SlideShare a Scribd company logo
2
Most read
4
Most read
7
Most read
Ethical Hacking
By: Renelyn Tuazon
4CpE-1
What is Hacking?
• act of finding the possible entry points that
exist in a computer system or a computer
network and finally entering into them.
• usually done to gain unauthorized access to
a computer system or a computer network,
either to harm the systems or to steal
sensitive information available on the
computer.
• A computer expert who does the act of
hacking is called a “Hacker".
• Hackers are those who seek knowledge,
to understand how systems operate, how
they are designed, and then attempt to
play with these systems.
Ethical Hacking
• Hacking is usually legal as long as it is
being done to find weaknesses and help
identify potential threats in a computer or
network system for testing purpose. This
sort of hacking is what we call Ethical
Hacking.
• An ethical hacker attempts to bypass
system security and search for any
weak points that could be exploited by
malicious hackers.
Ethical Hacker Commandments:
• Work Ethically
• Respect Privacy
• Avoid Crashes of your Systems
Ethical Hacking - Process
Reconnaissance
• Reconnaissance is a set of
processes and techniques
used to covertly discover
and collect information
about a target system.
• refers to preparatory phase
where an attacker learns
about all of the possible
attack vectors that can be
used in their plan.
Scanning and Enumeration
• Scanning is the process
where the attacker begins
to actively probe a target
machine or network for
vulnerabilities that can be
exploited.
• Enumeration is the ability
of the hacker to convince
some servers to give them
information that is vital to
them to make an attack.
Gaining Access
• In this process, the
vulnerability is located
and you attempt to exploit
it in order to enter
into the system.
• This is the actual hacking
phase in which the
hacker gains access to
the system.
Maintaining Access
• After gaining access,
the hacker installs some
backdoors in order to
enter into the system
when he needs access
in this owned system in
future.
Clearing Tracks
• “Everybody knows a
good hacker but
nobody knows a great
hacker.”
• This process is
actually an unethical
activity. It has to do
with the deletion of
logs of all the activities
that take place during
the hacking process.
Reporting
• Reporting is the last step
of finishing the ethical
hacking process. Here the
Ethical Hacker compiles a
report with his findings
and the job that was done
such as the tools used,
the success rate,
vulnerabilities found, and
the exploit processes .
Ethical Hacking Tools
• Nmap (Network Mapper)
• Metasploit
• Burp Suite
• Angry IP Scanner
• Cain and Abel
Advantages:
• Helps in closing the open holes in the
system network
• Provides security to banking and financial
establishments
• Prevents website defacements
Disadvantages:
• All depends upon the trustworthiness of
the ethical hacker.
• Hiring professionals is expensive.
References:
• http://www.dummies.com/programming/netwo
• https://www.tutorialspoint.com/ethical_hac
king/ethical_hacking_pdf_version.htm

More Related Content

PPTX
Presentation on Ethical Hacking ppt
PPTX
Ethical hacking Presentation
PPTX
Ethical hacking
PPTX
Introduction to ethical hacking
PPTX
Ethical hacking
PPT
Ethical hacking
PPTX
ETHICAL HACKING PRESENTATION
PPTX
Ethical Hacking
Presentation on Ethical Hacking ppt
Ethical hacking Presentation
Ethical hacking
Introduction to ethical hacking
Ethical hacking
Ethical hacking
ETHICAL HACKING PRESENTATION
Ethical Hacking

What's hot (20)

ODP
Ethical hacking ppt
PPTX
Ethical hacking presentation
PPT
Introduction to ethical hacking
PPTX
Cse ethical hacking ppt
PDF
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
PPSX
Information Security and Ethical Hacking
PPTX
Ethical Hacking
PPTX
ETHICAL HACKING PPT
PPTX
Hacking
PPT
Ethical Hacking
PPT
Ethical hacking presentation
PPTX
Ethical Hacking
PPT
Ethical hacking a licence to hack
PPTX
Ethical hacking : Its methodologies and tools
PPTX
Presentation on ethical hacking
PPT
ETHICAL HACKING
PPTX
Ethical hacking
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
PPTX
Social engineering
Ethical hacking ppt
Ethical hacking presentation
Introduction to ethical hacking
Cse ethical hacking ppt
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Information Security and Ethical Hacking
Ethical Hacking
ETHICAL HACKING PPT
Hacking
Ethical Hacking
Ethical hacking presentation
Ethical Hacking
Ethical hacking a licence to hack
Ethical hacking : Its methodologies and tools
Presentation on ethical hacking
ETHICAL HACKING
Ethical hacking
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Social engineering

