SlideShare a Scribd company logo
ETHICAL HACKING
Engr. Mubashir Hussain
Contents
• Internet
• Types of Internet
• Introduction to hacking
• Types of hackers
• Classification of hackers
• Steps performed by a hacker
• IP address ranges
• Tracing of IP address
• Email Protocol
• Proxy Servers
• Security
• Conclusion
To catch a thief, think like a thief similarly
To catch a hacker think like a hacker
What is Internet?
The internet, sometimes simply called the net, is a worldwide
system of interconnected computer networks and electronic
devices that communicate with each other using an
established set of protocols.
Types of Internet
The Internet is generally divided into three layers based on
accessibility and visibility:
i. Surface Web
ii. Deep Web
iii. Dark Web
Surface Web(Public & Indexed)
• The Surface Web is the visible part of the internet that is
indexed by search engines like Google, Bing, and Yahoo.
• It includes websites that anyone can access without special
permissions or tools.
• This layer makes up only 4-5% of the total internet.
• Examples of Surface Web
• News websites (BBC, CNN, The New York Times)Social media
platforms (Facebook, Twitter, LinkedIn)E-commerce sites
(Amazon, eBay, AliExpress)Online educational platforms
(Wikipedia, Coursera, Udemy)
Deep Web (Hidden but Legal)
i. The Deep Web consists of web pages that are not indexed by search engines.
ii. These pages require login credentials or special permissions to access.
iii. The Deep Web is much larger than the Surface Web, making up around 90-95%
of the internet.
iv. It includes private and confidential data that is hidden for security reasons.
Examples of Deep Web:
v. Online banking portals
vi. Private databases (hospital records, legal documents, academic research)
vii. Password-protected websites
viii. Email accounts (Gmail, Yahoo Mail)
ix. Corporate and government intranets
Dark Web (Encrypted & Anonymous)
The Dark Web is a small portion of the Deep Web that is intentionally hidden and requires special software like Tor (The
Onion Router) or I2P to access.
• It is encrypted and allows users to browse anonymously, making it both useful and risky.
• The Dark Web is not illegal itself, but it is often associated with illegal activities.
Examples of Dark Web Usage:
✅ Legal Uses:
• Anonymous communication for journalists and activists.
• Secure browsing in countries with internet censorship.
• Private forums for cybersecurity experts.
❌ Illegal Uses:
• Black markets for drugs, weapons, and stolen data.
• Hiring hackers or cybercriminal activities.
Comparison Table: Surface Web vs. Deep Web vs.
Dark Web
Feature Surface Web Deep Web Dark Web
Indexed by Search
Engines
✅ Yes ❌ No ❌ No
Access
Requirements
Open to all Requires
login/permissions
Requires
Tor/I2P
Size of the
Internet
~4-5% ~90-95% <1%
Legal to Access ✅ Yes ✅ Yes ✅ Yes, but some activities are
illegal
Examples Google, YouTube, Amazon
Emails, Medical Records,
Bank Accounts
Darknet Markets,
Whistleblower
Platforms
Introduction to Hacking
What is Hacking?
Hacking is the process of gaining unauthorized access to
computer systems, networks, or data. It can be done for both
ethical and malicious purposes. Hackers use their skills to
exploit vulnerabilities in software, hardware, or human
behavior.
Positiv
e
Negativ
e
Types of Hackers
• White Hat Hacker
• Black Hat Hacker
• Grey Hat Hacker
White Hat Hacker
• Perform Ethical Hacking
• Have knowledge of hacking and hacker toolset
• Locate security weaknesses and implement
countermeasures
• Also known as Penetration Tester
• Focus on securing and protecting IT systems
Black Hat Hacker
• Perform unethical hacking
• Are criminal hackers or crackers
• Use their skills for illegal or malicious purposes
• Focus on Security Cracking and Data Stealing
Grey Hat Hacker
• Sometimes acts legally and sometimes not
• Do not hack for personal gain
• Do not have malicious intentions
• May occasionally commit crimes
• Are hybrid between White Hat and Black Hat Hackers
Classification of hackers
• Have ability to find unique vulnerability
• Have deep understanding of OSI Layer
Model and TCP/IP Stacks
Coders
• Have experience with OS
• Exploit existing vulnerabilities
Admin
• Use scripts and programs developed by
others
• Can cause serious problems
Script
Kiddies
Steps Performed by a Hacker
Reconnai
ssance
Scanning
Gaining
access
Maintainin
g access
Clearing
tracks
Reconnaissance
• Google
• Sam spade
• Email tracker and visual route
•Scanning
• War dialing and pingers
• Port scanning
• Enumeration
Password Cracking
• Dictionary Cracking
• Brute Force Cracking
• Hybrid Cracking
• Social Engineering
• Metasploit
• Man in the middle attack
Maintaining access
• Key stroke loggers
• Trojan horses
• Backdoors
• Wrappers

