Top Banner
Ethical Hacking
21

Ethical Hacking

Jan 07, 2017

Download

Deepika Walia
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ethical Hacking

Ethical Hacking

Page 2: Ethical Hacking

Contents to be study Meaning Of Hacking-

HackerHistoryTypes Of HackersWhy Hackers Hack ?Levels Of HackingProcess of HackingIs Hacking a Crime ?Offences and Penalties under IT, Act 2000

Page 3: Ethical Hacking

What is HACKING ?Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, called a hacker.Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.

Page 4: Ethical Hacking

History Of HackingThe First Hacker was appeared in

1960 at the MIT's artificial intelligence lab.

During the 1970 , a different kind of hacker appeared. ( Phone Hacker)

…John Draper

Page 5: Ethical Hacking

In the 1980, phearks started to migrate the computers and the first BULLETIN BOARD SYSTEM (BBS) appeared.

During the 1990, when the use of internet widespread around the world, HACKERS multiplied.

Page 6: Ethical Hacking

Who Is Hacker ?An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.

Page 7: Ethical Hacking

Types Of Hackers :-I. Script Kiddies II. White Hat ( Normally known

as ETHICAL HACKERS)III. Black Hat ( Also Known as

CRACKERS)IV. Gray HatV. Green HatVI. Red Hat VII.Blue Hat

Page 8: Ethical Hacking

Scr

Script Kiddies Young in-

Experienced Hackers.

Copy Codes and techniques from Knowledgeable Hackers.

Use techniques for fun purpose.

Sometimes could be very dangerous for the system.

Page 9: Ethical Hacking

White Hat Hackers :-These are good hackers.Have genuine license to hack.Have registered police records.Evolves themselves in good work.Generally owned by the companies for security designing.Have high pay scales.Generally these are coders.

Page 10: Ethical Hacking

Black Hat Hackers :-Very Dangerous Persons. Always motive to earn huge profits.Highly paid persons.Evolves mostly in criminal activities.These could be coders, admins as well as script kidders.

Page 11: Ethical Hacking

Why Do Hackers Hack ?To Gain Information.

To Promote Their Website.

To Make Statement.

Page 12: Ethical Hacking

The Levels Of HackingScript KiddiesThe Hacking Group: HacktivistsBlack Hat ProfessionalsOrganized Criminal Gangs: Nation StatesThe Automated Tool

Page 13: Ethical Hacking

Process Of Hacking 1)Reconnaissance/Foot

printing2)Scanning3)Enumeration4)System Hacking (Follows

Enumeration)5)Escalation of privileges6)Covering your tracks7)Planting backdoors

(enabling points of re-entry)

Page 14: Ethical Hacking

Is Ethical Hacking- A crime or not ?No, Ethical Hacking is not a crime…… Because , Completely

Trustworthy. Strong

Programming $Computer networking skills.

Learn about the system and trying to find its weaknesses.

Published research papers or released security software.

No Ex-Hackers. Techniques of

Criminal Hackers-Detection-Preventions.

Page 15: Ethical Hacking

Penalties under IT Act, 2000 Hacking Of Computer

System.A. Penalty for breach of

any Privacy.B. Punishment for Theft.C. Punishment for criminal

Breach of trust.D. Punishment for

Trespass

Page 16: Ethical Hacking

Sec 66 (2) – Hacking of Computer System.

Whoever Commits Hacking Shall be punished with imprisonment up to 3 Years or fine extend up to 2 lakh rupees or both.

Page 17: Ethical Hacking

Sec 72 – Plenty for breach of confidential and Privacy.If any person who, in pursuance of any powers conferred under this Act, Rules or Regulations made there under, has secured access to any electronic record, book register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book, register, correspondence, information, document, or other material to any other person shall be punished with imprisonment for a term which may extend to two years , or with fine which may extend to one lakh rupees, or with both.”

Page 18: Ethical Hacking

Sec.379-Punishment for Theft

Whoever commits theft shall be punished with imprisonment of either description for a term which may extend to three years , or with fine, or with both.”

Page 19: Ethical Hacking

Sec. 406 – Punishment for criminal breach of trust.

“ Whoever commits criminal breach of trust shall be punished with imprisonment of either description for a term which may extend to three years , or with fine, or with both.”

Page 20: Ethical Hacking

Sec. 447 – Punishment for criminal trespass

“ Whoever commits criminal trespass shall be punished with imprisonment of either description for a term which may extend to three months , or with fine which may extend to five hundred rupees, or with both.” 

Page 21: Ethical Hacking