Viewers also liked (20)

PPTX
Introduction ethical hacking
PPTX
Introduction To Ethical Hacking
PPT
Ethical Hacking
PPTX
Ethical hacking
PPTX
Cain
PPTX
Packet sniffing in LAN
PPTX
Windows Hacking
PPT
09 Cain And Abel
PPTX
Network sniffers & injection tools
PPT
Ethical Hacking
PPTX
Hacktrikz - Introduction to Information Security & Ethical Hacking
PPT
Wireless Technology
PPT
Module 5 Sniffers
PPTX
Li fi technology - The Future Wireless Communication
PPT
Ethical Hacking
PPT
Types of Advertisement
PPTX
WIFI TECHNOLOGY
PPT
Intro To Hacking
PPTX
Wireless Poewr Transmission
PPT
Wi-fi (ppt) by Mayank Saxena
Introduction ethical hacking
Introduction To Ethical Hacking
Ethical Hacking
Ethical hacking
Cain
Packet sniffing in LAN
Windows Hacking
09 Cain And Abel
Network sniffers & injection tools
Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
Wireless Technology
Module 5 Sniffers
Li fi technology - The Future Wireless Communication
Ethical Hacking
Types of Advertisement
WIFI TECHNOLOGY
Intro To Hacking
Wireless Poewr Transmission
Wi-fi (ppt) by Mayank Saxena

Similar to Ethical Hacking Powerpoint (20)

PPTX
Ethical Hacking.pptx Hacker Presentation
PPTX
ethical hacking.pptx
PPTX
Ethical hacking
PPTX
ETHICAL HACKING BY HRITIK JAGE
PPTX
Ethical_Hacking_XP_Overview202583291.pptx
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PDF
Vulnerability assessment on cyber security
PPTX
building foundation for ethical hacking.ppt
PPT
unit 2. cyber offences_how criminals plan them.ppt
PPTX
Ethical hacking/ Penetration Testing
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
Ethical Hacking and Defense Penetration
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Ethical_Hacking engineeringsecond yr.pptx
PPTX
Ethical_Hacking
PPTX
Ethical Hacking Redefined
DOCX
Ethical hacking
PPT
Ethical Hacking
PPT
Types of attack -Part2
Ethical Hacking.pptx Hacker Presentation
ethical hacking.pptx
Ethical hacking
ETHICAL HACKING BY HRITIK JAGE
Ethical_Hacking_XP_Overview202583291.pptx
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Vulnerability assessment on cyber security
building foundation for ethical hacking.ppt
unit 2. cyber offences_how criminals plan them.ppt
Ethical hacking/ Penetration Testing
Ethical hacking
Ethical hacking
Ethical Hacking and Defense Penetration
Inetsecurity.in Ethical Hacking presentation
Ethical_Hacking engineeringsecond yr.pptx
Ethical_Hacking
Ethical Hacking Redefined
Ethical hacking
Ethical Hacking
Types of attack -Part2

Recently uploaded (20)

PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Construction Project Organization Group 2.pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Sustainable Sites - Green Building Construction
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
composite construction of structures.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Digital Logic Computer Design lecture notes
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
additive manufacturing of ss316l using mig welding
Construction Project Organization Group 2.pptx
Geodesy 1.pptx...............................................
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
OOP with Java - Java Introduction (Basics)
Sustainable Sites - Green Building Construction
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Arduino robotics embedded978-1-4302-3184-4.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Strings in CPP - Strings in C++ are sequences of characters used to store and...
composite construction of structures.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Operating System & Kernel Study Guide-1 - converted.pdf
Digital Logic Computer Design lecture notes

