Ethical Hacking
Afaq Mansoor Khan
Content
● Introduction
● Ethical Hackers
● What do Ethical Hackers do?
● Ethical Hacking Process
● Why do We need Ethical Hacking
● Required Skills
● Advantages
● Disadvantages
● Conclusion
Introduction
● Ethical hacking also known as penetration testing or white-hat hacking, involves
the same tools, tricks, and techniques that hackers use, but with one major
difference that Ethical hacking is legal.
● It focuses on authorized attempts to gain unauthorized access to systems and
find vulnerabilities. Ethical hacking is done with the legal permission of a
company to test and increase the security of its systems and networks.
What do Ethical Hackers do?
● Independent computer security Professionals breaking into the computer
systems.
● Neither damage the target systems nor steal information.
● Evaluate target systems security and report back to owners about the bugs
found
● They use their skills to improve the security of networks, systems, and
applications, utilizing different methods to exploit computer systems and
discover vulnerabilities.
Ethical Hacking Process
● Foot Printing
○ NS lookup
○ IP lookup
● Scanning
○ Port Scanning
○ Network Scanning
● Gaining Access
○ Password Attacks
○ Social Engineering
● Maintaining Access
○ Os BackDoors
○ Trojans
Why do we need Ethical Hacking?
Why are Ethical Hackers in Demand?
● The world is changing — technology is growing, organizations are expanding,
and malicious attacks are increasing.
● However, there is still a lack of professional ethical hackers who can think
critically and have problem-solving skills. Governments and organizations need
experts who are familiar with ethical hacking methods to secure networks and
data.
● An ethical hacker should have the ability to resolve issues before it becomes a
danger, and provide the best security practices.
Required Skills
● Good programming skills (HTML, JSP, Java, Python)
● Be able to resolve problems related to asset security.
● Deep understanding of operating systems, firewalls, and file systems.
● Knowledge about databases and their operations.
● You should understand what is ethically right and what is ethically wrong. Basic
knowledge of networking is also a must.
Advantages
● To catch a thief you have to think like a thief.
● Helps in closing the open holes in the system network.
● Provides security to banking and financial establishments.
● Prevents website defacements.
● An evolving technique.
Disadvantages
● All depends upon the trustworthiness of the ethical hacker
● Hiring professionals is expensive.
Carrier Opportunities
● Security Analyst
● IT Security Administrator
● Cyber Defense Analyst
● System Security Administrator
● Information Security Manager
● Cybersecurity Consultant
● Security Compliance Analyst
Conclusion
● In the preceding sections we saw the methodology of hacking, why should we
aware of hacking and some tools which a hacker may use.
● Now we can see what can we do against hacking or to protect ourselves from
hacking.
● The first thing we should do is to keep ourselves updated about those
software’s we and using for official and reliable sources.
● Educate the employees and the users against black hat hacking.
References
● https://www.tutorialspoint.com/
● https://www.wikipedia.org/
Thank You!

More Related Content

PPTX
EthicalHacking_AakashTakale
PPT
Ethical hacking
PPTX
Ethical Hacking Tools & Techniques
PPTX
Ethical hacking
PPTX
Atm sequrity
PDF
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
ODP
Unlock Security Insight from Machine Data
PPT
Introduction To Ethical Hacking
EthicalHacking_AakashTakale
Ethical hacking
Ethical Hacking Tools & Techniques
Ethical hacking
Atm sequrity
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
Unlock Security Insight from Machine Data
Introduction To Ethical Hacking

What's hot (20)

