SlideShare a Scribd company logo
Ethical hacking by chandra prakash upadhyay
Overview of Hacking.
Hacker.
Types of Hacker .
Why do Hacker hacks?
How do Hacker hacks?
Hacker’s language.
Ethical Hacking and it’s Process.
Skills of an Ethical Hackers.
Prevention of Hacking.
What should do after Hacked ?
The term “Hack” was first used by US university staff
in mid-1960s.
When eBay was first attacked in Feb-2000 it’s
server was bombarded with fake request for web
pages & overloaded the site.
A group of teenagers once hacked into AOL and stole
credit cards to buy Video Games.
In 1998,teenagers hack into Bell Atlantic phone
Hack:

Eric Raymond compiler of the “The new
Hacker’s Dictionary", defines a hacker as a
claver programmer.
A ‘good hack’ is a clever solution to a
programming problem.
Hacking:

Hacking is act of doing it.
Cracker :
A person who enjoys learning
language or system.
A person who
actually doing the
programming rather then just
about
it.
A person capable of appreciating some once
else’s Hacking.
Black hat
Hackers

White hat
Hackers.

Grey hat
Hackers.
A black hat is the villain or bad guys.
Use computer to attack systems for profit, for
revenge, or for political mitigations.
Black hat hackers always do Illegal work.
They work for black money.
They are professional in their field.
They use their knowledge for illegal purpose.
Kevin Poulsen
Kevin d mitnick
Adrain Lamo
Georje Hotz
Jonathan James
White hat hackers like Ethical hackers. They use
their skills for good purposes.
They work for organizations for stop the illegal
activities through Black Hat Hackers.
They works to ensure the security of an
Ankit Fadia
Tim Berner Lee
Bill Gates
Linus Tovaldes
Steve Jobes
Steve wozniak
To make Security Stronger (Ethical Hacking).
Just for fun.
Show off.
Hack other System secretly.
Notify many people their thoughts.
Steel important information.
Destroy enemy’s computer network during war.
E-mail Hacking.
System Hacking.
Network Hacking.
Trojans Horses.
Website Hacking.
Software Hacking.
1 ->i or l
3 ->e
4 ->a
7 ->t
9 ->g
0 ->o
$ ->s
L ->i or I

|| ->n
|V| ->m
S ->z
Z ->s
f ->ph
Ph ->f
EX:1 d1d n0t h4ck th1s p4g3, 1t w4s I1k3 th1s wh3n
1 h4ck3d 1n.(Encrypted )

I did not hack this page, it was this when I
Ethical hacking by chandra prakash upadhyay
It is legal.
Permission is obtained from the target.
Also called – Attack & penetration testing, white hat
hacking.
Part of an overall security program.
Perform most of the same activities but with owner’s
permission.
CEH
The Certified Ethical Hacker(CEH) is a
professional certification provided by the
International Council of E-commerce
consultants(EC-Council).
Ethical hacking by chandra prakash upadhyay
Information gathering
Scanning
Analyse system
Prepare for attack
Access the system
Maintaining Access
Good Coder.
Well knowledgeable person both hard ware as well as
software like:
Routers
Microsoft
Linux
Firewalls
Network protocols
Should have knowledge on security system.
Shutdown the system
Or turn off the system.
Separate the system from network
Restore the system with the backup
Or reinstall all programs.
Connect the system to the network
Ethical hacking by chandra prakash upadhyay

More Related Content

PPTX
Ethical hacking presentation
PPT
Introduction to ethical hacking
PPTX
Windows Hacking
PPTX
Cybercrime (Computer Hacking)
PPT
the best hacking ppt
PPTX
Secure Shell - a Presentation on Ethical Hacking
PPTX
Hacking and Hackers
Ethical hacking presentation
Introduction to ethical hacking
Windows Hacking
Cybercrime (Computer Hacking)
the best hacking ppt
Secure Shell - a Presentation on Ethical Hacking
Hacking and Hackers

What's hot (20)

PPTX
National information security education & awareness program
PPTX
How to hack or what is ethical hacking
PPT
Hacking Tutorial in Telugu
PPT
Ethical hacking
PPTX
ethical hacking in the modern times
PPTX
hacking presentation slide
PPT
Ethical hacking presentation_october_2006
PPT
Ethical hacking presentation
PPT
Top 10 most famous hackers of all time
PPTX
Hacking Presentation
PPT
Introduction To Ethical Hacking
PPT
Ethical Hacking
PPTX
Ethical Hacking
PPTX
Hacking
PDF
Research Paper - Hacker Plague
PPT
Basic of Ethical Hacking and Penetration Testing - 1st Module
PPT
hacking
DOCX
Ethical Hacking
PPTX
Hacking ppt
National information security education & awareness program
How to hack or what is ethical hacking
Hacking Tutorial in Telugu
Ethical hacking
ethical hacking in the modern times
hacking presentation slide
Ethical hacking presentation_october_2006
Ethical hacking presentation
Top 10 most famous hackers of all time
Hacking Presentation
Introduction To Ethical Hacking
Ethical Hacking
Ethical Hacking
Hacking
Research Paper - Hacker Plague
Basic of Ethical Hacking and Penetration Testing - 1st Module
hacking
Ethical Hacking
Hacking ppt

