SlideShare a Scribd company logo
Powerpoint TemplatesPowerpoint Templates
Page 1
ETHICA
L
HACKIN
G
Powerpoint Templates
CoNTEN
T
Overview of Hacking
Types of Hacker
Why do Hackers hack
Hacker’s Language
Hackers’ language
•
•
•
•
•
•
•
•
•
•
•
•
•
?
What is Ethical Hacking
Why do we need Ethical Hacking
Methodology of Ethical Hacking
History of cryptography
Ethical Hacking Tools
Skills of an Ethical Hacker
Page 2 2
Powerpoint Templates
oVERVIEW oF
HACKING
Hack
•
–
• Hacker
– The person who hacks
• Cracker
– System destroyer
Page 3 3
To getting into someone’s computer system without
permission in order to find out information or do something
illegal
Powerpoint Templates
TYPES oF
HACKER White Hat Hackers:
A White Hat who specializes in penetration testing and in
another testing methodologies to ensure the security of
organization's information systems.
 Black Hat Hackers:
A Black Hat is the villain or bad guy, especially in a western
black hat inmovie in which such a character would wear a
contrast to the hero's white hat.
Gray Hat Hackers:
A Grey Hat,
whose
in the hacking community, refers to a skilled
hacker activities fall somewhere between white and
black hat hackers on a variety of spectra.
Page 4 3
Powerpoint Templates
WHY Do PEoPLE HACK
To make security stronger ( Ethical
Hacking )
Just for fun
Show off
Hack other systems secretly
Notify many people their thought
Steal important information
Destroy enemy’s computer network
during the war.
Page 5
Powerpoint Templates
HACKER’
S
LANGuAGE
|| -> n
|/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
1
3
4
7
9
0
$
->
->
->
->
->
->
->
i or
e
a
t
g
o
s
l
| -> i or l
Page 6
Powerpoint Templates
HACKER’S
LANGuAGE
TRANSLATIoN
• Ex:
–1 d1d n0t h4ck th1s p4g3,
th1s wh3n 1 h4ck3d 1n
1t w4s l1k3
–I did not hack this
when I hacked in
page, it was like this
Page 7
Powerpoint Templates
What is Ethical hacking
•
•
•
•
It is Legal
Permission is obtained from the target
Part of an overall security program
Identify vulnerabilities visible from Internet at particular
point of time
Ethical hackers possesses same skills, mindset and tools•
of a hacker
manner
Also Called
but the attacks are done in a non-destructive
• – Attack & Penetration Testing
Page 8
Powerpoint Templates
Why Do
WE
nEED Ethical hacking
Social
Engineering
Automated
Organizational Attacks
Attacks
Restricted
Data
Accidental
Breaches in
Security Denial of
Viruses, Trojan Service (DoS)
Horses,
and Worms
Protection from possible External Attacks
Page 9
MEthoDology oF hacking
Phase 1-Reconna ssance
Phase 2-Scanning
Phase 3-Gaining Access
Phase 4-Maintaining Access
Phase 5-Coveri ng Tracks
Powerpoint Templates
i
Powerpoint Templates
1. Footprinting
This is the first
stage in the methodology of hacking. As given in
the analogy, this is the stage in which the hacker
collects information about the company which the
personal is going to hack.
Page 11
Powerpoint Templates
2. scanning
Scanning is the second phase in the hacking
methodology in which the hacker tries to make a
ablue print of the target network. It is similar to
thief going through your neighborhood and
checking every door and window on each house to
see which ones are open and which ones are
locked.
Page 12
Powerpoint Templates
EnuMERation
Enumeration is the ability of a hacker to convince
some servers to give
make
them information that is
vital to them to
to
an attack. By doing this
hacker aims
found
find what resources and shares
can be in the system
Page 13
Powerpoint Templates
3. gaining accEss
This is the actual hacking phase in which the
hacker gains access to the system. The hacker
will make use of all the information he collected in
the pre-attacking phases.
Page 14
Powerpoint Templates
4. Maintaining access
Now the hacker is inside the system by some
means by password guessing or exploiting some
of its vulnerabilities. This means that he is now in
a position to upload some files and download
some of them.
Page 15
Powerpoint Templates
5. covering tracks
Now we come to the final step in the hacking. There
is a saying that “everybody knows a good hacker
but nobody knows a great hacker”. This means that
a good hacker can always clear tracks or any record
that they may
he was here.
be present in the network to prove that
Page 16
Powerpoint Templates
History of cryptograpHy
• Cryptanalysis studies the process of breaking
encryption algorithms
• When a new encryption algorithm is
todeveloped,
break it
cryptanalysts study it and try
– Or prove that it is impractical to break it
(taking much time and many resources)
17
Page 17
Powerpoint Templates 19
steganograpHy
• The process of hiding data in plain view in
pictures, graphics, or text
– Example: changing colors slightly to
encode individual bits in an image
Page 19
Powerpoint Templates
syMMetric cryptograpHy
algoritHMs
Symmetric algorithms have one key that
encrypts and decrypts data
Advantages
•
•
–
–
Symmetric algorithms are fast
They are difficult to break
is used
if a large key size
– Only one key needed
20
Page 20
Powerpoint Templates
syMMetric cryptograpHy
• One key encrypts and decrypts data
• Cleartext with Key makes Ciphertext
• Ciphertext with Key makes Cleartext
21
Page 21
Winning Lotto
#s:
aWDHOP#@-w9
aWDHOP#@-w9Winning Lotto
#s:
Powerpoin Templa es
ETHICAL HACKING
TOOLS
• Samspade
Samspade is a simple tool which provides us information
about a particular host. This tool is very much helpful in finding
the addresses, phone numbers etc
• Email Tracker and Visual Route
We often used to receive many spam messages in our mailbox. We
don’t
helps
Every
know where it comes from. Email tracker is software which
us to find from which server the mail does actually came from.
message we receive will have a header associated with it. The
email tracker uses this header information for find the location.
t t
Page 22
Powerpoin Templa es
SKILLS Of AN ETHICAL
HACKEr
• Routers -
protocols
Microsoft
knowledge of routers, routing
and access control lists.
- skills in operation ,•
configuration and management.
Linux - knowledge of Linux/Unix; security
setting, configuration, and services.
•
• Firewalls - configuration, & operation
intrusion detection systems.
of
t t
Page 24
Powerpoin Templa es
Cyber Security
Cyber security is the technology and
process that is designed to protect
networks and devices from attack,
damage, or unauthorized access.
t t
Page 25 23
Powerpoin Templa es
Advantages
• Production of business.
• Increased productivity.
• Inspires customers confidence
• Stops your website from crashing.
• protection towerds customers and
client's data.
t t
Page 26 23
Powerpoin Templa es
Disadvantages
• Costs are high
t t
Page 27 23
Powerpoin Templa es
why cyber security ?
Confidentiality, Integrity and Availability
Have served as the industry standard
for computer security from the time of
first mainframes.
t t
Page 28 23
Powerpoin Templa es
How cyber security works ?
t t
Page 29 23
Powerpoin Templa es
Page 26
THANK YOU
t t
Know hacking, but no hacking

