Ethical Hacking
Presented by :-
Aakash M Takale
Guided by :-
Prof. Dr. Steven Silverman
• Introduction
• Definition : Ethical Hacking
• Types of Hackers
• Different types of System Attacks
• What does an Ethical hacker do?
• Required skills of an Ethical hacker
• Advantages – Disadvantages
• Future Enhancements
• Conclusion
• References
Contents
Introduction
• Ethical hacking also known as penetration testing or white-hat
hacking, involves the same tools, tricks, and techniques that
hackers use, but with one major difference that Ethical
hacking is legal.
• The intent of ethical hacking is to discover vulnerabilities from
a hacker‘s viewpoint so systems can be better secured.
• Its part of an overall information risk management program
that allows for ongoing security improvements.
Definition
Eric Raymond, compiler of – The New Hacker’s Dictionary,
defines a hacker as a clever programmer. “A good hack is
clever solution to a programming problem and hacking is the
act of doing it”
Raymond lists five possible characteristics that qualify one as a
hacker, which he paraphrases here:
• A person who enjoys learning details of a programming
language or system.
• A person who enjoys actually doing the programming rather
than just theorizing about it.
• A person capable of appreciating someone else's hacking.
• A person who picks up programming quickly.
• A person who is an expert at a particular programming
language or system.
Types of Hackers
• Black-Hat Hacker
A black hat hackers or crackers are individuals with
extraordinary computing skills, resorting to malicious or
destructive activities. That is black hat hackers use their knowledge
and skill for their own personal gains probably by hurting others.
• White-Hat Hacker
White hat hackers are those individuals professing hacker
skills and using them for defensive purposes. This means that the
white hat hackers use their knowledge and skill for the good of
others and for the common good.
• Grey-Hat Hacker
These are individuals who work both offensively and
defensively various times. We cannot predict their behavior.
Sometimes they use their skills for the common good while in
some other times he uses them for their personal gains.
Different kinds of System Attacks
What does an Ethical Hacker do?
• An ethical hacker is a person doing ethical hacking that he is a security
personal who tries to penetrate into a network to find if there is some
vulnerability in the system.
• An ethical hacker will first think with a mindset of a hacker who tries to
get in to the system.
• He will first find out what an intruder can see or what others can see.
• He may also sometimes make patches for that particular vulnerability or
he may suggest some methods to prevent the vulnerability.
Required skills of an Ethical Hacker
• Microsoft – skills in operation, configuration and management.
• Linux – knowledge of Linux/Unix, security setting, configuration
and services.
• Firewalls – configurations and operation of intrusion detection
systems.
• Routers – knowledge of routers, routing protocols.
• Network Protocols – TCP/IP; how they function and can be
manipulated.
• Project Management – leading, planning, organizing and
controlling a penetration testing team.
Advantages and Disadvantages
Ethical Hacking nowadays is the backbone of a network security.
Each day its relevance is increasing, the major pros and cons of
Ethical Hacking are given below :-
 Advantages
 Provides security to banking and financial establishments.
 Prevents website defacements.
 Fighting against terrorism and national security breaches
 An evolving technique.
 Disadvantages
 The ethical hacker using the knowledge they gain to do
malicious hacking activities.
 Allowing the company's financial and banking details to be seen.
 All depends upon the trustworthiness of the ethical hacker.
 Hiring professionals is expensive.
Future Enhancements
 As it is evolving branch the scope of enhancement in
technology is immense. No ethical hacker can ensure the
system security by using same technique repeatedly. He would
have to improve, develop and explore new avenues
continuously.
 More enhanced software should be used for optimum
protection. Tools used, need to be updated regularly and more
efficient ones need to be developed.
Conclusion
Technology keeps on evolving every now and then and new
software, systems come into the market. As we all know, there is
no software or the system that can be made with zero vulnerability
so an individual must take different vulnerabilities into account
and try to construct the system which is more secure and less
penetrable. Hence to make a client’s system secure, a complete
ethical hacking is required.
References
§ Council, E. (2011, 08). Ethical Hacking and Countermeasures.
Retrieved from certifiedethicalhackerceh.blogspot:
http://certifiedethicalhackerceh.blogspot.com/2011/08/phases-of-
ethical-hacking.html
§ Palmer, C. C. (2001). Ethical Hacking. IBM Systems Journal, Vol 40,
No 3, 769-780.
§ Rouse, M. (2014). Search Security. Retrieved from Tech Target :
http://searchsecurity.techtarget.com/definition/ethical-hacker
§ Symantec. (2010). Securtiy News. Retrieved from pc tools:
http://www.pctools.com/security-news/blackhat-hacker/
Any Questions?
Thank You