Similar to Ethical hacking by chandra prakash upadhyay (20)

PPTX
Ethical hacking
DOCX
Ethical hacking.
PPTX
Hacking
PDF
E thical hacking
PPT
Hacking
PPTX
Ethical hacking
DOCX
Ethical hacking
PPTX
Ethical Hacking - A Need To Know.pptx
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Hacking ppt
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
PPTX
Ethical hacking
RTF
Hacking and its types
PPTX
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
PPT
What is Ethical hacking
PPTX
Ethical Hacking (basics)
PPTX
ethical hacking.pptx
PPTX
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
this ppt is based on ethica l hacking _
Ethical hacking
Ethical hacking.
Hacking
E thical hacking
Hacking
Ethical hacking
Ethical hacking
Ethical Hacking - A Need To Know.pptx
Ethical hacking-presentation-updated(1by )Rasheed
Hacking ppt
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Ethical hacking
Hacking and its types
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
What is Ethical hacking
Ethical Hacking (basics)
ethical hacking.pptx
CSE-Ethical-Hacking-ppt.pptx
this ppt is based on ethica l hacking _

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Dropbox Q2 2025 Financial Results & Investor Presentation
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Modernizing your data center with Dell and AMD
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
A Presentation on Artificial Intelligence
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
Understanding_Digital_Forensics_Presentation.pptx

Ethical hacking by chandra prakash upadhyay

  • 2. Overview of Hacking. Hacker. Types of Hacker . Why do Hacker hacks? How do Hacker hacks? Hacker’s language. Ethical Hacking and it’s Process. Skills of an Ethical Hackers. Prevention of Hacking. What should do after Hacked ?
  • 3. The term “Hack” was first used by US university staff in mid-1960s. When eBay was first attacked in Feb-2000 it’s server was bombarded with fake request for web pages & overloaded the site. A group of teenagers once hacked into AOL and stole credit cards to buy Video Games. In 1998,teenagers hack into Bell Atlantic phone
  • 4. Hack: Eric Raymond compiler of the “The new Hacker’s Dictionary", defines a hacker as a claver programmer. A ‘good hack’ is a clever solution to a programming problem. Hacking: Hacking is act of doing it. Cracker :
  • 5. A person who enjoys learning language or system. A person who actually doing the programming rather then just about it. A person capable of appreciating some once else’s Hacking.
  • 7. A black hat is the villain or bad guys. Use computer to attack systems for profit, for revenge, or for political mitigations. Black hat hackers always do Illegal work. They work for black money. They are professional in their field. They use their knowledge for illegal purpose.
  • 8. Kevin Poulsen Kevin d mitnick Adrain Lamo Georje Hotz Jonathan James
  • 9. White hat hackers like Ethical hackers. They use their skills for good purposes. They work for organizations for stop the illegal activities through Black Hat Hackers. They works to ensure the security of an
  • 10. Ankit Fadia Tim Berner Lee Bill Gates Linus Tovaldes Steve Jobes Steve wozniak
  • 11. To make Security Stronger (Ethical Hacking). Just for fun. Show off. Hack other System secretly. Notify many people their thoughts. Steel important information. Destroy enemy’s computer network during war.
  • 12. E-mail Hacking. System Hacking. Network Hacking. Trojans Horses. Website Hacking. Software Hacking.
  • 13. 1 ->i or l 3 ->e 4 ->a 7 ->t 9 ->g 0 ->o $ ->s L ->i or I || ->n |V| ->m S ->z Z ->s f ->ph Ph ->f
  • 14. EX:1 d1d n0t h4ck th1s p4g3, 1t w4s I1k3 th1s wh3n 1 h4ck3d 1n.(Encrypted ) I did not hack this page, it was this when I
  • 16. It is legal. Permission is obtained from the target. Also called – Attack & penetration testing, white hat hacking. Part of an overall security program. Perform most of the same activities but with owner’s permission.
  • 17. CEH
  • 18. The Certified Ethical Hacker(CEH) is a professional certification provided by the International Council of E-commerce consultants(EC-Council).
  • 20. Information gathering Scanning Analyse system Prepare for attack Access the system Maintaining Access
  • 21. Good Coder. Well knowledgeable person both hard ware as well as software like: Routers Microsoft Linux Firewalls Network protocols Should have knowledge on security system.
  • 22. Shutdown the system Or turn off the system. Separate the system from network Restore the system with the backup Or reinstall all programs. Connect the system to the network