SlideShare a Scribd company logo
2
Most read
3
Most read
14
Most read
WELCOMEWELCOME
ETHICAL HACKINGETHICAL HACKING
NAME
CLASS
What is Hacking ???What is Hacking ???
 Hacking is unauthorized use of computer andHacking is unauthorized use of computer and
network resources. (The term "hacker"network resources. (The term "hacker"
originally meant a very gifted programmer. Inoriginally meant a very gifted programmer. In
recent years though, with easier access torecent years though, with easier access to
multiple systems, it now has negativemultiple systems, it now has negative
implications.)implications.)
TypeType ofof HackersHackers
 Black-Hat Hacker-Black-Hat Hacker- A black hat hacker orA black hat hacker or
crackers are individuals with extraordinarycrackers are individuals with extraordinary
computer skillscomputer skills
 White-Hat Hacker-White-Hat Hacker- White hat hackers areWhite hat hackers are
those individuals professing hacker skillsthose individuals professing hacker skills
and using them for defensive purposeand using them for defensive purpose
 Grey-Hat Hacker-Grey-Hat Hacker- These are individuals whoThese are individuals who
work both offensively and defensively atwork both offensively and defensively at
various timesvarious times
Figure of General HackingFigure of General Hacking
What is Ethical Hacking ??What is Ethical Hacking ??
 Ethical hackingEthical hacking –– defined “methodologydefined “methodology
adopted by ethical hackers to discover theadopted by ethical hackers to discover the
harmed existing in information systems’harmed existing in information systems’
of operating environments.”of operating environments.”
 With the growth of the Internet, computerWith the growth of the Internet, computer
security has become a major concern forsecurity has become a major concern for
businesses and governments.businesses and governments.
 In their search for a way to approach theIn their search for a way to approach the
problem, organizations came to realize thatproblem, organizations came to realize that
one of the best ways to evaluate theone of the best ways to evaluate the
unwanted threat to their interests would be tounwanted threat to their interests would be to
have independent computer securityhave independent computer security
professionals attempt to break into theirprofessionals attempt to break into their
computer systems.computer systems.
Who are Ethical Hackers?Who are Ethical Hackers?
 ““One of the best ways to evaluate the intruder threat is toOne of the best ways to evaluate the intruder threat is to
have an independent computer security professionalshave an independent computer security professionals
attempt to break their computer systems”attempt to break their computer systems”
 Successful ethical hackers possess a variety of skills.Successful ethical hackers possess a variety of skills.
First and foremost, they must be completely trustworthy.First and foremost, they must be completely trustworthy.
 Ethical hackers typically have very strong programmingEthical hackers typically have very strong programming
and computer networking skills.and computer networking skills.
 They are also adept at installing and maintainingThey are also adept at installing and maintaining
systems that use the more popular operating systemssystems that use the more popular operating systems
(e.g., Linux or Windows 2000) used on target systems.(e.g., Linux or Windows 2000) used on target systems.
 These base skills are detailed knowledge of theThese base skills are detailed knowledge of the
hardware and software provided by the more popularhardware and software provided by the more popular
computer and networking hardware vendors.computer and networking hardware vendors.
What do Ethical Hackers do?What do Ethical Hackers do?
 An ethical hacker’s evaluation of a system’s securityAn ethical hacker’s evaluation of a system’s security
seeks answers to these basic questions:seeks answers to these basic questions:
 What can an intruder see on the target systems?What can an intruder see on the target systems?
 What can an intruder do with that information?What can an intruder do with that information?
