SlideShare une entreprise Scribd logo
1  sur  24
KNOW ABOUT : 
WHAT IS HACKING? 
HACKERS 
TYPES OF HACKING 
WHAT IS ETHICAL HACKING? 
DIFFERENT LEVELS IN HACKERS
What is Hacking? 
 Hacking is simply 
. 
 It is the act of breaking in to a computer 
system and is a criminal offence under the 
computer misuse. 
 
.
Types Of Hacking : 
• : 
- It include stealing passwords (which hackers 
then use or sell) 
- Performing industrial espionage 
- causing harm (as disgruntled employees) 
- committing simple misuse.
• : 
- Rogue access points (APs) are unsecured 
wireless access points that outsiders can easily 
breech. (Local hackers often advertise rogue 
APs to each other.) 
- Rogue APs are most often connected by well-meaning 
but ignorant employees.
• : 
- Hackers can gain access to a network by 
exploiting back doors administrative 
shortcuts, configuration errors, easily 
deciphered passwords, and unsecured dial-ups. 
- With the aid of computerized searchers 
(bots), hackers can probably find any 
weakness in your network.
• : 
- Viruses and worms are self-replicating 
programs or code fragments that attach 
themselves to other programs (viruses) or 
machines (worms). 
- Both attempt to shut down networks by 
flooding them with massive amounts of bogus 
traffic, usually through e-mail.
• : 
-Trojan horses, which are attached to other 
programs, are the leading cause of all break-ins. 
- When a user downloads and activates a 
Trojan horse, the hacked software (SW) kicks 
off a virus, password gobbler, or remote-control 
SW that gives the hacker control of the 
PC.
• : 
- DoS attacks give hackers a way to bring down 
a network without gaining internal access. 
- DoS attacks work by flooding the access 
routers with bogus traffic (which can be e-mail 
or Transmission Control Protocol, TCP, 
packets). 
- Distributed DoSs are coordinated DoS attacks 
from multiple sources. DDoS is more difficult 
to block because it uses multiple, changing, 
source IP addresses.
• 
: 
are people who just like to break 
stuff. They usually exploit any target of 
opportunity. 
are hobbyists or professionals who 
break passwords and develop Trojan horses or 
other SW (called warez). They either use the 
SW themselves (for bragging rights) or sell it 
for profit.
are hacker wannabes. They 
have no real hacker skills, so they buy or 
download warez, which they launch. 
Other attackers include disgruntled employees, 
terrorists, political operatives, or anyone else 
who feels slighted, exploited, ripped off, or 
unloved.
• : 
- Sniffing refers to the act of intercepting TCP 
packets. This interception can happen through 
simple eavesdropping or something more 
sinister. 
- Spoofing is the act of sending an illegitimate 
packet with an expected acknowledgment 
(ACK), which a hacker can guess, predict, or 
obtain by snooping.
- 
. However, 
hackers have also developed new skills that 
allow them to break into more complex 
systems. 
- Hacking typically involves compromising the 
security of networks, breaking the security of 
application software, or creating malicious 
programs such as viruses.
- Most popular forms of network hacking are 
denial of service (DoS) attacks and mail bombs. 
- DoS attacks are designed to swamp a 
computer network, causing it to crash. 
- Mail bombs act in a similar fashion, but attack 
the network's mail servers. 
-Web server are bombarded with fake requests 
for Web pages, which overloads the site and 
caused it to crash.
- Network hackers also try to break into secure 
areas to find sensitive data. Once a network is 
hacked, files can be removed, stolen, or erased. 
- Application hackers break security on 
application software-software including word 
processing and graphics programs-in order to 
get it for free.
- One way they gain access to software that 
requires a serial number for installation is by 
setting up a serial number generator that will 
try millions of different combinations until a 
match is found. 
- Application hackers also sometimes attack 
the program itself in an attempt to remove 
certain security features.
-Hackers that create viruses, logic bombs, 
worms, and Trojan horses are involved in 
perhaps the most malicious hacking activities. 
-A virus is a program that has the potential to 
attack and corrupt computer files by attaching 
itself to a file to replicate itself. 
- It can also cause a computer to crash by 
utilizing all of the computer's resources.
What is ethical hacking ? 
Ethical hacking is where 
. 
Ex. : A bank may pay a hacker to hack their 
systems to see if it is hackable. If he gets in, 
then they know there is potential for other 
people to hack in, and usually they will work 
with this ethical hacker to patch these holes. If 
he doesn't get in, then they pray that nobody is 
better at hacking than him.
A hacker looks at it this 
way. The RFC says to load an instruction into 
memory, use 8 bits of data, and two bits of 
instruction, then a hacker looks at this and 
wonders, and tries to pass more no. of bits . 
- As results sooner or later the computer will 
not be able to deal with the amount of data 
being passed in a manner it understands & the 
computer will not know how to interpret the 
instructions.
When a computer does not know what to do 
next, it gives up and passes control to the 
SYSTEM, which is all powerful. 
This is a very basic description of a buffer 
overflow. 
Once this happens, the hacker has 
administrative control and can now start 
passing commands to the computer that it will 
follow without question.
Different levels in hackers 
• There are three levels of hackers. 
spend all their time trying to 
break the system, to prove it can be broke, so 
they can get the manufacturer to address the 
problem and fix it. 
do same thing, but perhaps will try 
to gain from their new way of breaking the 
system. They may expect payment for finding a 
way to break the system, & they may even try 
to get financial gain from their knowledge or 
silence.
- want to take the knowledge of how 
to break a system and use it for financial gain. 
They may use it to hack systems or write code 
that allows others to hack systems, and sell 
that code.
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)

