INTEGRAL UNIVERSITY LUCKNOW
Ethical Hacking
By
Jayashwa Singh Chauhan
BCA 2nd Year
Group-B
History Of Hacking
The first hacker was appeared in 1960s at the
Massachusetts Institute Of Technology(MIT)
During the 1970s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
During the 1990s, when the use of internet
widespread around the world, hackers multiplied
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 2
What is Hacking?
Process of breaking into systems for:
Personal or Commercial Gains
Malicious Intent Causing sever damage to
Information & Assets
Accessing computer system or network
without authorization.
INTEGRAL UNIVERSITY LUCKNOW 3
Introduction to Ethical Hacking
It is Legal
Permission is obtained from the target
Part of an overall security program
Identify vulnerabilities visible from Internet at
particular point of time
Ethical hackers possesses same skills,
mindset and tools of a hacker but the attacks
are done in a non-destructive manner
INTEGRAL UNIVERSITY LUCKNOW 4
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 5
Who is a hacker?
Hackers are developers.
Hackers are those geeks and scientists who provide
IT solutions to real life problems.
Hackers think beyond the boundaries
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 6
Why Ethical Hacking
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 7
Hacker Classes
White Hat Hacker
Good guys
Dont use their skill for illegal purpose
Computer security experts and help to protect from Black Hats.
Black Hat Hacker
Bad guys
Use their skill maliciously for personal gain
Hack banks, steal credit cards and deface websites
Grey Hat Hacker
It is a combination of White hat n Black Hat Hackers
Goal of grey hat hackers is to provide national security
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 8
Hacking Process
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 9
Footprinting
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 10
Enumeration
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 11
Identification of Vulnerabilities, Gaining Access
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 12
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 13
Creator of Dendroid
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 14
What is Social Engineering?
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 15
Factors that Make Companies
Vulnerable to Attacks
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 16
Why Social Engineering is Effective?
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 17
Phases in a Social Engineering Attack
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 18
Types of Social Engineering
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 19
Computer-Based Social Engineering: Pop-Ups
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 20
Computer-Based Social Engineering: Phishing
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 21
Mobile-Based Social Engineering : Publishing Malicious Apps
5/16/17 09:59:31 AM INTEGRAL UNIVERSITY LUCKNOW 22
Social Engineering Countermeasures
5/16/17 09:59:31 AM INTEGRAL UNIVERSITY LUCKNOW 23
Thank You
24