Ethical Hacking Powerpoint

  • 2. What is Hacking? • act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. • usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer.
  • 3. • A computer expert who does the act of hacking is called a “Hacker". • Hackers are those who seek knowledge, to understand how systems operate, how they are designed, and then attempt to play with these systems.
  • 4. Ethical Hacking • Hacking is usually legal as long as it is being done to find weaknesses and help identify potential threats in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.
  • 5. • An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers.
  • 6. Ethical Hacker Commandments: • Work Ethically • Respect Privacy • Avoid Crashes of your Systems
  • 8. Reconnaissance • Reconnaissance is a set of processes and techniques used to covertly discover and collect information about a target system. • refers to preparatory phase where an attacker learns about all of the possible attack vectors that can be used in their plan.
  • 9. Scanning and Enumeration • Scanning is the process where the attacker begins to actively probe a target machine or network for vulnerabilities that can be exploited. • Enumeration is the ability of the hacker to convince some servers to give them information that is vital to them to make an attack.
  • 10. Gaining Access • In this process, the vulnerability is located and you attempt to exploit it in order to enter into the system. • This is the actual hacking phase in which the hacker gains access to the system.
  • 11. Maintaining Access • After gaining access, the hacker installs some backdoors in order to enter into the system when he needs access in this owned system in future.
  • 12. Clearing Tracks • “Everybody knows a good hacker but nobody knows a great hacker.” • This process is actually an unethical activity. It has to do with the deletion of logs of all the activities that take place during the hacking process.
  • 13. Reporting • Reporting is the last step of finishing the ethical hacking process. Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used, the success rate, vulnerabilities found, and the exploit processes .
  • 14. Ethical Hacking Tools • Nmap (Network Mapper) • Metasploit • Burp Suite • Angry IP Scanner • Cain and Abel
  • 15. Advantages: • Helps in closing the open holes in the system network • Provides security to banking and financial establishments • Prevents website defacements
  • 16. Disadvantages: • All depends upon the trustworthiness of the ethical hacker. • Hiring professionals is expensive.

Editor's Notes

  • #4: You might want to explain or define different types of hacking (e.g Black-hat hacking, White-hat Hacking, Gray-Hat hacking, etc)
  • #5: Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed. Ethical hacking is an example of white-hat hacking. Explain why.
  • #6: This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks. You might want to identify the skills an ethical hacker should have.
  • #7: The word ethical in this context means working with high professional morals and principles. Whether you’re performing ethical hacking tests against your own systems or for someone who has hired you, everything you do as an ethical hacker must be aboveboard and must support the company’s goals. No hidden agendas allowed!  Treat the information you gather with the utmost respect. All information you obtain during your testing — from web application flaws to clear text e-mail passwords to personally identifiable information and beyond — must be kept private. One of the biggest mistakes people make when trying to hack their own systems is inadvertently crashing the systems they’re trying to keep running. Poor planning is the main cause of this mistake. These testers often misunderstand the use and power of the security tools and techniques at their disposal.
  • #15: Nmap - It is an open source tool that is used widely for network discovery and security auditing. Nmap was originally designed to scan large networks, but it can work equally well for single hosts. Network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Metasploit - one of the most powerful exploit tools. With Metasploit, you can perform the following operations: Conduct basic penetration tests on small networks, Run spot checks on the exploitability of vulnerabilities, Discover the network or import scan data and Browse exploit modules and run individual exploits on hosts. Burp Suite - a popular platform that is widely used for performing security testing of web applications. It has various tools that work in collaboration to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities. Angry IP Scanner - a lightweight, cross-platform IP address and port scanner. It can scan IP addresses in any range. It can be freely copied and used anywhere. In order to increase the scanning speed, it uses multithreaded approach, wherein a separate scanning thread is created for each scanned IP address. Cain and Abel - Cain & Abel is a password recovery tool for Microsoft Operating Systems. It helps in easy recovery of various kinds of passwords by employing any of the following methods: sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysisattacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. Cain & Abel is a useful tool for security consultants, professional penetration testers and everyone else who plans to use it for ethical reasons.