More Related Content

PPTX
Cyber Threat Hunting: Identify and Hunt Down Intruders
PPTX
What is Threat Hunting? - Panda Security
PPTX
Cyber threat intelligence: maturity and metrics
PPTX
Threat hunting foundations: People, process and technology.pptx
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PPTX
Ethical hacking Presentation
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PPTX
Internet security
Cyber Threat Hunting: Identify and Hunt Down Intruders
What is Threat Hunting? - Panda Security
Cyber threat intelligence: maturity and metrics
Threat hunting foundations: People, process and technology.pptx
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Ethical hacking Presentation
Effective Threat Hunting with Tactical Threat Intelligence
Internet security

What's hot (20)

PPTX
Social engineering
PPSX
Introduction to threat_modeling
PPTX
Introduction to Cybersecurity Fundamentals
PPTX
Cryptography
PPTX
MITRE ATT&CK framework
PPT
Malware Detection using Machine Learning
PDF
Threat Hunting Report
PPTX
Bsides 2019 - Intelligent Threat Hunting
PDF
Threat Hunting with Splunk Hands-on
PPT
Hacking And Its Prevention
PPT
All about Hacking
PPTX
DDoS ATTACKS
PPTX
ETHICAL HACKING PPT
PDF
Social engineering attacks
PPTX
Multifactor Authentication
PDF
Bug Bounty Basics
PPTX
Cyber Threat Hunting Workshop
PDF
A Threat Hunter Himself
Social engineering
Introduction to threat_modeling
Introduction to Cybersecurity Fundamentals
Cryptography
MITRE ATT&CK framework
Malware Detection using Machine Learning
Threat Hunting Report
Bsides 2019 - Intelligent Threat Hunting
Threat Hunting with Splunk Hands-on
Hacking And Its Prevention
All about Hacking
DDoS ATTACKS
ETHICAL HACKING PPT
Social engineering attacks
Multifactor Authentication
Bug Bounty Basics
Cyber Threat Hunting Workshop
A Threat Hunter Himself

