WARNING :
•THIS IS PURELY FOR EDUCATIONAL
PURPOSE AND I AM NOT RESPONSIBLE IF
YOU CRCK SOMWTHING AND GO TO JAIL
FOR YEARS
HACKER
H-HIDE IP
A-AIM VICTIM
C-CRACK ENCRYPT
K-KILL FIREWALL
E-ENTER INTO DATABASE
R-RETURN ANONYMOUS
WHAT IS ETHICAL HACKING?
IT IS LEGAL
PERMISSION IS OBTAINED FROM THE TARGET
PART OF AN OVERALL SECURITY PROGRAM
IDENTIFY VULNERABILITIES VISIBLE FROM INTERNET AT PARTICULAR POINT OF
TIME
ETHICAL HACKERS POSSESSES SAME SKILLS, MINDSET AND TOOLS OF A HACKER
BUT THE ATTACKS ARE DONE IN A NON-DESTRUCTIVE MANNER
WHAT IS HACKING..? &
WHO IS ETHICAL HACKER..?
HACKING is Nothing But an art of using some software and other
resources.
Using these skill for a good Purpose will make you an ethical
hacker and using it with bad intent will make you a malicious Hacker.
WHY DO HACKERS HACK ?
JUST FOR FUN.
SHOW OFF.
HACK OTHER SYSTEMS SECRETLY.
NOTIFY MANY PEOPLE THEIR THOUGHT.
STEAL IMPORTANT INFORMATION.
DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.
SKILLS NEEDED
TECHNICAL KNOWLEDGE.
SOFT SKILLS / SOCIAL
ENGINEERING.
BECOMING A CERTIFIED
ETHICAL HACKER (CEH).
TYPES OF HACKING
WEBSITE HACKING
NETWORK HACKING
EMAIL HACKING
PASSWORD HACKING
ONLINE BANKING HACKING
COMPUTER HACKING
ADVANTAGES OF HACKING
CAN BE USED TO RECOVER LOST INFORMATION WHERE THE
COMPUTER PASSWORD HAS BEEN LOST.
TEACHES YOU THAT NO TECHNOLOGY IS 100% SECURE.
TO TEST HOW GOOD SECURITY IS ON YOUR OWN NETWORK.
THEY CALL IT WHITE HAT COMPUTER HACKING.
DISADVANTAGES OF HACKING
CRIMINALS CAN USE IT TO THEIR ADVANTAGE.
IT CAN HARM SOMEONE'S PRIVACY
IT'S ILLEGAL
WHAT TO DO AFTER BEING HACKED?
SHUTDOWN THE SYSTEM
CLEAR THE MEMORY USING CLEANERS (LIKE CCLEANER)
SCAN INFECTED SECTIONS WITH GOOD ANTIVIRUS
SEPARATE THE SYSTEM FROM NETWORK (DO NOT USE INTERNET)
RESTORE THE SYSTEM WITH THE BACKUP (IF O/S PROBLEM)
FINALLY, CONNECT THE SYSTEM TO THE NETWORK
Tips on how to not get hacked :
Never entertain any pop-up windows.
Always use VIRTUAL KEYPAD to prevent keyloggers.
Never click suspicious link of an email.
Differentiate original link and fake links properly.
(For example :200.122.14.0/onlinesbi.com is a fake link.)
Always remain updated.
Be Careful Of What you download.
Please change your Password regularly and remember
to use alphanumeric password.
(For Example : StRongPasswor@145.)
CONCLUSION
KEEP YOUR PASSWORD PROTECTED. WRITE YOUR PASSWORD
SHOULD BE WITH COMBINATION OF CHARACTERS, DIGITS,
SPECIAL SYMBOLS. DO NOT RESPOND TO FECK ON FISHING EMAIL.
WHEN YOU ARE DOING ANY ONLINE TRANSECTION ALWAYS KEEP
WATCH ON SITE WHETHER THE PROTOCOL OF SITE IS HTTPS &
WHETHER THERE IS A LOCK SYMBOL .