SlideShare a Scribd company logo
TERM PAPER 
ON 
ETHICAL HACKING 
PRESENTED BY : 
PRUDHVI RAJ 
IT-1 
13501A1249
Hacking (1)
WHAT IS HACKING ? 
• Hacking is the intentional unauthorized access to 
computer systems 
– Illegal activities from harmless pranks to huge 
thefts and 
– shutdowns of services 
• Traditionally hacking refers to the hobby/profession of 
working with computers. 
• But now a days it refers to breaking into computer 
systems.
Hacking (1)
HISTORY OF HACKING 
• The first hacker was appeared in 1960’s at the Massachusetts 
Institute of Technology(MIT) . 
• During the 1970’s , a different kind of hacker appeared : Phone 
Phreaker or Phone Hacker. 
• In the 1980’s, phreaks started to migrate to computers 
and the first Bulletin Board System(BBS) appeared. 
• During the 1990’s, when the use of internet wide spread around the 
world, hackers multipiled.
ETHICAL 
HACKING
What is ethical hacking 
• BASIC MEANING : 
In simple words Ethical Hacking is testing the resources for a good cause and for the 
betterment of technology. It also means to secure the system. 
• TECHNICAL MEANING : 
Technically Ethical Hacking is done by a computer hacker who is hired by an 
organization to undertake non malicious hacking work in order to discover computer-security 
flaws. 
WHO ARE ETHICAL HACKERS??? 
• Completely trustworthy. 
• Strong programming and computer 
networking skills. 
• Technique of criminal hackers- 
Detection-Prevention. 
• Ethical hackers possess same skills , 
mind set and tools of a hacker but 
the attacks are done in a non 
destructive manner.
Hacking Process 
Footprinting 
Scanning 
Enumeration 
Escalating 
Privilege, Covering 
Tracks and 
Creating 
Backdoors 
Attack and 
Gaining 
Access
TYPES OF HACKING 
->Website hacking. ->Email hacking. 
->Network hacking. ->Password hacking. 
->online transactions hacking. ->Computer hacking. 
->Mobile hacking. ->PDA hacking. 
->Metropolitan system hacking. 
WHY DO HACKERS HACK? 
• Just for fun. 
• Hack other systems secretly. 
• Notify many people their thought. 
• Steal important information. 
• Destroy enemy’s computer network 
during the war
Hacking (1)
CONSEQUENCES OF 
ILLEGAL HACKING 
• Thousands of dollars in fines. 
• Imprisonment. 
• Seizure of your computer.
IS HACKING A CRIME??
TYPES OF HACKERS
Black hats 
•Very dangerous persons. 
•Always have motive to earn huge profits. 
•Highly paid persons. 
•Evolves themselves mostly in criminal 
activities. 
•These could be CODERS & ADMINS. 
•As well as SCRIPT KIDDIES.
White hats 
•These are good hackers. 
•Have genuine license to hack. 
•Have registered police records. 
•Evolves themselves in good works. 
•Generally owned by companies for 
security designing. 
•Have high pay scales. 
•Generally these are CODERS.
GREY HATS 
•Also known as RED HATS. 
•Perform both tasks fair and unfair. 
•Generally these are ADMINS. 
•Have little high pay than white hats. 
•Generally not so dangerous but some 
times it could be.
Advantages 
These are good hackers 
Have genuine license to hack 
Have registered police records
AGednvearnaltlya gowense :d by companies for 
security designing 
They have high salaries
YOU HAVE BEEN
WHAT TO DO AFTER 
BEING HACKED? 
• Shut down the system. 
• Clear the memory using cleaners (like C Cleaner). 
• Scan infected sections with good antivirus. 
• Separate the system from network (do not use 
internet) 
• Restore the system with the back up. (if o/s 
problem) 
• Finally , connect the system to the network.
HOW CAN BE A REAL HACKER 
• Study C/C++/Assembly language. 
• Study computer architecture. 
• Study operating system. 
• Study computer network. 
• Examine the hacking tools for a month. 
• Think the problem of a computer. 
SECURITY & COUNTER MEASURES: 
• Use of Antivirus. 
• Proper logout after proper 
use of mail id. 
• Manual opening browser. 
• Don’t open spam. 
• Password protected admin 
account.
Did you know ? 
• Social networking sites like 
‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 
60% of direct or indirect hacking incidents. 
• The average age group of hackers are aged 
between 14-24 yrs. …
Job of each hacker: 
• The White Hat Approach: 
This is a more deterministic plan 
of attack than the Black Box 
one. 
C 
y 
b 
e 
r 
c 
ri 
m 
e 
IN THE WORLD..
WORLD FAMOUS HACKERS 
Stephen wozniac Tsutomu shimomura 
Kevin mitnick Kevin poulsen
Hacking (1)
Hacking (1)
HOW TO PREVENT HACKERS 
Change your password everymonth 
Install a firewall on your computer 
Purchase or download antivirus 
software 
Install antispyware program onto your 
computer
CONCLUSION 
From a practical standpoint the security 
problem will remain as long as manufacturers 
remain committed to current system. 
Regular auditing, vigilant intrusion detection, 
good system administration practice and 
computer security awareness are all essential 
parts of an organization’s security efforts.
ANY QUERIES???
Hacking (1)