PPT
Hacking and its terms
PPT
Risky project Enterprise
PPTX
ethical Hacking [007]
PPTX
Ethical hacking
PPTX
Ethical Hacking
PPTX
Ethical hacking11601031 (1)
PPT
Ethical hacking
PPT
Risk Based Software Planning
PDF
Security and Penetration Testing Overview
PDF
Enterprise 360 degree risk management
PDF
Automated tools for security, the challenge 2.0?
PPTX
Hacking
PPTX
Ethical Hacking
PPT
3.Secure Design Principles And Process
PPT
Ethical Hacking
PPTX
Intruders and Intrusion detection in Cryptosystems
PPTX
Secure Software Development
PPTX
Security is sim
PDF
Data security in the age of GDPR – most common data security problems
PPTX
Ethical Hacking (basics)
Hacking and its terms
Risky project Enterprise
ethical Hacking [007]
Ethical hacking
Ethical Hacking
Ethical hacking11601031 (1)
Ethical hacking
Risk Based Software Planning
Security and Penetration Testing Overview
Enterprise 360 degree risk management
Automated tools for security, the challenge 2.0?
Hacking
Ethical Hacking
3.Secure Design Principles And Process
Ethical Hacking
Intruders and Intrusion detection in Cryptosystems
Secure Software Development
Security is sim
Data security in the age of GDPR – most common data security problems
Ethical Hacking (basics)

Similar to Ethical Hacking - An Overview (20)

PPTX
Ethical Hacking and Cyber Security for Beginners
PPTX
this ppt is based on ethica l hacking _
PDF
Ethical Hacker Training.pdf
PPTX
Introduction-to-Ethical-Hacking and Terminologies.pptx
PPTX
Ethical hacking BY Thariq ibnu Ubaidhullah
PDF
🔐 Ethical Hacking Lifecycle_ A Beginner’s Guide to Cybersecurity’s First Line...
PPTX
Ethical Hacking.pptx
PPTX
CSSE-Ethical-Hacking-ppt.pptx
PDF
Ethical hacking: Safeguarding your digital world.
PPTX
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
PPTX
Ethical Hacking.pptx
PPTX
Ethical Hacking Course in Delhi
PPTX
Ethical hacking
PPTX
What is penetration testing and career path
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
PPTX
Ethical Hacking.pptx Hacker Presentation
PPTX
Ethical hacking ppt by shantanu arora
PPTX
Ethical hacking.pptx
PPTX
Ethical Hacking Training in Noida
PPTX
Jaishreeethicalhackingppt-171011183223.pptx
Ethical Hacking and Cyber Security for Beginners
this ppt is based on ethica l hacking _
Ethical Hacker Training.pdf
Introduction-to-Ethical-Hacking and Terminologies.pptx
Ethical hacking BY Thariq ibnu Ubaidhullah
🔐 Ethical Hacking Lifecycle_ A Beginner’s Guide to Cybersecurity’s First Line...
Ethical Hacking.pptx
CSSE-Ethical-Hacking-ppt.pptx
Ethical hacking: Safeguarding your digital world.
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
Ethical Hacking.pptx
Ethical Hacking Course in Delhi
Ethical hacking
What is penetration testing and career path
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Ethical Hacking.pptx Hacker Presentation
Ethical hacking ppt by shantanu arora
Ethical hacking.pptx
Ethical Hacking Training in Noida
Jaishreeethicalhackingppt-171011183223.pptx

More from Afaq Mansoor Khan (20)

PPTX
Feature Selection - Natural Language Processing
PPTX
WiFi vs LiFi - A Comparison
PPTX
Role of Electronic Media in Pakistan
PPTX
Agile Testing - Approach and Strategies
PPTX
Software Architecture Design Decisions
PPTX
How to Design an Algorithm
PPTX
Software Quality Qssurance, Scrum and Linkedin
PPTX
Quick sort
PPTX
.Physics presentation - Asteroids
PPTX
Graph Data Structure
PPTX
AVL Tree Data Structure
PPTX
Binary tree
PPTX
Queue Data Structure
PPTX
Prefix, Infix and Post-fix Notations
PPTX
Stack Data Structure
PPTX
Doubly & Circular Linked Lists
PPTX
Linked List - Insertion & Deletion
PPTX
Dynamic Memory & Linked Lists
PPTX
Sorting Algorithms
PPTX
Recursion and Sorting Algorithms
Feature Selection - Natural Language Processing
WiFi vs LiFi - A Comparison
Role of Electronic Media in Pakistan
Agile Testing - Approach and Strategies
Software Architecture Design Decisions
How to Design an Algorithm
Software Quality Qssurance, Scrum and Linkedin
Quick sort
.Physics presentation - Asteroids
Graph Data Structure
AVL Tree Data Structure
Binary tree
Queue Data Structure
Prefix, Infix and Post-fix Notations
Stack Data Structure
Doubly & Circular Linked Lists
Linked List - Insertion & Deletion
Dynamic Memory & Linked Lists
Sorting Algorithms
Recursion and Sorting Algorithms

