SlideShare a Scribd company logo
ETHICAL HACKING
BY CHRISTIN CHACKO JOHN
WHO IS A HACKER ?
• A security hacker is someone who seeks to
breach defenses and exploit weaknesses in a
computer system or network
• A person who enjoys learning details of a
programming language or system
• A person who enjoys actually doing
the programming rather than just
theorizing about it
• A person capable of appreciating someone
else's hacking
• A person who picks up programming
quickly
• A person who is an expert at a particular
programming language or system
TYPES OF HACKERS
Black Hat Hacker Grey Hat Hacker White Hat Hacker
Black-Hat Hacker
• A black hat hackers or crackers are individuals with
extraordinary computing skills, resorting to malicious or
destructive activities.
• That is black hat hackers use their knowledge and skill for
their own personal gains probably by hurting others.
White-Hat Hacker
• White hat hackers are those individuals professing hacker
skills and using them for defensive purposes.
• This means that the white hat hackers use their knowledge and
skill for the good of others and for the common good.
Grey-Hat Hacker
• These are individuals who work both offensively and
defensively at various times.
• We cannot predict their behavior.
• Sometimes they use their skills for the common good while in
some other times he uses them for their personal gains.
WHAT IS ethical hacking
Ethical hacking also known as penetration testing,
involves the same tools, tricks, and techniques that
hackers, but with one major difference that Ethical
hacking is legal.
• Independent computer security Professionals
breaking into the computer systems.
• Neither damage the target systems nor steal
information.
• Evaluate target systems security and report
back to owners about the vulnerabilities found.
• Reconnaissance
• Scanning & Enumeration
• Gaining access
• Maintaining access
• Clearing tracks
Methodologies of hacking
RECONNAISSANCE
The literal meaning of the word reconnaissance means a
preliminary survey to gain information. This is also known
as foot-printing. This is the first stage in the methodology
of hacking
SCANNING & ENUMERATION
Scanning is the second phase in the hacking methodology in
which the hacker tries to make a blue print of the target network.
The blue print includes the IP addresses of the target network
which are live, the services which are running on those system
and so on.
GAINING ACCESS
This is the actual hacking phase in which the hacker gains
access to the system. The hacker will make use of all the
information he collected in the pre-attacking phases. Usually the
main hindrance to gaining access to a system is the passwords.
MAINTAINING ACCESS
Now the hacker is inside the system by some means by
password guessing or exploiting some of it’s vulnerabilities. This
means that he is now in a position to upload some files and
download some of them.
The next aim will be to make an easier path to get in when he
comes the next time.
CLEARING TRACKS
Now we come to the final step in the hacking. There is a saying
that “everybody knows a good hacker but nobody knows a great
hacker”. This means that a good hacker can always clear tracks
or any record that they may be present in the network to prove
that he was here.
TYPES OF ATTACKING MODES
• Brute force attack
• Social engineering/cyber fraud
• Denial-of-Service(DoS)
• Malware attacks
• SQL Injection
• Phishing attack
• MITM attack
• Cross Site Scripting (XSS)
BRUTE FORCE ATTACK
The brute force attack will use a
specially designed software to go
through hundreds of thousands of
different words, combinations of
words and numbers to try to crack
your password
SOCIAL ENGINEERING
Social engineering is the term
used for a broad range of
malicious activities
accomplished through human
interactions. It uses
psychological manipulation to
trick users into making security
mistakes or giving away
sensitive information.
DENIAL-OF-SERVICE(DOS)
A Denial-of-Service (DoS) attack
is an attack meant to shut down a
machine or network, making it
inaccessible to its intended users.
DoS attacks accomplish this by
flooding the target with traffic, or
sending it information that triggers
a crash.
Malware attack is a type of
cyberattack in which malware
or malicious software performs
activities on the victim's
computer system, usually
without his/her knowledge
MALWARE ATTACKS
SQL INJECTION
SQL injection, also known as
SQLI, is a common attack vector
that uses malicious SQL code for
backend database manipulation
to access information that was
not intended to be displayed.
PHISHING ATTACK
Phishing is a type of social
engineering attack often used to
steal user data, including login
credentials and credit card
numbers. It occurs when an
attacker, masquerading as a
trusted entity, dupes a victim into
opening an email, instant
message, or text message.
MITM ATTACK
A man in the middle (MITM)
attack is a general term for when
a perpetrator positions himself in
a conversation between a user
and an application—either to
eavesdrop or to impersonate one
of the parties, making it appear as
if a normal exchange of
information is underway.
CROSS SITE SCRIPTING (XSS)
Cross site scripting (XSS) is a
common attack vector that
injects malicious code into a
vulnerable web application. XSS
differs from other web attack
vectors (e.g., SQL injections), in
that it does not directly target the
application itself. Instead, the
users of the web application are
the ones at risk.
WHAT IS THE NEED FOR ETHICAL HACKING?
Viruses, Trojan Horses,
and Worms
Social
Engineering
Automated
Attacks
Accidental Breaches in
Security
Denial of
Service (DoS)
Organizational
Attacks
Restricted
Data
Protection from possible External Attacks
NEED FOR ETHICAL HACKING
• ’To catch a thief you have to
think like a thief”
• Helps in closing the open
holes in the system network
• Provides security to banking
and financial establishments
• Prevents website
defacements
• An evolving technique
Required Skills of an Ethical Hacker
• Microsoft: skills in operation, configuration
and management.
• Linux: knowledge of Linux/Unix; security
setting, configuration, and services.
• Firewalls: configurations, and operation of
intrusion detection systems.
• Routers: knowledge of routers, routing
protocols, and access control lists
• Mainframes
• Network Protocols: TCP/IP; how they
function and can be manipulated.
• Project Management: leading, planning,
organizing, and controlling a penetration
testing team.
Hashcat is the world's fastest and most advanced password
recovery utility, supporting five unique modes of attack for over
200 highly-optimized hashing algorithms.
Features of Hashcat.
• World's fastest password cracker
• World's first and only in-kernel rule engine
• Free
• Open-Source (MIT License)
• Multi-OS (Linux, Windows and macOS)
What is Hashing Algorithm?
A hashing algorithm is a cryptographic
hash function. It is a mathematical
algorithm that maps data of arbitrary
size to a hash of a fixed size. It’s
designed to be a one-way function,
infeasible to invert.
1. It should be fast to compute the hash value for any kind of
data
2. It should be impossible to regenerate a message from its
hash value (brute force attack as the only option)
3. It should avoid hash collisions; each message has its own
hash.
4. Every change to a message, even the smallest one, should
change the hash value. It should be completely different. It’s
called the avalanche effect
SOME OF THE
HASHING
ALGORITHM THAT
HASHCAT CAN
BREAK
• MD4
• MD5
• Half MD5
• SHA1
• SHA2-224
• SHA2-256
GOT ANY DOUBTS AND QUESTIONS ?
THANK YOU

