Hackers to attack foreign
Governments
 Palestinian Hacker , who hacked Zuckerberg’s Facebook
Account to be awarded with $12000
Ethical hacking
It is clear from the graph it is increasing day by
day.
0%
20%
40%
60%
80%
100%
2000-2003
2004-2007
2007-2010
2010-2013
Ethical hacking
Ethical hacking

More Related Content

PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPT
Cybercrime 1
PPTX
Haking PPT
PPTX
Hacking
PPT
PDF
What is Hacking? AND Types of Hackers
PPTX
Hacking
PDF
Hacking
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Cybercrime 1
Haking PPT
Hacking
What is Hacking? AND Types of Hackers
Hacking
Hacking

What's hot (20)

PPTX
PPTX
presentation on hacking
PPTX
Hacking ppt
RTF
Hacking and its types
PPT
H A C K I N Gjk,K
ODP
Ethical hacking ppt
PPTX
how to prevent system from hacking...by sarika
PPTX
Hacking & its types
PPSX
Hacking
PPTX
Sit presentation - Hacking
PPSX
Unit 1
PPTX
Hacking
PPTX
Hackers
PPTX
HACKING
PPTX
Hacking
PPT
Sit presentation
PPTX
Hacking
PPTX
Is hacking good or bad
PPTX
Hacking
PPTX
hacking and its types
presentation on hacking
Hacking ppt
Hacking and its types
H A C K I N Gjk,K
Ethical hacking ppt
how to prevent system from hacking...by sarika
Hacking & its types
Hacking
Sit presentation - Hacking
Unit 1
Hacking
Hackers
HACKING
Hacking
Sit presentation
Hacking
Is hacking good or bad
Hacking
hacking and its types

Similar to Ethical hacking (20)

PPTX
Ethicalhacking
PPT
Course on Ehtical Hacking - Introduction
PPTX
Hacking
PDF
Cyber crime and security
PPTX
Evolution of Hacking- Ronit Chakraborty .pptx
PPTX
Hacking (cs192 report )
PPTX
Hacking Presentation v2 By Raffi
PPTX
Hacking
PPTX
Professional Practices PPT Slide on Chapter 5: Crime
PPTX
PP Lec15n16 Sp2020.pptx
PPTX
Hacking
PPTX
Cyber crime
PPT
C|EH Introduction
PPTX
cyber crime.pptx
PPTX
Final ppt
PPTX
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
PPT
Hacking And Its Prevention
PPT
Hacking
Ethicalhacking
Course on Ehtical Hacking - Introduction
Hacking
Cyber crime and security
Evolution of Hacking- Ronit Chakraborty .pptx
Hacking (cs192 report )
Hacking Presentation v2 By Raffi
Hacking
Professional Practices PPT Slide on Chapter 5: Crime
PP Lec15n16 Sp2020.pptx
Hacking
Cyber crime
C|EH Introduction
cyber crime.pptx
Final ppt
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
Hacking And Its Prevention
Hacking

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
Teaching material agriculture food technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
KodekX | Application Modernization Development
PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Big Data Technologies - Introduction.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Teaching material agriculture food technology
Advanced methodologies resolving dimensionality complications for autism neur...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Network Security Unit 5.pdf for BCA BBA.
KodekX | Application Modernization Development
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectroscopy.pptx food analysis technology
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Big Data Technologies - Introduction.pptx

Ethical hacking

  • 4. The first hacker was appeared in 1960’s at the Massachusetts Institute Of Technology(MIT) During the 1970’s, a different kind of hacker appeared: Phone Phreaker or Phone Hacker  In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared During the 1990’s, when the use of internet widespread around the world, hackers multiplied
  • 5. Hacker  Access computer system or network without authorization  Breaks the law  Ethical Hacker  Performs most of the same activities but with owner’s permission  Employed by companies to perform Penetration Tests
  • 7.  White Hat Hacker  Good guys  Don’t use their skill for illegal purpose  Computer security experts and help to protect from Black Hats.  Black hack Hat Hacker  Bad guys  Use their skill maliciously for personal gain  Hack banks, steal credit cards and deface websites  Grey Hat Hacker  It is a combination of White hat n Black Hat Hackers  Goal of grey hat hackers is to provide national security
  • 8.  Script Kiddie:  A Script Kiddie is basically a hacker amateur who doesn’t has much knowledge to program tools to breaks into computer networks. He often use downloaded hacking tools from internet written by other hackers/security experts.  Phreaker: Phreaker is a telecom network hacker who hacks a telephone system illegally to make calls without paying for them.
  • 11.  Website hacking  Network hacking  Email hacking  Password hacking  Online banking hacking  Computer hacking
  • 13. Advantages  Provides security to banking and financial establishments  Prevents website defacements  An evolving technique  To catch a thief you have to think like a thief Disadvantages  All depends upon the trustworthiness of the ethical hacker  Hiring professionals is expensive.
  • 16.  Next generation patch management tool released- Secunia CSI 7.0  Anonymity tool TOR gains more than 1.2 million users since NSA PRISM Scandal  Fear of NSA PRISM : Indian Government may ban US email services for official Communication  CISCO vulnerability allows remote attacker to take control of Windows System  New York Times. Twitter and Huffington Post Domains hijacked by Syrian Electronic Army  FBI uses Anonymous Hackers to attack foreign Governments  Palestinian Hacker , who hacked Zuckerberg’s Facebook Account to be awarded with $12000
  • 18. It is clear from the graph it is increasing day by day. 0% 20% 40% 60% 80% 100% 2000-2003 2004-2007 2007-2010 2010-2013