Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Ethical hacking presentation


Published on

This is a Ethical Hacking ppt

Published in: Technology, News & Politics
  • Login to see the comments

Ethical hacking presentation

  1. 1. WELCOME
  2. 2. WHAT IS SECURITY  Security is the degree of resistance to, or protection from, harm. It is the state of being free from danger or threat.
  3. 3. Difference Between Security and Protection Security and protection are extremely close concepts though not same.  Security measures are adopted to increase the level of protection The feeling of protection arises when one has enough security measures Security is a type of protection against external threats.
  4. 4. Overview of Hacking  Hack • Examine something very minutely • The rapid crafting of new program or the making of changes to existing, usually complicated software  Hacker • The person who hacks  Cracker • System intruder/ destroyer
  5. 5. History Of Hacking The first hacker was appeared in 1960’s at the Massachusetts Institute Of Technology(MIT) During the 1970’s, a different kind of hacker appeared: Phone Phreaker or Phone Hacker
  6. 6.  In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared  During the 1990’s, when the use of internet widespread around the world, hackers multiplied
  7. 7. Hacker and Ethical Hacker  Hacker • Access computer system or network without authorization • Breaks the law  Ethical Hacker • Performs most of the same activities but with owner’s permission • Employed by companies to perform Penetration Tests
  8. 8. Types of Hacker  White Hat Hacker • Good guys • Don’t use their skill for illegal purpose • Computer security experts and help to protect from Black Hats. Black Hat Hacker • Bad guys • Use their skill maliciously for personal gain • Hack banks, steal credit cards and deface websites  Grey Hat Hacker • It is a combination of White hat n Black Hat Hackers • Goal of grey hat hackers is to provide national security
  9. 9. Hacking Process Footprinting Scanning Enumeration Attack and Gaining Access Escalating Privilege, Covering Tracks and Creating Backdoors
  10. 10. Some Tools • Who is, ping • Traceroot, nslookup Footprinting • nmap • nessus Scanning • Netcat. tcpdump • Telnet, firewalk Enumeration
  11. 11. Some Famous Hacker Ian Murphy Kevin Mitnick Johan Helsinguis Linus Torvald Mark Abene Robert Morris
  12. 12. Recent news of Hacking • Next generation patch management tool released- Secunia CSI 7.0 • Anonymity tool TOR gains more than 1.2 million users since NSA PRISM Scandal • Fear of NSA PRISM : Indian Government may ban US email services for official Communication • CISCO vulnerability allows remote attacker to take control of Windows System • New York Times. Twitter and Huffington Post Domains hijacked by Syrian Electronic Army • FBI uses Anonymous Hackers to attack foreign Governments • Palestinian Hacker , who hacked Zuckerberg’s Facebook Account to be awarded with $12000