Recently uploaded (20)

PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
Exploring The Internet Of Things(IOT).ppt
PDF
Course Overview and Agenda cloud security
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPT
250152213-Excitation-SystemWERRT (1).ppt
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPT
12 Things That Make People Trust a Website Instantly
PPTX
Reading as a good Form of Recreation
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
Database Information System - Management Information System
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Exploring The Internet Of Things(IOT).ppt
Course Overview and Agenda cloud security
Layers_of_the_Earth_Grade7.pptx class by
250152213-Excitation-SystemWERRT (1).ppt
artificialintelligenceai1-copy-210604123353.pptx
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Mathew Digital SEO Checklist Guidlines 2025
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
newyork.pptxirantrafgshenepalchinachinane
12 Things That Make People Trust a Website Instantly
Reading as a good Form of Recreation
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
Alethe Consulting Corporate Profile and Solution Aproach
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
t_and_OpenAI_Combined_two_pressentations
Database Information System - Management Information System
Uptota Investor Deck - Where Africa Meets Blockchain

Ethical Hacking - An Overview

  • 2. Content ● Introduction ● Ethical Hackers ● What do Ethical Hackers do? ● Ethical Hacking Process ● Why do We need Ethical Hacking ● Required Skills ● Advantages ● Disadvantages ● Conclusion
  • 3. Introduction ● Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. ● It focuses on authorized attempts to gain unauthorized access to systems and find vulnerabilities. Ethical hacking is done with the legal permission of a company to test and increase the security of its systems and networks.
  • 4. What do Ethical Hackers do? ● Independent computer security Professionals breaking into the computer systems. ● Neither damage the target systems nor steal information. ● Evaluate target systems security and report back to owners about the bugs found ● They use their skills to improve the security of networks, systems, and applications, utilizing different methods to exploit computer systems and discover vulnerabilities.
  • 5. Ethical Hacking Process ● Foot Printing ○ NS lookup ○ IP lookup ● Scanning ○ Port Scanning ○ Network Scanning ● Gaining Access ○ Password Attacks ○ Social Engineering ● Maintaining Access ○ Os BackDoors ○ Trojans
  • 6. Why do we need Ethical Hacking?
  • 7. Why are Ethical Hackers in Demand? ● The world is changing — technology is growing, organizations are expanding, and malicious attacks are increasing. ● However, there is still a lack of professional ethical hackers who can think critically and have problem-solving skills. Governments and organizations need experts who are familiar with ethical hacking methods to secure networks and data. ● An ethical hacker should have the ability to resolve issues before it becomes a danger, and provide the best security practices.
  • 8. Required Skills ● Good programming skills (HTML, JSP, Java, Python) ● Be able to resolve problems related to asset security. ● Deep understanding of operating systems, firewalls, and file systems. ● Knowledge about databases and their operations. ● You should understand what is ethically right and what is ethically wrong. Basic knowledge of networking is also a must.
  • 9. Advantages ● To catch a thief you have to think like a thief. ● Helps in closing the open holes in the system network. ● Provides security to banking and financial establishments. ● Prevents website defacements. ● An evolving technique.
  • 10. Disadvantages ● All depends upon the trustworthiness of the ethical hacker ● Hiring professionals is expensive.
  • 11. Carrier Opportunities ● Security Analyst ● IT Security Administrator ● Cyber Defense Analyst ● System Security Administrator ● Information Security Manager ● Cybersecurity Consultant ● Security Compliance Analyst
  • 12. Conclusion ● In the preceding sections we saw the methodology of hacking, why should we aware of hacking and some tools which a hacker may use. ● Now we can see what can we do against hacking or to protect ourselves from hacking. ● The first thing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources. ● Educate the employees and the users against black hat hacking.