 Does anyone at the target notice the intruder’s atDoes anyone at the target notice the intruder’s at
tempts or successes?tempts or successes?
 What are you trying to protect?What are you trying to protect?
 What are you trying to protect against?What are you trying to protect against?
 How much time, effort, and money are you willing toHow much time, effort, and money are you willing to
expend to obtain adequate protection?expend to obtain adequate protection?
Required Skills of an EthicalRequired Skills of an Ethical
HackerHacker
 Routers:Routers: knowledge of routers, routing protocols, andknowledge of routers, routing protocols, and
access control listsaccess control lists
 Microsoft:Microsoft: skills in operation, configuration andskills in operation, configuration and
management.management.
 Linux:Linux: knowledge of Linux/Unix; security setting,knowledge of Linux/Unix; security setting,
configuration, and services.configuration, and services.
 Firewalls:Firewalls: configurations, and operation of intrusionconfigurations, and operation of intrusion
detection systems.detection systems.
 Mainframes : knowledge of mainframes .Mainframes : knowledge of mainframes .
 Network Protocols:Network Protocols: TCP/IP; how they function and canTCP/IP; how they function and can
be manipulated.be manipulated.
 Project Management:Project Management: knowledge of leading, planning,knowledge of leading, planning,
organizing, and controlling a penetration testing team.organizing, and controlling a penetration testing team.
WORKINGWORKING
In hacking there are five steps. The actual hackingIn hacking there are five steps. The actual hacking
will be a circular one. When the five stepswill be a circular one. When the five steps
completed he start reconnaissance in that stagecompleted he start reconnaissance in that stage
and the preceding stages to get in to the nextand the preceding stages to get in to the next
level. The five steps arelevel. The five steps are
ReconnaissanceReconnaissance
Scanning & EnumerationScanning & Enumeration
Gaining accessGaining access
Maintaining accessMaintaining access
Clearing tracksClearing tracks
Future Scope of Ethical HackingFuture Scope of Ethical Hacking
 As it an evolving branch the scope of enhancement inAs it an evolving branch the scope of enhancement in
technology is immense. No ethical hacker can ensuretechnology is immense. No ethical hacker can ensure
the system security by using the same techniquethe system security by using the same technique
repeatedly. He would have to improve, develop andrepeatedly. He would have to improve, develop and
explore new avenues repeatedly.explore new avenues repeatedly.
 More enhanced software's should be used for optimumMore enhanced software's should be used for optimum
protection. Tools used, need to be updated regularly andprotection. Tools used, need to be updated regularly and
more efficient ones need to be developedmore efficient ones need to be developed
Advantage of Ethical HackingAdvantage of Ethical Hacking
 Helping in closing the open holes in the system networkHelping in closing the open holes in the system network
 Provides security to banking and financialProvides security to banking and financial
establishmentsestablishments
 Prevent website defacementsPrevent website defacements
 Fight against terrorism and national security breachesFight against terrorism and national security breaches
 Having a computer system that prevents maliciousHaving a computer system that prevents malicious
hackers from gaining accesshackers from gaining access
Disadvantage of EthicalDisadvantage of Ethical
HackingHacking
 All depends upon the trustworthiness of the ethicalAll depends upon the trustworthiness of the ethical
hackerhacker
 Hiring professionals is expensiveHiring professionals is expensive
 The ethical hacker using the knowledge they gain to doThe ethical hacker using the knowledge they gain to do
malicious hacking activitiesmalicious hacking activities
 Allowing the company’s financial and banking details toAllowing the company’s financial and banking details to
be seenbe seen
 Massive securitMassive security breachy breach
Any Questions???Any Questions???
OrOr
suggestions???suggestions???
Ethical hacking presentation

