Top Banner
18
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ethical hacking
Page 2: Ethical hacking

WARNING :

•THIS IS PURELY FOR EDUCATIONAL

PURPOSE AND I AM NOT RESPONSIBLE IF

YOU CRCK SOMWTHING AND GO TO JAIL

FOR YEARS

Page 3: Ethical hacking

HACKER

H-HIDE IP

A-AIM VICTIM

C-CRACK ENCRYPT

K-KILL FIREWALL

E-ENTER INTO DATABASE

R-RETURN ANONYMOUS

Page 4: Ethical hacking

WHAT IS ETHICAL HACKING?

IT IS LEGAL

PERMISSION IS OBTAINED FROM THE TARGET

PART OF AN OVERALL SECURITY PROGRAM

IDENTIFY VULNERABILITIES VISIBLE FROM INTERNET AT PARTICULAR POINT OF

TIME

ETHICAL HACKERS POSSESSES SAME SKILLS, MINDSET AND TOOLS OF A HACKER

BUT THE ATTACKS ARE DONE IN A NON-DESTRUCTIVE MANNER

Page 5: Ethical hacking

WHAT IS HACKING..? &

WHO IS ETHICAL HACKER..?

HACKING is Nothing But an art of using some software and other

resources.

Using these skill for a good Purpose will make you an ethical

hacker and using it with bad intent will make you a malicious Hacker.

Page 6: Ethical hacking

WHY DO HACKERS HACK ?

JUST FOR FUN.

SHOW OFF.

HACK OTHER SYSTEMS SECRETLY.

NOTIFY MANY PEOPLE THEIR THOUGHT.

STEAL IMPORTANT INFORMATION.

DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.

Page 7: Ethical hacking

SKILLS NEEDED

TECHNICAL KNOWLEDGE.

SOFT SKILLS / SOCIAL

ENGINEERING.

BECOMING A CERTIFIED

ETHICAL HACKER (CEH).

Page 8: Ethical hacking

TYPES OF HACKING

WEBSITE HACKING

NETWORK HACKING

EMAIL HACKING

PASSWORD HACKING

ONLINE BANKING HACKING

COMPUTER HACKING

Page 9: Ethical hacking

ADVANTAGES OF HACKING

CAN BE USED TO RECOVER LOST INFORMATION WHERE THE

COMPUTER PASSWORD HAS BEEN LOST.

TEACHES YOU THAT NO TECHNOLOGY IS 100% SECURE.

TO TEST HOW GOOD SECURITY IS ON YOUR OWN NETWORK.

THEY CALL IT WHITE HAT COMPUTER HACKING.

Page 10: Ethical hacking

DISADVANTAGES OF HACKING

CRIMINALS CAN USE IT TO THEIR ADVANTAGE.

IT CAN HARM SOMEONE'S PRIVACY

IT'S ILLEGAL

Page 11: Ethical hacking

Some Famous Hacker

Ian Murphy Kevin Mitnick Johan Helsinguis

Linus Torvald Mark Abene Robert Morris

Page 12: Ethical hacking

WHAT TO DO AFTER BEING HACKED?

SHUTDOWN THE SYSTEM

CLEAR THE MEMORY USING CLEANERS (LIKE CCLEANER)

SCAN INFECTED SECTIONS WITH GOOD ANTIVIRUS

SEPARATE THE SYSTEM FROM NETWORK (DO NOT USE INTERNET)

RESTORE THE SYSTEM WITH THE BACKUP (IF O/S PROBLEM)

FINALLY, CONNECT THE SYSTEM TO THE NETWORK

Page 13: Ethical hacking

Tips on how to not get hacked :

Never entertain any pop-up windows.

Always use VIRTUAL KEYPAD to prevent keyloggers.

Never click suspicious link of an email.

Differentiate original link and fake links properly.

(For example :200.122.14.0/onlinesbi.com is a fake link.)

Page 14: Ethical hacking

Always remain updated.

Be Careful Of What you download.

Please change your Password regularly and remember

to use alphanumeric password.

(For Example : StRongPasswor@145.)

Page 15: Ethical hacking

CONCLUSION

KEEP YOUR PASSWORD PROTECTED. WRITE YOUR PASSWORD

SHOULD BE WITH COMBINATION OF CHARACTERS, DIGITS,

SPECIAL SYMBOLS. DO NOT RESPOND TO FECK ON FISHING EMAIL.

WHEN YOU ARE DOING ANY ONLINE TRANSECTION ALWAYS KEEP

WATCH ON SITE WHETHER THE PROTOCOL OF SITE IS HTTPS &

WHETHER THERE IS A LOCK SYMBOL .

Page 16: Ethical hacking

“Parctice Makes a Man Perfect”

Page 17: Ethical hacking
Page 18: Ethical hacking