[go: up one dir, main page]

0% found this document useful (0 votes)
111 views13 pages

Ethical Hacking: By:-Anuj Kumar Singh

This document discusses ethical hacking. It defines hacking as gaining unauthorized access to someone's computer system or data and ethical hacking as authorized testing of a network's security by its owners. It outlines common hacker types, security testing phases which typically include reconnaissance, scanning, gaining access, and maintaining/clearing access. The importance of ethical hacking is to identify vulnerabilities before criminals can exploit them. Common hacking techniques are also listed along with ways to protect systems like using multifactor authentication and keeping security software up to date.

Uploaded by

John Wick
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views13 pages

Ethical Hacking: By:-Anuj Kumar Singh

This document discusses ethical hacking. It defines hacking as gaining unauthorized access to someone's computer system or data and ethical hacking as authorized testing of a network's security by its owners. It outlines common hacker types, security testing phases which typically include reconnaissance, scanning, gaining access, and maintaining/clearing access. The importance of ethical hacking is to identify vulnerabilities before criminals can exploit them. Common hacking techniques are also listed along with ways to protect systems like using multifactor authentication and keeping security software up to date.

Uploaded by

John Wick
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

ETHICAL HACKING

By:- Anuj Kumar Singh


CONTENT

 What is hacking
 What is ethical hacking
 Types of hacker
 Security testing and penetration testing
 Phases of hacking
 Importance of ethical hacker
 Some common Hacking Techniques
 Ways to protect ourselves from being hacked
What is hacking
 The gaining of unauthorized access to someone’s data in a
system or computer.
 The activity of using a computer to access information
stored on another computer system without permission
What is ethical hacking

 Ethical Hacking is an authorized practice of


bypassing system security to identify potential
data breaches and threats in a network.
 Company that owns the system or network
allows Cyber Security engineers to perform such
activities in order to test the system’s defenses.
 Thus, unlike malicious hacking, this process is
planned, approved, and more importantly, legal.
Types of hacker
 Ethical Hacker (White hat): A hacker who gains access to systems with a view
to fix the identified weaknesses. They may also perform penetration Testing and
vulnerability assessments.
 Cracker (Black hat): A hacker who gains unauthorized access to computer
systems for personal gain. The intent is usually to steal corporate data, violate
privacy rights, transfer funds from bank accounts etc.
 Grey hat: A hacker who is in between ethical and black hat hackers. He/she
breaks into computer systems without authority with a view to identify
weaknesses and reveal them to the system owner.
Security testing and penetration
testing
 SECURITY TESTING is a type of Software Testing
that uncovers vulnerabilities, threats, risks in a
software application and prevents malicious attacks
from intruders. The purpose of Security Tests is to
identify all possible loopholes and weaknesses of the
software system which might result in a loss of
information.
 Penetration testing (or pen-testing) is a security
exercise where a cyber-security expert attempts to
find and exploit vulnerabilities in a computer system.
Phases of hacking

 There are mainly 5 phases in hacking. Not


necessarily a hacker has to follow these 5 steps in
a sequential manner.
 Reconnaissance : It is also called as Foot-printing and
information gathering Phase. This is the preparatory phase
where we collect as much information as possible about the
target.

 Scanning : This phase involves scanning the target for the


information like open ports, Live systems, various services
running on the host.

 Gaining Access :This phase is where an attacker breaks


into the system/network using various tools or methods.
 Maintaining Access : Hacker may just hack the system to
show it was vulnerable or he can be so mischievous that he
wants to maintain or persist the connection in the
background without the knowledge of the user. This can be
done using Trojans, Rootkits or other malicious files.

 Clearing Track : No thief wants to get caught. An


intelligent hacker always clears all evidence so that in the
later point of time, no one will find any traces leading to
him.
Importance of ethical hacker
 The prime purpose of ethical hacking is to prevent sensitive data from falling into
enemy hands.
 It safeguards your company from blackmail by those willing to exploit the
vulnerabilities.
 Via real-world testing, you can enhance your digital network security and prevent
security breaches.
 Ethical hacking can prevent cyber-terrorism and terrorist attacks, ensuring the
safety of the nation.
Common Hacking Techniques

 Social Engineering & Phishing 


 Malware-Injecting Devices
 Cracking Passwords
 Distributed Denial-of-Service (DDoS)
Ways to protect ourselves from
being hacked
 Avoid the use of free Wi-Fi hotspots
 Don’t jailbreak your mobile devices
 Avoid using apps from untrusted sources
 Make sure your security software is up-to-date
 Install antivirus and antimalware software
 Use multifactor authentication
Thank you

You might also like