More Related Content

PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Ethical hacking
PPT
What is Ethical hacking
PPTX
Ethical Hacking Overview
PDF
Computer hacking – Is it Ethical PPT
PDF
Ethical Hacking Certification Path You Should Follow
PPTX
Ethical Hacking
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking
What is Ethical hacking
Ethical Hacking Overview
Computer hacking – Is it Ethical PPT
Ethical Hacking Certification Path You Should Follow
Ethical Hacking

What's hot (20)

PPTX
ethical hacking
PPTX
Hacking and Hackers
PPTX
Hacking
PPT
Ethical hacking
PPT
All about Hacking
PPTX
Hacking (cs192 report )
PPT
It security &_ethical_hacking
PPT
Ethical hacking presentation
PPTX
Ethical hacking
PDF
Ethicalhacking 130906120356-
PPTX
Ethicalhacking
PPTX
PPTX
Ethical Hacking
PPTX
Computer Hacking - An Introduction
PDF
Ethical hacking & Information Security
PPTX
Hackers
PPTX
Hacking and Types of Hacker.
PDF
Hacking
PPTX
Internet Issues (How to Deal on Internet Security)
PPTX
Web defacement
ethical hacking
Hacking and Hackers
Hacking
Ethical hacking
All about Hacking
Hacking (cs192 report )
It security &_ethical_hacking
Ethical hacking presentation
Ethical hacking
Ethicalhacking 130906120356-
Ethicalhacking
Ethical Hacking
Computer Hacking - An Introduction
Ethical hacking & Information Security
Hackers
Hacking and Types of Hacker.
Hacking
Internet Issues (How to Deal on Internet Security)
Web defacement

Similar to Hacking (1) (20)

PPTX
Ethical hacking
PPTX
Hacking Presentation v2 By Raffi
RTF
Hacking and its types
PPTX
Ethical hacking
PPT
Computer hacking
PPTX
Ethical hacking
PPSX
Cyber Crime and Ethical Hacking
PPTX
Cyber Crime and Ethical Hacking
PPTX
Hacking
PDF
IRJET- Study of Hacking and Ethical Hacking
PDF
Cyber Crime and Ethical Hacking
PPTX
building foundation for ethical hacking.ppt
PPT
Ethichack 2012
PPTX
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
PPT
Introduction to Hacking
PPTX
Hacking
PPTX
PPTX
HACKING presentation by Team Shivam.pptx
PPTX
Ethical hacking : Its methodologies and tools
PPTX
Ethical hacking
Ethical hacking
Hacking Presentation v2 By Raffi
Hacking and its types
Ethical hacking
Computer hacking
Ethical hacking
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
Hacking
IRJET- Study of Hacking and Ethical Hacking
Cyber Crime and Ethical Hacking
building foundation for ethical hacking.ppt
Ethichack 2012
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Introduction to Hacking
Hacking
HACKING presentation by Team Shivam.pptx
Ethical hacking : Its methodologies and tools
Ethical hacking

Hacking (1)

