SlideShare a Scribd company logo
Ethicalhacking
WHAT IS SECURITY
 Security is the degree of resistance to, or
protection from, harm.
It is the state of being free from danger or
threat.
Difference Between Security and Protection
Security and protection are extremely close
concepts though not same.
 Security measures are adopted to increase
the level of protection
The feeling of protection arises when one
has enough security measures
Security is a type of protection against
external threats.
Overview of Hacking
 Hack
 Examine something very minutely
 The rapid crafting of new program or the making
of changes to existing, usually complicated
software
 Hacker
 The person who hacks
 Cracker
 System intruder/ destroyer
History Of Hacking
The first hacker was appeared in 1960’s at the
Massachusetts Institute Of Technology(MIT)
During the 1970’s, a different kind of hacker appeared:
Phone Phreaker or Phone Hacker
 In the 1980’s, phreaks started to migrate to
computers, and the first Bulletin Board System (BBS)
appeared
 During the 1990’s, when the use of internet
widespread around the world, hackers multiplied
Hacker and Ethical Hacker
 Hacker
 Access computer system or network without
authorization
 Breaks the law
 Ethical Hacker
 Performs most of the same activities but with owner’s
permission
 Employed by companies to perform Penetration Tests
Types of Hacker
 White Hat Hacker
 Good guys
 Don’t use their skill for illegal purpose
 Computer security experts and help to protect from
Black Hats.
Black Hat Hacker
 Bad guys
 Use their skill maliciously for personal gain
 Hack banks, steal credit cards and deface websites
 Grey Hat Hacker
 It is a combination of White hat n Black Hat Hackers
 Goal of grey hat hackers is to provide national security
Hacking Process
Footprinting
Scanning
Enumeration
Attack and Gaining
Access
Escalating Privilege,
Covering Tracks and
Creating Backdoors
Some Tools
• Who is, ping
• Traceroot, nslookup
Footprinting
• nmap
• nessus
Scanning
• Netcat. tcpdump
• Telnet, firewalk
Enumeration
Some Famous Hacker
Ian Murphy Kevin Mitnick Johan Helsinguis
Linus Torvald Mark Abene Robert Morris
Recent news of Hacking
 Next generation patch management tool released- Secunia CSI 7.0
 Anonymity tool TOR gains more than 1.2 million users since NSA
PRISM Scandal
 Fear of NSA PRISM : Indian Government may ban US email services
for official Communication
 CISCO vulnerability allows remote attacker to take control of
Windows System
 New York Times. Twitter and Huffington Post Domains hijacked by
Syrian Electronic Army
 FBI uses Anonymous Hackers to attack foreign Governments
 Palestinian Hacker , who hacked Zuckerberg’s Facebook Account to be
awarded with $12000
Ethicalhacking

More Related Content

PPTX
Ethicalhacking
PDF
Ethicalhacking 130906120356-
PPT
Ethical hacking
PPTX
Ethical Hacking Overview
PDF
Computer hacking – Is it Ethical PPT
PDF
Ethical Hacking Certification Path You Should Follow
PPT
What is Ethical hacking
PPTX
Ethical hacking
Ethicalhacking
Ethicalhacking 130906120356-
Ethical hacking
Ethical Hacking Overview
Computer hacking – Is it Ethical PPT
Ethical Hacking Certification Path You Should Follow
What is Ethical hacking
Ethical hacking

What's hot (20)

PPTX
Hacking
PPTX
ethical hacking
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Hacking (1)
PPTX
Ethical hacking
PPT
PPTX
PPTX
PPTX
Ethical hacking
PPTX
Final ppt
PPTX
Cyber crime and secuity
PPTX
how to prevent system from hacking...by sarika
PDF
ISACA Ethical Hacking Presentation 10/2011
PPT
Ethical hacking
PPT
PPTX
Hacking ppt
PPTX
Cybercrime
PPTX
Network security (syed azam)
PPT
Hacking
PPTX
Ethical hacking
Hacking
ethical hacking
Ethical hacking-presentation-updated(1by )Rasheed
Hacking (1)
Ethical hacking
Ethical hacking
Final ppt
Cyber crime and secuity
how to prevent system from hacking...by sarika
ISACA Ethical Hacking Presentation 10/2011
Ethical hacking
Hacking ppt
Cybercrime
Network security (syed azam)
Hacking
Ethical hacking