More Related Content

PPTX
System dependability
PDF
PPTX
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
PPTX
El Gamal Cryptosystem
PPTX
Ethical Hacking
PPTX
Cryptography - Block cipher & stream cipher
PPTX
Ethical hacking
PPTX
Firewall and Types of firewall
System dependability
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
El Gamal Cryptosystem
Ethical Hacking
Cryptography - Block cipher & stream cipher
Ethical hacking
Firewall and Types of firewall

What's hot (20)

PPT
Cloud computing architectures
PPT
Web Security
PPT
DSA.ppt
 
PPT
Intrusion detection system ppt
PPT
Unit 1( modelling concepts & class modeling)
PPTX
What is Cryptography and Types of attacks in it
PPTX
Law and Ethics in Information Security.pptx
PPT
Ethical Hacking
PPT
Message authentication
 
PPT
Security technologies
PDF
Documento crisp dm
PPTX
Authentication service security
PPTX
Dos attack
PPTX
Ethical Hacking
PPTX
Protection models
PPTX
Planning in AI(Partial order planning)
PPTX
Rotor machine,subsitution technique
PPT
Database backup and recovery basics
PPTX
Data mining: Classification and prediction
PDF
Ethical hacking and social engineering
Cloud computing architectures
Web Security
DSA.ppt
 
Intrusion detection system ppt
Unit 1( modelling concepts & class modeling)
What is Cryptography and Types of attacks in it
Law and Ethics in Information Security.pptx
Ethical Hacking
Message authentication
 
Security technologies
Documento crisp dm
Authentication service security
Dos attack
Ethical Hacking
Protection models
Planning in AI(Partial order planning)
Rotor machine,subsitution technique
Database backup and recovery basics
Data mining: Classification and prediction
Ethical hacking and social engineering

Similar to EthicalHacking_AakashTakale (20)

PPTX
Ethical Hacking.pptx
PPTX
Ethical Hacking Presentation
PPTX
this ppt is based on ethica l hacking _
PPTX
ETHICAL HACKING PRESENTATION
DOCX
Ethical hacking.
PPTX
dane Technical seminar Be in computer Engineeringppt.pptx
PPTX
Ethical hacking
PPTX
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
PPTX
ETHICAL HACKING.pptx
PPTX
Ethical hacking
PPT
Ethical hacking a licence to hack
DOCX
Ethical Hacking
DOCX
Ehtical hacking speech
PPTX
Ethical Hacking
PPTX
CSSE-Ethical-Hacking-ppt.pptx
PDF
Ethical-Hacking.pdf
PPTX
Ethical Hacking - An Overview
PDF
Why Ethical Hacking Course in 2022.pdf
PPT
Ethical hacking
PPTX
Ethical Hacking
Ethical Hacking.pptx
Ethical Hacking Presentation
this ppt is based on ethica l hacking _
ETHICAL HACKING PRESENTATION
Ethical hacking.
dane Technical seminar Be in computer Engineeringppt.pptx
Ethical hacking
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
ETHICAL HACKING.pptx
Ethical hacking
Ethical hacking a licence to hack
Ethical Hacking
Ehtical hacking speech
Ethical Hacking
CSSE-Ethical-Hacking-ppt.pptx
Ethical-Hacking.pdf
Ethical Hacking - An Overview
Why Ethical Hacking Course in 2022.pdf
Ethical hacking
Ethical Hacking

