ETHICAL HACKING
By:- Anuj Kumar Singh
CONTENT
What is hacking
What is ethical hacking
Types of hacker
Security testing and penetration testing
Phases of hacking
Importance of ethical hacker
Some common Hacking Techniques
Ways to protect ourselves from being hacked
What is hacking
The gaining of unauthorized access to someone’s data in a
system or computer.
The activity of using a computer to access information
stored on another computer system without permission
What is ethical hacking
Ethical Hacking is an authorized practice of
bypassing system security to identify potential
data breaches and threats in a network.
Company that owns the system or network
allows Cyber Security engineers to perform such
activities in order to test the system’s defenses.
Thus, unlike malicious hacking, this process is
planned, approved, and more importantly, legal.
Types of hacker
Ethical Hacker (White hat): A hacker who gains access to systems with a view
to fix the identified weaknesses. They may also perform penetration Testing and
vulnerability assessments.
Cracker (Black hat): A hacker who gains unauthorized access to computer
systems for personal gain. The intent is usually to steal corporate data, violate
privacy rights, transfer funds from bank accounts etc.
Grey hat: A hacker who is in between ethical and black hat hackers. He/she
breaks into computer systems without authority with a view to identify
weaknesses and reveal them to the system owner.
Security testing and penetration
testing
SECURITY TESTING is a type of Software Testing
that uncovers vulnerabilities, threats, risks in a
software application and prevents malicious attacks
from intruders. The purpose of Security Tests is to
identify all possible loopholes and weaknesses of the
software system which might result in a loss of
information.
Penetration testing (or pen-testing) is a security
exercise where a cyber-security expert attempts to
find and exploit vulnerabilities in a computer system.
Phases of hacking
There are mainly 5 phases in hacking. Not
necessarily a hacker has to follow these 5 steps in
a sequential manner.
Reconnaissance : It is also called as Foot-printing and
information gathering Phase. This is the preparatory phase
where we collect as much information as possible about the
target.
Scanning : This phase involves scanning the target for the
information like open ports, Live systems, various services
running on the host.
Gaining Access :This phase is where an attacker breaks
into the system/network using various tools or methods.
Maintaining Access : Hacker may just hack the system to
show it was vulnerable or he can be so mischievous that he
wants to maintain or persist the connection in the
background without the knowledge of the user. This can be
done using Trojans, Rootkits or other malicious files.
Clearing Track : No thief wants to get caught. An
intelligent hacker always clears all evidence so that in the
later point of time, no one will find any traces leading to
him.
Importance of ethical hacker
The prime purpose of ethical hacking is to prevent sensitive data from falling into
enemy hands.
It safeguards your company from blackmail by those willing to exploit the
vulnerabilities.
Via real-world testing, you can enhance your digital network security and prevent
security breaches.
Ethical hacking can prevent cyber-terrorism and terrorist attacks, ensuring the
safety of the nation.
Common Hacking Techniques
Social Engineering & Phishing
Malware-Injecting Devices
Cracking Passwords
Distributed Denial-of-Service (DDoS)
Ways to protect ourselves from
being hacked
Avoid the use of free Wi-Fi hotspots
Don’t jailbreak your mobile devices
Avoid using apps from untrusted sources
Make sure your security software is up-to-date
Install antivirus and antimalware software
Use multifactor authentication
Thank you