More Related Content

PPTX
Ethical hacking
PDF
Complete-Mini-Project-Report
PPTX
Ethical Hacking
PPTX
ETHICAL HACKING PPT
PPT
Ethical Hacking Powerpoint
PPTX
National Hackathon - Problem Statements
PPTX
Ethical hacking presentation
PPTX
PPT.pptx
Ethical hacking
Complete-Mini-Project-Report
Ethical Hacking
ETHICAL HACKING PPT
Ethical Hacking Powerpoint
National Hackathon - Problem Statements
Ethical hacking presentation
PPT.pptx

What's hot (20)

PPTX
Social engineering
ODP
Ethical hacking ppt
PPTX
Pen Testing Explained
PDF
Network Security Presentation
PPT
Introduction to ethical hacking
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Cybersecurity
PDF
What is Social Engineering? An illustrated presentation.
PPTX
Vulnerability assessment and penetration testing
PPTX
Ethical hacking Presentation
PDF
Ethical Hacking Tools
PPT
Ethical hacking a licence to hack
PPTX
Cyber security
PPTX
Introduction to cyber security
PPTX
Ethical hacking
PDF
Cyber security
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPTX
Penetration testing reporting and methodology
Social engineering
Ethical hacking ppt
Pen Testing Explained
Network Security Presentation
Introduction to ethical hacking
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity
What is Social Engineering? An illustrated presentation.
Vulnerability assessment and penetration testing
Ethical hacking Presentation
Ethical Hacking Tools
Ethical hacking a licence to hack
Cyber security
Introduction to cyber security
Ethical hacking
Cyber security
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Penetration testing reporting and methodology

Viewers also liked (20)

PPTX
Hacking ppt
PPTX
Hacking
PPSX
Cyber Crime and Ethical Hacking
DOCX
Full seminar report on ethical hacking
PPT
Ethical hacking
DOCX
Ethical Hacking
PPTX
Mystery behind inflation
PPTX
Cyber war a threat to indias homeland security 2015
PPTX
Top Ten Web Hacking Techniques of 2012
PPTX
National cyber security policy 2013
PPT
Indian perspective of cyber security
PPTX
Ethical Hacking
PPTX
Intel Compute stick presentation
PDF
Best practices and Government role in Cyber Security
PDF
Web Application Security Statistics Report 2016
PPTX
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PPT
Ethical Hacking
DOCX
Final report ethical hacking
PPT
Ethical Hacking and Network Security
PPTX
Ethical hacking ppt
Hacking ppt
Hacking
Cyber Crime and Ethical Hacking
Full seminar report on ethical hacking
Ethical hacking
Ethical Hacking
Mystery behind inflation
Cyber war a threat to indias homeland security 2015
Top Ten Web Hacking Techniques of 2012
National cyber security policy 2013
Indian perspective of cyber security
Ethical Hacking
Intel Compute stick presentation
Best practices and Government role in Cyber Security
Web Application Security Statistics Report 2016
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Ethical Hacking
Final report ethical hacking
Ethical Hacking and Network Security
Ethical hacking ppt

Similar to Ethical hacking presentation (20)

PPT
Ethi mini - ethical hacking
PPTX
CSSE-Ethical-Hacking-ppt.pptx
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
Cse ethical hacking ppt
PPT
CO1-Concept of ethical hacking Explained
PPTX
Ethical-Hacking-ppt.pptx
PPTX
Fundamental of ethical hacking
PPTX
ethical hacking
PPTX
Ethical Hacking
PPT
Hacking
PPTX
Jaishreeethicalhackingppt-171011183223.pptx
PPTX
Summer training in jaipur
PPTX
Presentation on Ethical Hacking ppt
PPT
Ethichack 2012
DOCX
Ethical hacking
PPTX
Ethical hacking ppt by shantanu arora
PPTX
Cyber Security PPT
PPTX
Ethical Hacking Overview
Ethi mini - ethical hacking
CSSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
CSE-Ethical-Hacking-ppt.pptx
Cse ethical hacking ppt
CO1-Concept of ethical hacking Explained
Ethical-Hacking-ppt.pptx
Fundamental of ethical hacking
ethical hacking
Ethical Hacking
Hacking
Jaishreeethicalhackingppt-171011183223.pptx
Summer training in jaipur
Presentation on Ethical Hacking ppt
Ethichack 2012
Ethical hacking
Ethical hacking ppt by shantanu arora
Cyber Security PPT
Ethical Hacking Overview

More from Georgekutty Francis (10)