More Related Content

PPTX
Pichman privacy, the dark web, &amp; hacker devices i school (1)
PPTX
Digital Law Powerpoint
PPTX
Digital law powerpoint
PPTX
building foundation for ethical hacking.ppt
PPT
All about Hacking
PPTX
Deep_Web_Risks_Designed.pptx deep web ppt
PPTX
Securing & Safeguarding Your Library Setup.pptx
PPTX
Cyber Security PPT and how to be aware from hackers
Pichman privacy, the dark web, &amp; hacker devices i school (1)
Digital Law Powerpoint
Digital law powerpoint
building foundation for ethical hacking.ppt
All about Hacking
Deep_Web_Risks_Designed.pptx deep web ppt
Securing & Safeguarding Your Library Setup.pptx
Cyber Security PPT and how to be aware from hackers

Similar to https://www.slideshare.net/slideshow/chapter-1-ob-38248150/38248150 (20)

PPTX
Internet and personal privacy
PDF
Cyber espionage - Tinker, taylor, soldier, spy
PPTX
Cyber security
PPTX
Case Study on Dark Web:Insights, Risks & Security Measures
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
Personal Internet Security Practice
PDF
Securing and Safeguarding Your Library Setup
PDF
Module 1 Introduction to cryptography...
PPT
unit 2. cyber offences_how criminals plan them.ppt
PPTX
Dark Web and Privacy
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Demystifying the Dark Web
PPTX
Ethical Hacking
PPT
Ethical Hacking - Introduction to Computer Security
PPT
Ethical Hacking - Introduction to Computer Security
PPT
Introduction To Computer Security
PPTX
Ethical Hacking
PPT
Information security Presentation
PPT
Introduction to ethical hacking
PPTX
Ethics,security and privacy control
Internet and personal privacy
Cyber espionage - Tinker, taylor, soldier, spy
Cyber security
Case Study on Dark Web:Insights, Risks & Security Measures
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Personal Internet Security Practice
Securing and Safeguarding Your Library Setup
Module 1 Introduction to cryptography...
unit 2. cyber offences_how criminals plan them.ppt
Dark Web and Privacy
Ethical hacking-presentation-updated(1by )Rasheed
Demystifying the Dark Web
Ethical Hacking
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Introduction To Computer Security
Ethical Hacking
Information security Presentation
Introduction to ethical hacking
Ethics,security and privacy control
Ad

More from MubashirHussain792093 (9)

PDF
Gradient Descent Code Implementation.pdf
PPTX
https://www.slideshare.net/slideshow/chapter-1-ob-38248150/38248150https://ww...
PPTX
https://www.slideshare.net/slideshow/chapter-1-ob-38248150/38248150https://ww...
PPTX
Footprinting, Enumeration, Scanning, Sniffing, Social Engineering Footprintin...
PPTX
Footprinting, Enumeration, Scanning, Sniffing, Social Engineering
PPTX
Footprinting, Enumeration, Scanning, Sniffing, Social Engineering
PPTX
Comparitive Analysis .pptx Footprinting, Enumeration, Scanning, Sniffing, Soc...
PPTX
Chemicals in Cosmetics ka sub theak hho .pptx
PPTX
Project Presentation Project Presentation Project Presentation Project Presen...
Gradient Descent Code Implementation.pdf
https://www.slideshare.net/slideshow/chapter-1-ob-38248150/38248150https://ww...
https://www.slideshare.net/slideshow/chapter-1-ob-38248150/38248150https://ww...
Footprinting, Enumeration, Scanning, Sniffing, Social Engineering Footprintin...
Footprinting, Enumeration, Scanning, Sniffing, Social Engineering
Footprinting, Enumeration, Scanning, Sniffing, Social Engineering
Comparitive Analysis .pptx Footprinting, Enumeration, Scanning, Sniffing, Soc...
Chemicals in Cosmetics ka sub theak hho .pptx
Project Presentation Project Presentation Project Presentation Project Presen...
Ad

Recently uploaded (20)

PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
Business Acumen Training GuidePresentation.pptx
PPTX
1_Introduction to advance data techniques.pptx
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
IB Computer Science - Internal Assessment.pptx
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Business Acumen Training GuidePresentation.pptx
1_Introduction to advance data techniques.pptx
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
IBA_Chapter_11_Slides_Final_Accessible.pptx
Supervised vs unsupervised machine learning algorithms
Business Ppt On Nestle.pptx huunnnhhgfvu
Introduction-to-Cloud-ComputingFinal.pptx
Data_Analytics_and_PowerBI_Presentation.pptx
IB Computer Science - Internal Assessment.pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
Galatica Smart Energy Infrastructure Startup Pitch Deck
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx

https://www.slideshare.net/slideshow/chapter-1-ob-38248150/38248150

  • 2. Contents • Internet • Types of Internet • Introduction to hacking • Types of hackers • Classification of hackers • Steps performed by a hacker • IP address ranges • Tracing of IP address • Email Protocol • Proxy Servers • Security • Conclusion
  • 3. To catch a thief, think like a thief similarly To catch a hacker think like a hacker
  • 4. What is Internet? The internet, sometimes simply called the net, is a worldwide system of interconnected computer networks and electronic devices that communicate with each other using an established set of protocols. Types of Internet The Internet is generally divided into three layers based on accessibility and visibility: i. Surface Web ii. Deep Web iii. Dark Web
  • 5. Surface Web(Public & Indexed) • The Surface Web is the visible part of the internet that is indexed by search engines like Google, Bing, and Yahoo. • It includes websites that anyone can access without special permissions or tools. • This layer makes up only 4-5% of the total internet. • Examples of Surface Web • News websites (BBC, CNN, The New York Times)Social media platforms (Facebook, Twitter, LinkedIn)E-commerce sites (Amazon, eBay, AliExpress)Online educational platforms (Wikipedia, Coursera, Udemy)
  • 6. Deep Web (Hidden but Legal) i. The Deep Web consists of web pages that are not indexed by search engines. ii. These pages require login credentials or special permissions to access. iii. The Deep Web is much larger than the Surface Web, making up around 90-95% of the internet. iv. It includes private and confidential data that is hidden for security reasons. Examples of Deep Web: v. Online banking portals vi. Private databases (hospital records, legal documents, academic research) vii. Password-protected websites viii. Email accounts (Gmail, Yahoo Mail) ix. Corporate and government intranets
  • 7. Dark Web (Encrypted & Anonymous) The Dark Web is a small portion of the Deep Web that is intentionally hidden and requires special software like Tor (The Onion Router) or I2P to access. • It is encrypted and allows users to browse anonymously, making it both useful and risky. • The Dark Web is not illegal itself, but it is often associated with illegal activities. Examples of Dark Web Usage: ✅ Legal Uses: • Anonymous communication for journalists and activists. • Secure browsing in countries with internet censorship. • Private forums for cybersecurity experts. ❌ Illegal Uses: • Black markets for drugs, weapons, and stolen data. • Hiring hackers or cybercriminal activities.
  • 8. Comparison Table: Surface Web vs. Deep Web vs. Dark Web Feature Surface Web Deep Web Dark Web Indexed by Search Engines ✅ Yes ❌ No ❌ No Access Requirements Open to all Requires login/permissions Requires Tor/I2P Size of the Internet ~4-5% ~90-95% <1% Legal to Access ✅ Yes ✅ Yes ✅ Yes, but some activities are illegal Examples Google, YouTube, Amazon Emails, Medical Records, Bank Accounts Darknet Markets, Whistleblower Platforms
  • 9. Introduction to Hacking What is Hacking? Hacking is the process of gaining unauthorized access to computer systems, networks, or data. It can be done for both ethical and malicious purposes. Hackers use their skills to exploit vulnerabilities in software, hardware, or human behavior. Positiv e Negativ e
  • 10. Types of Hackers • White Hat Hacker • Black Hat Hacker • Grey Hat Hacker
  • 11. White Hat Hacker • Perform Ethical Hacking • Have knowledge of hacking and hacker toolset • Locate security weaknesses and implement countermeasures • Also known as Penetration Tester • Focus on securing and protecting IT systems
  • 12. Black Hat Hacker • Perform unethical hacking • Are criminal hackers or crackers • Use their skills for illegal or malicious purposes • Focus on Security Cracking and Data Stealing
  • 13. Grey Hat Hacker • Sometimes acts legally and sometimes not • Do not hack for personal gain • Do not have malicious intentions • May occasionally commit crimes • Are hybrid between White Hat and Black Hat Hackers
  • 14. Classification of hackers • Have ability to find unique vulnerability • Have deep understanding of OSI Layer Model and TCP/IP Stacks Coders • Have experience with OS • Exploit existing vulnerabilities Admin • Use scripts and programs developed by others • Can cause serious problems Script Kiddies
  • 15. Steps Performed by a Hacker Reconnai ssance Scanning Gaining access Maintainin g access Clearing tracks
  • 16. Reconnaissance • Google • Sam spade • Email tracker and visual route •Scanning • War dialing and pingers • Port scanning • Enumeration
  • 17. Password Cracking • Dictionary Cracking • Brute Force Cracking • Hybrid Cracking • Social Engineering • Metasploit • Man in the middle attack
  • 18. Maintaining access • Key stroke loggers • Trojan horses • Backdoors • Wrappers