More Related Content

PPTX
Presentation on Ethical Hacking ppt
PPTX
password cracking using John the ripper, hashcat, Cain&abel
PPTX
Google Dorks
PDF
Searching and Sorting Techniques in Data Structure
PPTX
Linux commands
PPTX
Engineering Economy
PPTX
Metasploit
PDF
Social Engineering Attacks & Principles
Presentation on Ethical Hacking ppt
password cracking using John the ripper, hashcat, Cain&abel
Google Dorks
Searching and Sorting Techniques in Data Structure
Linux commands
Engineering Economy
Metasploit
Social Engineering Attacks & Principles

What's hot (20)

PPTX
Ethical hacking Presentation
PPTX
Introduction to Malware Analysis
PPTX
Ethical hacking
PPTX
Password Cracking
PPT
Ethical Hacking Powerpoint
PPTX
Encryption
PPTX
Ransomware Attack.pptx
PPTX
Network security (vulnerabilities, threats, and attacks)
PPT
Ethical hacking presentation
PPTX
Ethical Hacking
PPTX
ETHICAL HACKING PRESENTATION
PPTX
Web application security
PPT
Ethical hacking a licence to hack
PPTX
Understanding NMAP
PDF
Social engineering attacks
PPTX
Malware analysis
PDF
Ransomware: History, Analysis, & Mitigation - PDF
PPTX
Cyber security
PPTX
Introduction ethical hacking
Ethical hacking Presentation
Introduction to Malware Analysis
Ethical hacking
Password Cracking
Ethical Hacking Powerpoint
Encryption
Ransomware Attack.pptx
Network security (vulnerabilities, threats, and attacks)
Ethical hacking presentation
Ethical Hacking
ETHICAL HACKING PRESENTATION
Web application security
Ethical hacking a licence to hack
Understanding NMAP
Social engineering attacks
Malware analysis
Ransomware: History, Analysis, & Mitigation - PDF
Cyber security
Introduction ethical hacking

