SlideShare a Scribd company logo
5
Most read
7
Most read
9
Most read
Introduction to Hacking
Ethical Hacking
Today we are going to learn:
Learning intentions
What are the five stages of hacking?
What is hacking?
What makes Ethical Hacking Different to normal hacking?
What is hacking?
Hacking is the process of identifying and exploiting weakness in a system or a network
to gain unauthorized access to data and system resources.
It can also be defined as an unauthorised intrusion into the information
systems/networks by an attacker by compromising the security.
Example of Hacking: Exploiting the weakness of default password to gain access to the
data stored inside the system.
Ethical hacking   introduction to ethical hacking
What is Ethical hacking?
Ethical Hacking sometimes called as Penetration Testing is an act of
intruding/penetrating into system or networks to find out threats,
vulnerabilities in systems where attackers may be interested in.
The purpose of ethical hacking is to improve the security of the network or
systems by fixing the vulnerabilities found during testing.
Ethical hackers may use the same methods and tools used by the malicious
hackers but with the permission from the company or person, for the
purpose of improving the security and defending the systems from attacks.
Ethical hacking   introduction to ethical hacking
Stages of Hacking
Stage 1
Reconnaissance
Stage 2
Scanning
Stage 3
Gaining Access
Stage 4
Maintaining Access
Stage 5
Clearing Track
Stage 1 - Reconnaissance
This is the first step of Hacking. It is also called information gathering Phase.
This is the phase where we collect as much information as possible about the target.
We usually collect information about three groups,
• Network
• Host
• People involved
There are two types of information gathering:
• Active: Directly interacting with the target to gather information about the target.
Eg Using Nmap tool to scan the target
• Passive: Trying to collect the information about the target without directly
accessing the target. This involves collecting information from social media, public
websites etc.
Stage 2 - Scanning
Three types of scanning are involved:
• Port scanning: This phase involves scanning the target for the information like open
ports, Live systems, various services running on the host.
• Vulnerability Scanning: Checking the target for weaknesses or vulnerabilities which
can be exploited. Usually done with help of automated tools
• Network Mapping: Finding out which computer is linked to what part of the
network and where it is physically located is a very important piece of information.
Stage 3 – Gaining
Access
This phase is where an attacker breaks into the system/network using various tools or
methods.
After entering a system, they must increase their privilege to administrator level so
they can install an application they needs or modify data or hide data.
Stage 4 – Maintaining Access
Hacker may just hack the system to show it was vulnerable or he can be so
mischievous that he wants to maintain or persist the connection in the background
without the knowledge of the user.
This can be done using Trojans, Rootkits or other malicious files.
The aim is to maintain the access to the target until he finishes the tasks he planned to
accomplish in that target.
Stage 5 – Clearing Tracks
No thief wants to get caught. An intelligent hacker always clears all evidence so that in
the later point of time, no one will find any traces leading to them.
This involves modifying/corrupting/deleting the values of Logs, modifying registry
values and uninstalling all applications they used and deleting all folders they created.

More Related Content

PPTX
ETHICAL HACKING PRESENTATION
PPSX
Information Security and Ethical Hacking
PPTX
Ethical hacking
PPTX
Ethical Hacking
PPTX
Ethical hacking
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Ethical hacking
PPTX
Ethical hacking
ETHICAL HACKING PRESENTATION
Information Security and Ethical Hacking
Ethical hacking
Ethical Hacking
Ethical hacking
Inetsecurity.in Ethical Hacking presentation
Ethical hacking
Ethical hacking

What's hot (20)

PDF
Ethical hacking and social engineering
PPT
Ethical hacking
PPT
All about Hacking
PPTX
Social engineering
PPTX
CYBER SECURITY
PDF
Social Engineering Attacks & Principles
PPTX
Cyber crime and security
PDF
Cyber Security
PPTX
Social engineering
PPT
Ethical Hacking Powerpoint
PPTX
Web application security: Threats & Countermeasures
PPTX
Footprinting and reconnaissance
PDF
Ethical Hacking Tools
PPT
ETHICAL HACKING
PPTX
Cyber security
PDF
Hackers and cyber crimes
PPTX
Types of Cyber Attacks
PPSX
Brute force attack
PPTX
Social engineering
Ethical hacking and social engineering
Ethical hacking
All about Hacking
Social engineering
CYBER SECURITY
Social Engineering Attacks & Principles
Cyber crime and security
Cyber Security
Social engineering
Ethical Hacking Powerpoint
Web application security: Threats & Countermeasures
Footprinting and reconnaissance
Ethical Hacking Tools
ETHICAL HACKING
Cyber security
Hackers and cyber crimes
Types of Cyber Attacks
Brute force attack
Social engineering

Similar to Ethical hacking introduction to ethical hacking (20)

PPTX
Ethical hacking introduction to ethical hacking
DOCX
Ethical hacking
PPTX
phases_of_hacking_explained_in_brief.pptx
PPTX
Introduction ethical hacking
PPTX
ethical hacking
PPTX
Ethical hacking
PPTX
Ethical Hacking
PPTX
Ethical hacking
PPT
Module 1 Introduction
PPTX
Ethical Hacking Overview
PDF
Lec_11_Introduction to Cyber Security.pdf
PPT
Introduction to ethical hacking
PPT
Hacking
PPTX
Ethical hacking : Its methodologies and tools
PPTX
Ethical hacking
PPTX
Ethical Hacking.pptx
PPTX
Ethical hacking
PPT
Introduction To Ethical Hacking
PPT
Introduction TO Ethical Hacking
PPTX
Offensive Security basics part 1
Ethical hacking introduction to ethical hacking
Ethical hacking
phases_of_hacking_explained_in_brief.pptx
Introduction ethical hacking
ethical hacking
Ethical hacking
Ethical Hacking
Ethical hacking
Module 1 Introduction
Ethical Hacking Overview
Lec_11_Introduction to Cyber Security.pdf
Introduction to ethical hacking
Hacking
Ethical hacking : Its methodologies and tools
Ethical hacking
Ethical Hacking.pptx
Ethical hacking
Introduction To Ethical Hacking
Introduction TO Ethical Hacking
Offensive Security basics part 1