Similar to Ethicalhacking (20)

PPTX
Ethical hacking presentation
PPTX
Ethical Hacking
PPTX
Ethical hacking
PPTX
PPT
All about Hacking
PPTX
Hacking
PPT
Sit presentation
RTF
Hacking and its types
PPTX
PPTX
Internetsecuritypowerpoint 130404101055-phpapp02
PPTX
Ethical hacking 2016
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
Cse ethical hacking ppt
PDF
Jameel Nabbo Cyber Security conference
PPTX
Hacking
PPTX
Hacking Presentation v2 By Raffi
PPTX
Ethical-Hacking-ppt.pptx
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
CSE-Ethical-Hacking-ppt.pptx
Ethical hacking presentation
Ethical Hacking
Ethical hacking
All about Hacking
Hacking
Sit presentation
Hacking and its types
Internetsecuritypowerpoint 130404101055-phpapp02
Ethical hacking 2016
Ethical hacking
Ethical hacking
Cse ethical hacking ppt
Jameel Nabbo Cyber Security conference
Hacking
Hacking Presentation v2 By Raffi
Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx

Recently uploaded (20)

PPTX
Cell Types and Its function , kingdom of life
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
01-Introduction-to-Information-Management.pdf
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Cell Types and Its function , kingdom of life
STATICS OF THE RIGID BODIES Hibbelers.pdf
Weekly quiz Compilation Jan -July 25.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Microbial diseases, their pathogenesis and prophylaxis
LDMMIA Reiki Yoga Finals Review Spring Summer
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
01-Introduction-to-Information-Management.pdf
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Orientation - ARALprogram of Deped to the Parents.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
2.FourierTransform-ShortQuestionswithAnswers.pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Cell Structure & Organelles in detailed.
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape

Ethicalhacking

  • 2. WHAT IS SECURITY  Security is the degree of resistance to, or protection from, harm. It is the state of being free from danger or threat.
  • 3. Difference Between Security and Protection Security and protection are extremely close concepts though not same.  Security measures are adopted to increase the level of protection The feeling of protection arises when one has enough security measures Security is a type of protection against external threats.
  • 4. Overview of Hacking  Hack  Examine something very minutely  The rapid crafting of new program or the making of changes to existing, usually complicated software  Hacker  The person who hacks  Cracker  System intruder/ destroyer
  • 5. History Of Hacking The first hacker was appeared in 1960’s at the Massachusetts Institute Of Technology(MIT) During the 1970’s, a different kind of hacker appeared: Phone Phreaker or Phone Hacker
  • 6.  In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared  During the 1990’s, when the use of internet widespread around the world, hackers multiplied
  • 7. Hacker and Ethical Hacker  Hacker  Access computer system or network without authorization  Breaks the law  Ethical Hacker  Performs most of the same activities but with owner’s permission  Employed by companies to perform Penetration Tests
  • 8. Types of Hacker  White Hat Hacker  Good guys  Don’t use their skill for illegal purpose  Computer security experts and help to protect from Black Hats. Black Hat Hacker  Bad guys  Use their skill maliciously for personal gain  Hack banks, steal credit cards and deface websites  Grey Hat Hacker  It is a combination of White hat n Black Hat Hackers  Goal of grey hat hackers is to provide national security
  • 9. Hacking Process Footprinting Scanning Enumeration Attack and Gaining Access Escalating Privilege, Covering Tracks and Creating Backdoors
  • 10. Some Tools • Who is, ping • Traceroot, nslookup Footprinting • nmap • nessus Scanning • Netcat. tcpdump • Telnet, firewalk Enumeration
  • 11. Some Famous Hacker Ian Murphy Kevin Mitnick Johan Helsinguis Linus Torvald Mark Abene Robert Morris
  • 12. Recent news of Hacking  Next generation patch management tool released- Secunia CSI 7.0  Anonymity tool TOR gains more than 1.2 million users since NSA PRISM Scandal  Fear of NSA PRISM : Indian Government may ban US email services for official Communication  CISCO vulnerability allows remote attacker to take control of Windows System  New York Times. Twitter and Huffington Post Domains hijacked by Syrian Electronic Army  FBI uses Anonymous Hackers to attack foreign Governments  Palestinian Hacker , who hacked Zuckerberg’s Facebook Account to be awarded with $12000