NOTHING IS ILLEGAL UNTIL YOU GET CAUGHT
HACKING IS NOT A CRIME
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
TYPES OF HACKERS
1. Black Hat Hackers 2. White Hat Hackers
3. Grey Hat Hackers4. Script kiddies
BLACK HAT HACKERS
1. Black Hat hackers always do illegal work. TheyWork for black money . They hack into to Bank Websites , credit card websites and stole Money from accounts in bank websites.
2. They are professionals in their fields.
3. They use their knowledge for illegal purposes.
WHITE HAT
HACKERS
1 . White hat hackers are like Ethical Hackers . They use their skills for good purposes.
2. They work for organizations for stop the illegal activities through black hat hackers.
GREY HAT HACKERS
1. Grey Hat hackers have both qualities like black hat hackers and white hat hackers .
2. They use their knowledge for bad purposes and good purposes too.
SCRIPT KID
DIES
1. Script kiddies hacks into computer or websites using the tools available on the internet .
2. They don’t have knowledge of programming .
ETHICAL HACK
ING
WHAT IS ETHICAL HACKING
Independent computer security Professionals breaking into the computer systems.
Neither damage the target systems nor steal information.
Evaluate target systems security and report back to owners about the vulnerabilities found
INTRODUCTION TO ETHICAL HACKING
Ethical hackers Employed by companies to perform
penetration tests
Penetration test Legal attempt to break into a company’s
network to find its weakest link Tester only reports findings, does not solve
problems
THE ROLE OF SECURITY AND PENETRATION TESTS
Hackers Access computer system or network without
authorization Breaks the law; can go to prison
Crackers Break into systems to steal or destroy data U.S. Department of Justice calls both hackers
Ethical hacker Performs most of the same activities but with
owner’s permission
BENEFITS OF ETHICAL HACKING
1. Certified Ethical Hacker
2. Perform hacking operation into network with owner’s permission
3. Penetrate the websites and networks with
Authorization
STEPS TO PERFORM ETHICAL HACKING•Information gathering
•Scanning
•Analyze System
•Prepare for attack
•Access the system
•Maintaining Access
SOME BLACK HAT HACKERS
1. Kevin Poulsen
2. Kevin d Mitnick
3. Adrain Lamo
4. George Hotz
5. Jonathan james
SOME WHITE HAT HACKERS
1. Tim berner Lee
2. Bill Gates
3. Linus Tovaldes
4. Steve Jobs
5. Steve Wozniak
ANY QUERY