Similar to Ethical hacking and cyber security intro (20)

PPT
Ethical Hacking
PPTX
How to hack or what is ethical hacking
PPTX
PPT
Introduction to ethical hacking
PPTX
Hacking
PPTX
ethical hacking.pptx
DOCX
Ethical hacking
PPTX
Ethical Hacking justvamshi .pptx
PDF
What is ethical hacking and complete cyber security presentation on this file
PPTX
Ethical Hacking
PPTX
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
PPTX
Password Stealing & Enhancing User Authentication Using Opass Protocol
PPTX
Ethical hacking
PPTX
Ethical Hacking Redefined
PPTX
Ethical hacking.pptx
PPTX
this ppt is based on ethica l hacking _
PPTX
Ethical hacking : Its methodologies and tools
PPT
Ethical Hacking
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
PPTX
sourabh_sipPPT.pptx
Ethical Hacking
How to hack or what is ethical hacking
Introduction to ethical hacking
Hacking
ethical hacking.pptx
Ethical hacking
Ethical Hacking justvamshi .pptx
What is ethical hacking and complete cyber security presentation on this file
Ethical Hacking
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Password Stealing & Enhancing User Authentication Using Opass Protocol
Ethical hacking
Ethical Hacking Redefined
Ethical hacking.pptx
this ppt is based on ethica l hacking _
Ethical hacking : Its methodologies and tools
Ethical Hacking
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
sourabh_sipPPT.pptx

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Cloud computing and distributed systems.
PDF
Approach and Philosophy of On baking technology
PDF
KodekX | Application Modernization Development
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
cuic standard and advanced reporting.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
The Rise and Fall of 3GPP – Time for a Sabbatical?
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation_ Review paper, used for researhc scholars
Cloud computing and distributed systems.
Approach and Philosophy of On baking technology
KodekX | Application Modernization Development
Programs and apps: productivity, graphics, security and other tools
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Weekly Chronicles - August'25 Week I
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Big Data Technologies - Introduction.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
cuic standard and advanced reporting.pdf
The AUB Centre for AI in Media Proposal.docx