DOCX
Simple self introduction in interview
DOCX
Cyber bidding gateway report on ASP .net
DOCX
Cyber bidding gateway abstract in ASP .net
DOCX
Raspberry pi on seminar documentation
PPT
Seminar Presentation on raspberry pi
DOCX
Project ara report 2
PPTX
seminar presentation on Project ara
DOCX
Holographic seminar documentation
DOCX
Intel Compute stick documentation
DOCX
Autonomic computing seminar documentation
Simple self introduction in interview
Cyber bidding gateway report on ASP .net
Cyber bidding gateway abstract in ASP .net
Raspberry pi on seminar documentation
Seminar Presentation on raspberry pi
Project ara report 2
seminar presentation on Project ara
Holographic seminar documentation
Intel Compute stick documentation
Autonomic computing seminar documentation

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Advanced IT Governance
PDF
Approach and Philosophy of On baking technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Modernizing your data center with Dell and AMD
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)
Advanced IT Governance
Approach and Philosophy of On baking technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
NewMind AI Weekly Chronicles - August'25 Week I
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
NewMind AI Monthly Chronicles - July 2025
Modernizing your data center with Dell and AMD
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Chapter 3 Spatial Domain Image Processing.pdf
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectral efficient network and resource selection model in 5G networks
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Empathic Computing: Creating Shared Understanding
Advanced Soft Computing BINUS July 2025.pdf
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
“AI and Expert System Decision Support & Business Intelligence Systems”