More from missstevenson01 (20)

PPTX
S3 environment
PPTX
The Processor.pptx
PPTX
How Computers Work
PPTX
Lesson 3 - Coding with Minecraft - Variables.pptx
PPTX
Lesson 2 - Coding with Minecraft - Events.pptx
PPTX
Lesson 1 - Coding with Minecraft -Introduction.pptx
PPTX
Lesson2 - Coding with Minecraft - Events.pptx
PPTX
Ethical hacking trojans, worms and spyware
PPTX
Ethical hacking anti virus
PPTX
S1 internet safety-chattingonline
PPTX
S3 wireframe diagrams
PPTX
Alien database
PPTX
Video Games and Copyright laws
PPTX
Games Design Document
PPTX
Video game proposal
PPTX
Evaluation
PPTX
H evaluation
PPTX
H testing and debugging
PPTX
H file handling
S3 environment
The Processor.pptx
How Computers Work
Lesson 3 - Coding with Minecraft - Variables.pptx
Lesson 2 - Coding with Minecraft - Events.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptx
Lesson2 - Coding with Minecraft - Events.pptx
Ethical hacking trojans, worms and spyware
Ethical hacking anti virus
S1 internet safety-chattingonline
S3 wireframe diagrams
Alien database
Video Games and Copyright laws
Games Design Document
Video game proposal
Evaluation
H evaluation
H testing and debugging
H file handling

Recently uploaded (20)

PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Computing-Curriculum for Schools in Ghana
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Cell Structure & Organelles in detailed.
PPTX
Lesson notes of climatology university.
PPTX
master seminar digital applications in india
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Insiders guide to clinical Medicine.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
GDM (1) (1).pptx small presentation for students
TR - Agricultural Crops Production NC III.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Computing-Curriculum for Schools in Ghana
O7-L3 Supply Chain Operations - ICLT Program
Cell Structure & Organelles in detailed.
Lesson notes of climatology university.
master seminar digital applications in india
2.FourierTransform-ShortQuestionswithAnswers.pdf
01-Introduction-to-Information-Management.pdf
Anesthesia in Laparoscopic Surgery in India
Insiders guide to clinical Medicine.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Microbial disease of the cardiovascular and lymphatic systems
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

Ethical hacking introduction to ethical hacking

  • 2. Today we are going to learn: Learning intentions What are the five stages of hacking? What is hacking? What makes Ethical Hacking Different to normal hacking?
  • 3. What is hacking? Hacking is the process of identifying and exploiting weakness in a system or a network to gain unauthorized access to data and system resources. It can also be defined as an unauthorised intrusion into the information systems/networks by an attacker by compromising the security. Example of Hacking: Exploiting the weakness of default password to gain access to the data stored inside the system.
  • 5. What is Ethical hacking? Ethical Hacking sometimes called as Penetration Testing is an act of intruding/penetrating into system or networks to find out threats, vulnerabilities in systems where attackers may be interested in. The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. Ethical hackers may use the same methods and tools used by the malicious hackers but with the permission from the company or person, for the purpose of improving the security and defending the systems from attacks.
  • 7. Stages of Hacking Stage 1 Reconnaissance Stage 2 Scanning Stage 3 Gaining Access Stage 4 Maintaining Access Stage 5 Clearing Track
  • 8. Stage 1 - Reconnaissance This is the first step of Hacking. It is also called information gathering Phase. This is the phase where we collect as much information as possible about the target. We usually collect information about three groups, • Network • Host • People involved There are two types of information gathering: • Active: Directly interacting with the target to gather information about the target. Eg Using Nmap tool to scan the target • Passive: Trying to collect the information about the target without directly accessing the target. This involves collecting information from social media, public websites etc.
  • 9. Stage 2 - Scanning Three types of scanning are involved: • Port scanning: This phase involves scanning the target for the information like open ports, Live systems, various services running on the host. • Vulnerability Scanning: Checking the target for weaknesses or vulnerabilities which can be exploited. Usually done with help of automated tools • Network Mapping: Finding out which computer is linked to what part of the network and where it is physically located is a very important piece of information.
  • 10. Stage 3 – Gaining Access This phase is where an attacker breaks into the system/network using various tools or methods. After entering a system, they must increase their privilege to administrator level so they can install an application they needs or modify data or hide data.
  • 11. Stage 4 – Maintaining Access Hacker may just hack the system to show it was vulnerable or he can be so mischievous that he wants to maintain or persist the connection in the background without the knowledge of the user. This can be done using Trojans, Rootkits or other malicious files. The aim is to maintain the access to the target until he finishes the tasks he planned to accomplish in that target.
  • 12. Stage 5 – Clearing Tracks No thief wants to get caught. An intelligent hacker always clears all evidence so that in the later point of time, no one will find any traces leading to them. This involves modifying/corrupting/deleting the values of Logs, modifying registry values and uninstalling all applications they used and deleting all folders they created.