SlideShare a Scribd company logo
1 of 149
Ethical Hacking   By Bharat Thakkar
Old School Hackers:  History of Hacking
Old School Hackers: History of Hacking  ,[object Object],[object Object],[object Object],[object Object]
Old School Hackers: History of Hacking  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Old School Hackers: History of Hacking  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Old School Hackers: History of Hacking  ,[object Object],[object Object],[object Object],[object Object]
Old School Hackers: History of Hacking  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Old School Hackers: History of Hacking  ,[object Object],[object Object],[object Object],[object Object]
A Brief History of Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Brief History of Hacking ,[object Object],[object Object],[object Object],[object Object]
Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis Mark Abene Linus Torvalds Robert Morris
Ethical Hacking
Hackers are here. Where are you?   ,[object Object],[object Object],[object Object]
What is Hacking ? ,[object Object],[object Object]
What is Cracking ,[object Object],[object Object]
Misunderstanding Hacking ,[object Object]
Why do People Hack or Crack ,[object Object],[object Object]
What is a Hacker? ,[object Object],[object Object]
What is a Hacker? ,[object Object],[object Object]
Hacker and Ethical hacker ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HACKER DEFINITIONS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Ethical Hacking?   ,[object Object],[object Object]
What is Ethical Hacking?   ,[object Object]
Who are Ethical Hackers?   ,[object Object],[object Object]
Who are Ethical Hackers?   ,[object Object],[object Object],[object Object]
What do Ethical Hackers do?   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What you can do legally as an ethical hacker
What You Can Do Legally ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Is Port Scanning Legal? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Laws ,[object Object],[object Object],[object Object],[object Object]
IT Act, 2000 ,[object Object],[object Object]
Objectives of the IT Act ,[object Object],[object Object],[object Object],[object Object]
Extent of application ,[object Object]
Cybercrime provisions under IT Act,2000   Offences & Relevant   Sections under IT  Act Tampering with Computer source documents  Sec.65 Hacking with Computer systems, Data alteration  Sec.66 Publishing obscene information  Sec.67 Un-authorized access to protected system  Sec.70  Breach of Confidentiality and Privacy  Sec.72 Publishing false digital signature certificates  Sec.73
TYPES OF CYBER CRIMES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Crime against property Crime against Government Crime against persons
What you cannot do as an ethical hacker
What You Cannot Do Legally ,[object Object],[object Object],[object Object],[object Object],[object Object]
What You Cannot Do Legally ,[object Object],[object Object],[object Object],[object Object]
Learning Competencies
Required Skills of an Ethical Hacker ,[object Object],[object Object],[object Object],(Source:  http://www.examcram.com )
Required Skills of an Ethical Hacker ,[object Object],[object Object],[object Object],[object Object],(Source:  http://www.examcram.com )
Modes of Ethical Hacking   By Bharat Thakkar
Modes of Ethical Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],(Source:  http://www.examcram.com )
Anatomy of an Attack ,[object Object],[object Object],[object Object]
Anatomy of an Attack ,[object Object],[object Object]
Classes of Hackers ,[object Object],[object Object],[object Object]
Hactivism
Hactivism ,[object Object],[object Object]
Hactivism ,[object Object]
Hactivism ,[object Object]
Hactivism ,[object Object]
HACKER MOTIVATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TYPICAL HACKER ATTACKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some Statistics ,[object Object],[object Object],[object Object],[object Object]
How to Become a Hacker
How to Become a Hacker ,[object Object]
How to Become a Hacker ,[object Object]
Be Curious ,[object Object]
Read Everything in Sight ,[object Object]
Experiment ,[object Object]
Make Backups ,[object Object]
Don't Limit Yourself ,[object Object]
Don't Limit Yourself ,[object Object]
Get Some Real Tools ,[object Object]
Get Some Real Tools ,[object Object]
Learn to Program ,[object Object]
Learn to Program ,[object Object]
Learn to Program ,[object Object]
Learn to Type ,[object Object]
Use Real Operating Systems ,[object Object]
Talk to People ,[object Object]
Do Some Projects ,[object Object]
Learn to Really Use the Internet ,[object Object]
Learn to Really Use the Internet ,[object Object]
Ethical Hacking  How TO By Bharat Thakkar
How To ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hacking Tools:  Footprinting and Reconnaissance
What is FootPrinting ,[object Object]
What is FootPrinting ,[object Object]
What is FootPrinting ,[object Object]
Whois
Sam Spade
Nslookup
Traceroute
Hacking Tools:  Scanning and Enumeration
Scanning and Enumeration ,[object Object]
Scanning and Enumeration ,[object Object],[object Object]
Scanning and Enumeration ,[object Object]
Scanning and Enumeration ,[object Object],[object Object]
nmap
NMapWin
SuperScan
IP Scanner
Hyena
Retina
Hacking Tools:  System Hacking
System Hacking ,[object Object]
System Hacking ,[object Object]
System Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object]
telnet
Snadboy
Password Cracking with LOphtcrack
Keylogger
Hacking Tools:  Trojans and Backdoors
Trojans and Backdoors ,[object Object]
NetBus
Game Creates Backdoor for NetBus
SubSeven
Hacking Tools:  Sniffers
Sniffers ,[object Object],[object Object],[object Object]
Spoofing a MAC address Original Configuration
Spoofed Mac
Ethereal
Iris
Snort
Hacking Tools:  Web Based Password Cracking
Cain and Abel
Cain and Abel (Cont.)
Legion
Brutus
Hacking Tools:  Covering Tracks
ImageHide
ClearLogs
Hacking Tools:  Google Hacking and SQL Injection
Google Hacking
Google Cheat Sheet
SQL Injection ,[object Object],[object Object],[object Object],[object Object]
Common Database Query
Problem: Unvalidated Input
Piggybacking Queries with UNION
Phreaking
What is Phreaking ,[object Object]
Why Phreak ,[object Object]
Boxes and what they do ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Boxes and what they do ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Boxes and what they do ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Boxes and what they do ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hacker Challenge Websites
hackr http://www.hackr.org/mainpage.php
Hackthissite.org http://www.hackthissite.org
Hackits http://www.hackits.de/challenge/
Additional Web Sites
Legion of Ethical Hacking
Hacker Highschool http://www.hackerhighschool.org/
johnny.ihackstuff.com/
HappyHacker.org
Foundstone
Insecure.org
Thankyou Bharat Thakkar Email : bharatthakkar61@gmail.com Cell : +91-93769 22853 Cell : +91-90169 86926