  • 1. TERM PAPER ON ETHICAL HACKING PRESENTED BY : PRUDHVI RAJ IT-1 13501A1249
  • 3. WHAT IS HACKING ? • Hacking is the intentional unauthorized access to computer systems – Illegal activities from harmless pranks to huge thefts and – shutdowns of services • Traditionally hacking refers to the hobby/profession of working with computers. • But now a days it refers to breaking into computer systems.
  • 5. HISTORY OF HACKING • The first hacker was appeared in 1960’s at the Massachusetts Institute of Technology(MIT) . • During the 1970’s , a different kind of hacker appeared : Phone Phreaker or Phone Hacker. • In the 1980’s, phreaks started to migrate to computers and the first Bulletin Board System(BBS) appeared. • During the 1990’s, when the use of internet wide spread around the world, hackers multipiled.
  • 7. What is ethical hacking • BASIC MEANING : In simple words Ethical Hacking is testing the resources for a good cause and for the betterment of technology. It also means to secure the system. • TECHNICAL MEANING : Technically Ethical Hacking is done by a computer hacker who is hired by an organization to undertake non malicious hacking work in order to discover computer-security flaws. WHO ARE ETHICAL HACKERS??? • Completely trustworthy. • Strong programming and computer networking skills. • Technique of criminal hackers- Detection-Prevention. • Ethical hackers possess same skills , mind set and tools of a hacker but the attacks are done in a non destructive manner.
  • 8. Hacking Process Footprinting Scanning Enumeration Escalating Privilege, Covering Tracks and Creating Backdoors Attack and Gaining Access
  • 9. TYPES OF HACKING ->Website hacking. ->Email hacking. ->Network hacking. ->Password hacking. ->online transactions hacking. ->Computer hacking. ->Mobile hacking. ->PDA hacking. ->Metropolitan system hacking. WHY DO HACKERS HACK? • Just for fun. • Hack other systems secretly. • Notify many people their thought. • Steal important information. • Destroy enemy’s computer network during the war
  • 11. CONSEQUENCES OF ILLEGAL HACKING • Thousands of dollars in fines. • Imprisonment. • Seizure of your computer.
  • 12. IS HACKING A CRIME??
  • 14. Black hats •Very dangerous persons. •Always have motive to earn huge profits. •Highly paid persons. •Evolves themselves mostly in criminal activities. •These could be CODERS & ADMINS. •As well as SCRIPT KIDDIES.
  • 15. White hats •These are good hackers. •Have genuine license to hack. •Have registered police records. •Evolves themselves in good works. •Generally owned by companies for security designing. •Have high pay scales. •Generally these are CODERS.
  • 16. GREY HATS •Also known as RED HATS. •Perform both tasks fair and unfair. •Generally these are ADMINS. •Have little high pay than white hats. •Generally not so dangerous but some times it could be.
  • 17. Advantages These are good hackers Have genuine license to hack Have registered police records
  • 18. AGednvearnaltlya gowense :d by companies for security designing They have high salaries
  • 20. WHAT TO DO AFTER BEING HACKED? • Shut down the system. • Clear the memory using cleaners (like C Cleaner). • Scan infected sections with good antivirus. • Separate the system from network (do not use internet) • Restore the system with the back up. (if o/s problem) • Finally , connect the system to the network.
  • 21. HOW CAN BE A REAL HACKER • Study C/C++/Assembly language. • Study computer architecture. • Study operating system. • Study computer network. • Examine the hacking tools for a month. • Think the problem of a computer. SECURITY & COUNTER MEASURES: • Use of Antivirus. • Proper logout after proper use of mail id. • Manual opening browser. • Don’t open spam. • Password protected admin account.
  • 22. Did you know ? • Social networking sites like ‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 60% of direct or indirect hacking incidents. • The average age group of hackers are aged between 14-24 yrs. …
  • 23. Job of each hacker: • The White Hat Approach: This is a more deterministic plan of attack than the Black Box one. C y b e r c ri m e IN THE WORLD..
  • 24. WORLD FAMOUS HACKERS Stephen wozniac Tsutomu shimomura Kevin mitnick Kevin poulsen
  • 27. HOW TO PREVENT HACKERS Change your password everymonth Install a firewall on your computer Purchase or download antivirus software Install antispyware program onto your computer
  • 28. CONCLUSION From a practical standpoint the security problem will remain as long as manufacturers remain committed to current system. Regular auditing, vigilant intrusion detection, good system administration practice and computer security awareness are all essential parts of an organization’s security efforts.