Contenu connexe

Tendances

Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingNitish Kasar
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in TeluguSravani Reddy
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical HackingVamshi TG
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2mubeenm50
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 

Tendances (20)

Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical Hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
hacking
hackinghacking
hacking
 
Hacking
HackingHacking
Hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 

En vedette

Hackers guide to Startup Weekend
Hackers guide to Startup WeekendHackers guide to Startup Weekend
Hackers guide to Startup WeekendBrad Oyler
 
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest DisclosureOpen Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest DisclosureEthisphere
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwonThe basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwonKenneth Kwon
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

En vedette (7)

Hackers guide to Startup Weekend
Hackers guide to Startup WeekendHackers guide to Startup Weekend
Hackers guide to Startup Weekend
 
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest DisclosureOpen Disclosure: Why and How to manage Conflict of Interest Disclosure
Open Disclosure: Why and How to manage Conflict of Interest Disclosure
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwonThe basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similaire à Introduction to Ethical Hacking (Basics)

Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenKlaus Drosch
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With GflixacademyGaurav Mishra
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hackingBeing Uniq Sonu
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 

Similaire à Introduction to Ethical Hacking (Basics) (20)

Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Security threats
Security threatsSecurity threats
Security threats
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking
HackingHacking
Hacking
 

Dernier

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Dernier (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Introduction to Ethical Hacking (Basics)

  • 1.
  • 2. KNOW ABOUT : WHAT IS HACKING? HACKERS TYPES OF HACKING WHAT IS ETHICAL HACKING? DIFFERENT LEVELS IN HACKERS
  • 3. What is Hacking?  Hacking is simply .  It is the act of breaking in to a computer system and is a criminal offence under the computer misuse.  .
  • 4. Types Of Hacking : • : - It include stealing passwords (which hackers then use or sell) - Performing industrial espionage - causing harm (as disgruntled employees) - committing simple misuse.
  • 5. • : - Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) - Rogue APs are most often connected by well-meaning but ignorant employees.
  • 6. • : - Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. - With the aid of computerized searchers (bots), hackers can probably find any weakness in your network.
  • 7. • : - Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). - Both attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.
  • 8. • : -Trojan horses, which are attached to other programs, are the leading cause of all break-ins. - When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus, password gobbler, or remote-control SW that gives the hacker control of the PC.
  • 9. • : - DoS attacks give hackers a way to bring down a network without gaining internal access. - DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets). - Distributed DoSs are coordinated DoS attacks from multiple sources. DDoS is more difficult to block because it uses multiple, changing, source IP addresses.
  • 10. • : are people who just like to break stuff. They usually exploit any target of opportunity. are hobbyists or professionals who break passwords and develop Trojan horses or other SW (called warez). They either use the SW themselves (for bragging rights) or sell it for profit.
  • 11. are hacker wannabes. They have no real hacker skills, so they buy or download warez, which they launch. Other attackers include disgruntled employees, terrorists, political operatives, or anyone else who feels slighted, exploited, ripped off, or unloved.
  • 12. • : - Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister. - Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.
  • 13. - . However, hackers have also developed new skills that allow them to break into more complex systems. - Hacking typically involves compromising the security of networks, breaking the security of application software, or creating malicious programs such as viruses.
  • 14. - Most popular forms of network hacking are denial of service (DoS) attacks and mail bombs. - DoS attacks are designed to swamp a computer network, causing it to crash. - Mail bombs act in a similar fashion, but attack the network's mail servers. -Web server are bombarded with fake requests for Web pages, which overloads the site and caused it to crash.
  • 15. - Network hackers also try to break into secure areas to find sensitive data. Once a network is hacked, files can be removed, stolen, or erased. - Application hackers break security on application software-software including word processing and graphics programs-in order to get it for free.
  • 16. - One way they gain access to software that requires a serial number for installation is by setting up a serial number generator that will try millions of different combinations until a match is found. - Application hackers also sometimes attack the program itself in an attempt to remove certain security features.
  • 17. -Hackers that create viruses, logic bombs, worms, and Trojan horses are involved in perhaps the most malicious hacking activities. -A virus is a program that has the potential to attack and corrupt computer files by attaching itself to a file to replicate itself. - It can also cause a computer to crash by utilizing all of the computer's resources.
  • 18. What is ethical hacking ? Ethical hacking is where . Ex. : A bank may pay a hacker to hack their systems to see if it is hackable. If he gets in, then they know there is potential for other people to hack in, and usually they will work with this ethical hacker to patch these holes. If he doesn't get in, then they pray that nobody is better at hacking than him.
  • 19. A hacker looks at it this way. The RFC says to load an instruction into memory, use 8 bits of data, and two bits of instruction, then a hacker looks at this and wonders, and tries to pass more no. of bits . - As results sooner or later the computer will not be able to deal with the amount of data being passed in a manner it understands & the computer will not know how to interpret the instructions.
  • 20. When a computer does not know what to do next, it gives up and passes control to the SYSTEM, which is all powerful. This is a very basic description of a buffer overflow. Once this happens, the hacker has administrative control and can now start passing commands to the computer that it will follow without question.
  • 21. Different levels in hackers • There are three levels of hackers. spend all their time trying to break the system, to prove it can be broke, so they can get the manufacturer to address the problem and fix it. do same thing, but perhaps will try to gain from their new way of breaking the system. They may expect payment for finding a way to break the system, & they may even try to get financial gain from their knowledge or silence.
  • 22. - want to take the knowledge of how to break a system and use it for financial gain. They may use it to hack systems or write code that allows others to hack systems, and sell that code.