More Related Content

What's hot

What's hot (20)

ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Hacking
HackingHacking
Hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber security
Cyber securityCyber security
Cyber security
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 

Similar to Course on Ehtical Hacking - Introduction

Similar to Course on Ehtical Hacking - Introduction (20)

Hacking
HackingHacking
Hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Hacking
HackingHacking
Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 

Recently uploaded

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Recently uploaded (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

Course on Ehtical Hacking - Introduction

Editor's Notes

  1. In UK and Germany, Using or writing real hacking tools like Nessus, Metasploit, Hydra, Amap, John, other exploits are fairly telltale illegal Some people against this idea claim that “If you own a crow bar, a favored tool for breaking through locked doors, that’s fine. If you own a baseball bat, a wonderful tool which many put to use bashing in people’s skulls, that’s fine. Own a piece of software that can port scan, and you break the law.”
  2. - Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist . A hacktivist uses the same tools and techniques as a hacker , but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site. A recent demonstration of hacktivism followed the death of a Chinese airman when his jet fighter collided with a U.S. surveillance plane in April 2001. Chinese and American hacktivists from both countries hacked Web sites and used them as "blackboards" for their statements. Whether hacktivism is a crime may be debated. Opponents argue that hacktivism causes damage in a forum where there is already ample opportunity for nondisruptive free speech. Others insist that such an act is the equivalent of a protest and is therefore protected as a form of free speech.