Ethical hacking and cyber security intro

  • 2. Powerpoint Templates CoNTEN T Overview of Hacking Types of Hacker Why do Hackers hack Hacker’s Language Hackers’ language • • • • • • • • • • • • • ? What is Ethical Hacking Why do we need Ethical Hacking Methodology of Ethical Hacking History of cryptography Ethical Hacking Tools Skills of an Ethical Hacker Page 2 2
  • 3. Powerpoint Templates oVERVIEW oF HACKING Hack • – • Hacker – The person who hacks • Cracker – System destroyer Page 3 3 To getting into someone’s computer system without permission in order to find out information or do something illegal
  • 4. Powerpoint Templates TYPES oF HACKER White Hat Hackers: A White Hat who specializes in penetration testing and in another testing methodologies to ensure the security of organization's information systems.  Black Hat Hackers: A Black Hat is the villain or bad guy, especially in a western black hat inmovie in which such a character would wear a contrast to the hero's white hat. Gray Hat Hackers: A Grey Hat, whose in the hacking community, refers to a skilled hacker activities fall somewhere between white and black hat hackers on a variety of spectra. Page 4 3
  • 5. Powerpoint Templates WHY Do PEoPLE HACK To make security stronger ( Ethical Hacking ) Just for fun Show off Hack other systems secretly Notify many people their thought Steal important information Destroy enemy’s computer network during the war. Page 5
  • 6. Powerpoint Templates HACKER’ S LANGuAGE || -> n |/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x 1 3 4 7 9 0 $ -> -> -> -> -> -> -> i or e a t g o s l | -> i or l Page 6
  • 7. Powerpoint Templates HACKER’S LANGuAGE TRANSLATIoN • Ex: –1 d1d n0t h4ck th1s p4g3, th1s wh3n 1 h4ck3d 1n 1t w4s l1k3 –I did not hack this when I hacked in page, it was like this Page 7
  • 8. Powerpoint Templates What is Ethical hacking • • • • It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools• of a hacker manner Also Called but the attacks are done in a non-destructive • – Attack & Penetration Testing Page 8
  • 9. Powerpoint Templates Why Do WE nEED Ethical hacking Social Engineering Automated Organizational Attacks Attacks Restricted Data Accidental Breaches in Security Denial of Viruses, Trojan Service (DoS) Horses, and Worms Protection from possible External Attacks Page 9
  • 10. MEthoDology oF hacking Phase 1-Reconna ssance Phase 2-Scanning Phase 3-Gaining Access Phase 4-Maintaining Access Phase 5-Coveri ng Tracks Powerpoint Templates i
  • 11. Powerpoint Templates 1. Footprinting This is the first stage in the methodology of hacking. As given in the analogy, this is the stage in which the hacker collects information about the company which the personal is going to hack. Page 11
  • 12. Powerpoint Templates 2. scanning Scanning is the second phase in the hacking methodology in which the hacker tries to make a ablue print of the target network. It is similar to thief going through your neighborhood and checking every door and window on each house to see which ones are open and which ones are locked. Page 12
  • 13. Powerpoint Templates EnuMERation Enumeration is the ability of a hacker to convince some servers to give make them information that is vital to them to to an attack. By doing this hacker aims found find what resources and shares can be in the system Page 13
  • 14. Powerpoint Templates 3. gaining accEss This is the actual hacking phase in which the hacker gains access to the system. The hacker will make use of all the information he collected in the pre-attacking phases. Page 14
  • 15. Powerpoint Templates 4. Maintaining access Now the hacker is inside the system by some means by password guessing or exploiting some of its vulnerabilities. This means that he is now in a position to upload some files and download some of them. Page 15
  • 16. Powerpoint Templates 5. covering tracks Now we come to the final step in the hacking. There is a saying that “everybody knows a good hacker but nobody knows a great hacker”. This means that a good hacker can always clear tracks or any record that they may he was here. be present in the network to prove that Page 16
  • 17. Powerpoint Templates History of cryptograpHy • Cryptanalysis studies the process of breaking encryption algorithms • When a new encryption algorithm is todeveloped, break it cryptanalysts study it and try – Or prove that it is impractical to break it (taking much time and many resources) 17 Page 17
  • 18. Powerpoint Templates 19 steganograpHy • The process of hiding data in plain view in pictures, graphics, or text – Example: changing colors slightly to encode individual bits in an image Page 19
  • 19. Powerpoint Templates syMMetric cryptograpHy algoritHMs Symmetric algorithms have one key that encrypts and decrypts data Advantages • • – – Symmetric algorithms are fast They are difficult to break is used if a large key size – Only one key needed 20 Page 20
  • 20. Powerpoint Templates syMMetric cryptograpHy • One key encrypts and decrypts data • Cleartext with Key makes Ciphertext • Ciphertext with Key makes Cleartext 21 Page 21 Winning Lotto #s: aWDHOP#@-w9 aWDHOP#@-w9Winning Lotto #s:
  • 21. Powerpoin Templa es ETHICAL HACKING TOOLS • Samspade Samspade is a simple tool which provides us information about a particular host. This tool is very much helpful in finding the addresses, phone numbers etc • Email Tracker and Visual Route We often used to receive many spam messages in our mailbox. We don’t helps Every know where it comes from. Email tracker is software which us to find from which server the mail does actually came from. message we receive will have a header associated with it. The email tracker uses this header information for find the location. t t Page 22
  • 22. Powerpoin Templa es SKILLS Of AN ETHICAL HACKEr • Routers - protocols Microsoft knowledge of routers, routing and access control lists. - skills in operation ,• configuration and management. Linux - knowledge of Linux/Unix; security setting, configuration, and services. • • Firewalls - configuration, & operation intrusion detection systems. of t t Page 24
  • 23. Powerpoin Templa es Cyber Security Cyber security is the technology and process that is designed to protect networks and devices from attack, damage, or unauthorized access. t t Page 25 23
  • 24. Powerpoin Templa es Advantages • Production of business. • Increased productivity. • Inspires customers confidence • Stops your website from crashing. • protection towerds customers and client's data. t t Page 26 23
  • 25. Powerpoin Templa es Disadvantages • Costs are high t t Page 27 23
  • 26. Powerpoin Templa es why cyber security ? Confidentiality, Integrity and Availability Have served as the industry standard for computer security from the time of first mainframes. t t Page 28 23
  • 27. Powerpoin Templa es How cyber security works ? t t Page 29 23
  • 28. Powerpoin Templa es Page 26 THANK YOU t t Know hacking, but no hacking