Similar to Ethical hacking : Its methodologies and tools (20)

PPTX
Ethical Hacking.pptx
PPTX
Ethical Hacking - Copy.pptx
PPT
ETHICAL HACKING
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Hacking
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
Ethical Hacking.pptx
PPTX
How to hack or what is ethical hacking
PPTX
Cse ethical hacking ppt
PPTX
Ethical hacking
PPTX
Ethical Hacking
PPTX
Ethical Hacking justvamshi .pptx
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
PPTX
Ethical hacking
PPTX
sourabh_sipPPT.pptx
PPTX
PPTX
CSSE-Ethical-Hacking-ppt.pptx
PPTX
Ethical hacking/ Penetration Testing
PPT
Hacking
Ethical Hacking.pptx
Ethical Hacking - Copy.pptx
ETHICAL HACKING
CSE-Ethical-Hacking-ppt.pptx
Inetsecurity.in Ethical Hacking presentation
Hacking
CSE-Ethical-Hacking-ppt.pptx
Ethical Hacking.pptx
How to hack or what is ethical hacking
Cse ethical hacking ppt
Ethical hacking
Ethical Hacking
Ethical Hacking justvamshi .pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Ethical hacking
sourabh_sipPPT.pptx
CSSE-Ethical-Hacking-ppt.pptx
Ethical hacking/ Penetration Testing
Hacking

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
Teaching material agriculture food technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Cloud computing and distributed systems.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25 Week I
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
20250228 LYD VKU AI Blended-Learning.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Understanding_Digital_Forensics_Presentation.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Teaching material agriculture food technology
Chapter 3 Spatial Domain Image Processing.pdf
Cloud computing and distributed systems.
Dropbox Q2 2025 Financial Results & Investor Presentation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Machine learning based COVID-19 study performance prediction