Ethical hacking presentation

  • 3. What is Hacking ???What is Hacking ???  Hacking is unauthorized use of computer andHacking is unauthorized use of computer and network resources. (The term "hacker"network resources. (The term "hacker" originally meant a very gifted programmer. Inoriginally meant a very gifted programmer. In recent years though, with easier access torecent years though, with easier access to multiple systems, it now has negativemultiple systems, it now has negative implications.)implications.)
  • 4. TypeType ofof HackersHackers  Black-Hat Hacker-Black-Hat Hacker- A black hat hacker orA black hat hacker or crackers are individuals with extraordinarycrackers are individuals with extraordinary computer skillscomputer skills  White-Hat Hacker-White-Hat Hacker- White hat hackers areWhite hat hackers are those individuals professing hacker skillsthose individuals professing hacker skills and using them for defensive purposeand using them for defensive purpose  Grey-Hat Hacker-Grey-Hat Hacker- These are individuals whoThese are individuals who work both offensively and defensively atwork both offensively and defensively at various timesvarious times
  • 5. Figure of General HackingFigure of General Hacking
  • 6. What is Ethical Hacking ??What is Ethical Hacking ??  Ethical hackingEthical hacking –– defined “methodologydefined “methodology adopted by ethical hackers to discover theadopted by ethical hackers to discover the harmed existing in information systems’harmed existing in information systems’ of operating environments.”of operating environments.”  With the growth of the Internet, computerWith the growth of the Internet, computer security has become a major concern forsecurity has become a major concern for businesses and governments.businesses and governments.  In their search for a way to approach theIn their search for a way to approach the problem, organizations came to realize thatproblem, organizations came to realize that one of the best ways to evaluate theone of the best ways to evaluate the unwanted threat to their interests would be tounwanted threat to their interests would be to have independent computer securityhave independent computer security professionals attempt to break into theirprofessionals attempt to break into their computer systems.computer systems.
  • 7. Who are Ethical Hackers?Who are Ethical Hackers?  ““One of the best ways to evaluate the intruder threat is toOne of the best ways to evaluate the intruder threat is to have an independent computer security professionalshave an independent computer security professionals attempt to break their computer systems”attempt to break their computer systems”  Successful ethical hackers possess a variety of skills.Successful ethical hackers possess a variety of skills. First and foremost, they must be completely trustworthy.First and foremost, they must be completely trustworthy.  Ethical hackers typically have very strong programmingEthical hackers typically have very strong programming and computer networking skills.and computer networking skills.  They are also adept at installing and maintainingThey are also adept at installing and maintaining systems that use the more popular operating systemssystems that use the more popular operating systems (e.g., Linux or Windows 2000) used on target systems.(e.g., Linux or Windows 2000) used on target systems.  These base skills are detailed knowledge of theThese base skills are detailed knowledge of the hardware and software provided by the more popularhardware and software provided by the more popular computer and networking hardware vendors.computer and networking hardware vendors.
  • 8. What do Ethical Hackers do?What do Ethical Hackers do?  An ethical hacker’s evaluation of a system’s securityAn ethical hacker’s evaluation of a system’s security seeks answers to these basic questions:seeks answers to these basic questions:  What can an intruder see on the target systems?What can an intruder see on the target systems?  What can an intruder do with that information?What can an intruder do with that information?  Does anyone at the target notice the intruder’s atDoes anyone at the target notice the intruder’s at tempts or successes?tempts or successes?  What are you trying to protect?What are you trying to protect?  What are you trying to protect against?What are you trying to protect against?  How much time, effort, and money are you willing toHow much time, effort, and money are you willing to expend to obtain adequate protection?expend to obtain adequate protection?
  • 9. Required Skills of an EthicalRequired Skills of an Ethical HackerHacker  Routers:Routers: knowledge of routers, routing protocols, andknowledge of routers, routing protocols, and access control listsaccess control lists  Microsoft:Microsoft: skills in operation, configuration andskills in operation, configuration and management.management.  Linux:Linux: knowledge of Linux/Unix; security setting,knowledge of Linux/Unix; security setting, configuration, and services.configuration, and services.  Firewalls:Firewalls: configurations, and operation of intrusionconfigurations, and operation of intrusion detection systems.detection systems.  Mainframes : knowledge of mainframes .Mainframes : knowledge of mainframes .  Network Protocols:Network Protocols: TCP/IP; how they function and canTCP/IP; how they function and can be manipulated.be manipulated.  Project Management:Project Management: knowledge of leading, planning,knowledge of leading, planning, organizing, and controlling a penetration testing team.organizing, and controlling a penetration testing team.
  • 10. WORKINGWORKING In hacking there are five steps. The actual hackingIn hacking there are five steps. The actual hacking will be a circular one. When the five stepswill be a circular one. When the five steps completed he start reconnaissance in that stagecompleted he start reconnaissance in that stage and the preceding stages to get in to the nextand the preceding stages to get in to the next level. The five steps arelevel. The five steps are ReconnaissanceReconnaissance Scanning & EnumerationScanning & Enumeration Gaining accessGaining access Maintaining accessMaintaining access Clearing tracksClearing tracks
  • 11. Future Scope of Ethical HackingFuture Scope of Ethical Hacking  As it an evolving branch the scope of enhancement inAs it an evolving branch the scope of enhancement in technology is immense. No ethical hacker can ensuretechnology is immense. No ethical hacker can ensure the system security by using the same techniquethe system security by using the same technique repeatedly. He would have to improve, develop andrepeatedly. He would have to improve, develop and explore new avenues repeatedly.explore new avenues repeatedly.  More enhanced software's should be used for optimumMore enhanced software's should be used for optimum protection. Tools used, need to be updated regularly andprotection. Tools used, need to be updated regularly and more efficient ones need to be developedmore efficient ones need to be developed
  • 12. Advantage of Ethical HackingAdvantage of Ethical Hacking  Helping in closing the open holes in the system networkHelping in closing the open holes in the system network  Provides security to banking and financialProvides security to banking and financial establishmentsestablishments  Prevent website defacementsPrevent website defacements  Fight against terrorism and national security breachesFight against terrorism and national security breaches  Having a computer system that prevents maliciousHaving a computer system that prevents malicious hackers from gaining accesshackers from gaining access
  • 13. Disadvantage of EthicalDisadvantage of Ethical HackingHacking  All depends upon the trustworthiness of the ethicalAll depends upon the trustworthiness of the ethical hackerhacker  Hiring professionals is expensiveHiring professionals is expensive  The ethical hacker using the knowledge they gain to doThe ethical hacker using the knowledge they gain to do malicious hacking activitiesmalicious hacking activities  Allowing the company’s financial and banking details toAllowing the company’s financial and banking details to be seenbe seen  Massive securitMassive security breachy breach