EthicalHacking_AakashTakale

  • 1. Ethical Hacking Presented by :- Aakash M Takale Guided by :- Prof. Dr. Steven Silverman
  • 2. • Introduction • Definition : Ethical Hacking • Types of Hackers • Different types of System Attacks • What does an Ethical hacker do? • Required skills of an Ethical hacker • Advantages – Disadvantages • Future Enhancements • Conclusion • References Contents
  • 3. Introduction • Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. • The intent of ethical hacking is to discover vulnerabilities from a hacker‘s viewpoint so systems can be better secured. • Its part of an overall information risk management program that allows for ongoing security improvements.
  • 4. Definition Eric Raymond, compiler of – The New Hacker’s Dictionary, defines a hacker as a clever programmer. “A good hack is clever solution to a programming problem and hacking is the act of doing it”
  • 5. Raymond lists five possible characteristics that qualify one as a hacker, which he paraphrases here: • A person who enjoys learning details of a programming language or system. • A person who enjoys actually doing the programming rather than just theorizing about it. • A person capable of appreciating someone else's hacking. • A person who picks up programming quickly. • A person who is an expert at a particular programming language or system.
  • 6. Types of Hackers • Black-Hat Hacker A black hat hackers or crackers are individuals with extraordinary computing skills, resorting to malicious or destructive activities. That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others. • White-Hat Hacker White hat hackers are those individuals professing hacker skills and using them for defensive purposes. This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.
  • 7. • Grey-Hat Hacker These are individuals who work both offensively and defensively various times. We cannot predict their behavior. Sometimes they use their skills for the common good while in some other times he uses them for their personal gains.
  • 8. Different kinds of System Attacks
  • 9. What does an Ethical Hacker do? • An ethical hacker is a person doing ethical hacking that he is a security personal who tries to penetrate into a network to find if there is some vulnerability in the system. • An ethical hacker will first think with a mindset of a hacker who tries to get in to the system. • He will first find out what an intruder can see or what others can see. • He may also sometimes make patches for that particular vulnerability or he may suggest some methods to prevent the vulnerability.
  • 10. Required skills of an Ethical Hacker • Microsoft – skills in operation, configuration and management. • Linux – knowledge of Linux/Unix, security setting, configuration and services. • Firewalls – configurations and operation of intrusion detection systems. • Routers – knowledge of routers, routing protocols. • Network Protocols – TCP/IP; how they function and can be manipulated. • Project Management – leading, planning, organizing and controlling a penetration testing team.
  • 11. Advantages and Disadvantages Ethical Hacking nowadays is the backbone of a network security. Each day its relevance is increasing, the major pros and cons of Ethical Hacking are given below :-  Advantages  Provides security to banking and financial establishments.  Prevents website defacements.  Fighting against terrorism and national security breaches  An evolving technique.
  • 12.  Disadvantages  The ethical hacker using the knowledge they gain to do malicious hacking activities.  Allowing the company's financial and banking details to be seen.  All depends upon the trustworthiness of the ethical hacker.  Hiring professionals is expensive.
  • 13. Future Enhancements  As it is evolving branch the scope of enhancement in technology is immense. No ethical hacker can ensure the system security by using same technique repeatedly. He would have to improve, develop and explore new avenues continuously.  More enhanced software should be used for optimum protection. Tools used, need to be updated regularly and more efficient ones need to be developed.
  • 14. Conclusion Technology keeps on evolving every now and then and new software, systems come into the market. As we all know, there is no software or the system that can be made with zero vulnerability so an individual must take different vulnerabilities into account and try to construct the system which is more secure and less penetrable. Hence to make a client’s system secure, a complete ethical hacking is required.
  • 15. References § Council, E. (2011, 08). Ethical Hacking and Countermeasures. Retrieved from certifiedethicalhackerceh.blogspot: http://certifiedethicalhackerceh.blogspot.com/2011/08/phases-of- ethical-hacking.html § Palmer, C. C. (2001). Ethical Hacking. IBM Systems Journal, Vol 40, No 3, 769-780. § Rouse, M. (2014). Search Security. Retrieved from Tech Target : http://searchsecurity.techtarget.com/definition/ethical-hacker § Symantec. (2010). Securtiy News. Retrieved from pc tools: http://www.pctools.com/security-news/blackhat-hacker/