Ethical hacking : Its methodologies and tools

  • 2. WHO IS A HACKER ? • A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network • A person who enjoys learning details of a programming language or system • A person who enjoys actually doing the programming rather than just theorizing about it • A person capable of appreciating someone else's hacking • A person who picks up programming quickly • A person who is an expert at a particular programming language or system
  • 3. TYPES OF HACKERS Black Hat Hacker Grey Hat Hacker White Hat Hacker
  • 4. Black-Hat Hacker • A black hat hackers or crackers are individuals with extraordinary computing skills, resorting to malicious or destructive activities. • That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others.
  • 5. White-Hat Hacker • White hat hackers are those individuals professing hacker skills and using them for defensive purposes. • This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.
  • 6. Grey-Hat Hacker • These are individuals who work both offensively and defensively at various times. • We cannot predict their behavior. • Sometimes they use their skills for the common good while in some other times he uses them for their personal gains.
  • 7. WHAT IS ethical hacking Ethical hacking also known as penetration testing, involves the same tools, tricks, and techniques that hackers, but with one major difference that Ethical hacking is legal. • Independent computer security Professionals breaking into the computer systems. • Neither damage the target systems nor steal information. • Evaluate target systems security and report back to owners about the vulnerabilities found.
  • 8. • Reconnaissance • Scanning & Enumeration • Gaining access • Maintaining access • Clearing tracks Methodologies of hacking
  • 9. RECONNAISSANCE The literal meaning of the word reconnaissance means a preliminary survey to gain information. This is also known as foot-printing. This is the first stage in the methodology of hacking
  • 10. SCANNING & ENUMERATION Scanning is the second phase in the hacking methodology in which the hacker tries to make a blue print of the target network. The blue print includes the IP addresses of the target network which are live, the services which are running on those system and so on.
  • 11. GAINING ACCESS This is the actual hacking phase in which the hacker gains access to the system. The hacker will make use of all the information he collected in the pre-attacking phases. Usually the main hindrance to gaining access to a system is the passwords.
  • 12. MAINTAINING ACCESS Now the hacker is inside the system by some means by password guessing or exploiting some of it’s vulnerabilities. This means that he is now in a position to upload some files and download some of them. The next aim will be to make an easier path to get in when he comes the next time.
  • 13. CLEARING TRACKS Now we come to the final step in the hacking. There is a saying that “everybody knows a good hacker but nobody knows a great hacker”. This means that a good hacker can always clear tracks or any record that they may be present in the network to prove that he was here.
  • 14. TYPES OF ATTACKING MODES • Brute force attack • Social engineering/cyber fraud • Denial-of-Service(DoS) • Malware attacks • SQL Injection • Phishing attack • MITM attack • Cross Site Scripting (XSS)
  • 15. BRUTE FORCE ATTACK The brute force attack will use a specially designed software to go through hundreds of thousands of different words, combinations of words and numbers to try to crack your password
  • 16. SOCIAL ENGINEERING Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
  • 17. DENIAL-OF-SERVICE(DOS) A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.
  • 18. Malware attack is a type of cyberattack in which malware or malicious software performs activities on the victim's computer system, usually without his/her knowledge MALWARE ATTACKS
  • 19. SQL INJECTION SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.
  • 20. PHISHING ATTACK Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
  • 21. MITM ATTACK A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.
  • 22. CROSS SITE SCRIPTING (XSS) Cross site scripting (XSS) is a common attack vector that injects malicious code into a vulnerable web application. XSS differs from other web attack vectors (e.g., SQL injections), in that it does not directly target the application itself. Instead, the users of the web application are the ones at risk.
  • 23. WHAT IS THE NEED FOR ETHICAL HACKING? Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data Protection from possible External Attacks
  • 24. NEED FOR ETHICAL HACKING • ’To catch a thief you have to think like a thief” • Helps in closing the open holes in the system network • Provides security to banking and financial establishments • Prevents website defacements • An evolving technique
  • 25. Required Skills of an Ethical Hacker • Microsoft: skills in operation, configuration and management. • Linux: knowledge of Linux/Unix; security setting, configuration, and services. • Firewalls: configurations, and operation of intrusion detection systems. • Routers: knowledge of routers, routing protocols, and access control lists • Mainframes • Network Protocols: TCP/IP; how they function and can be manipulated. • Project Management: leading, planning, organizing, and controlling a penetration testing team.
  • 26. Hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. Features of Hashcat. • World's fastest password cracker • World's first and only in-kernel rule engine • Free • Open-Source (MIT License) • Multi-OS (Linux, Windows and macOS)
  • 27. What is Hashing Algorithm? A hashing algorithm is a cryptographic hash function. It is a mathematical algorithm that maps data of arbitrary size to a hash of a fixed size. It’s designed to be a one-way function, infeasible to invert.
  • 28. 1. It should be fast to compute the hash value for any kind of data 2. It should be impossible to regenerate a message from its hash value (brute force attack as the only option) 3. It should avoid hash collisions; each message has its own hash. 4. Every change to a message, even the smallest one, should change the hash value. It should be completely different. It’s called the avalanche effect
  • 29. SOME OF THE HASHING ALGORITHM THAT HASHCAT CAN BREAK • MD4 • MD5 • Half MD5 • SHA1 • SHA2-224 • SHA2-256
  • 30. GOT ANY DOUBTS AND QUESTIONS ?

Editor's Notes

  • #10: Reconnaissance Scanning & Enumeration Gaining access Maintaining access Clearing tracks
  • #11: Reconnaissance Scanning & Enumeration Gaining access Maintaining access Clearing tracks
  • #12: Reconnaissance Scanning & Enumeration Gaining access Maintaining access Clearing tracks
  • #13: Reconnaissance Scanning & Enumeration Gaining access Maintaining access Clearing tracks
  • #14: Reconnaissance Scanning & Enumeration Gaining access Maintaining access Clearing tracks
  • #15: Brute force attack Social engineering/cyber fraud Denial-of-Service(DoS) Malware attacks SQL Injection Phishing attack MITM attack Cross Site Scripting (XSS)
  • #21: Type of social engineering Login and creditials Trust enity
  • #22: Eavesdrop and impersonate
  • #23: Users are targeted Not application
  • #24: Reconnaissance Scanning & Enumeration Gaining access Maintaining access Clearing tracks