Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
179 views24 pages

Ethical Hacking by Jay

The document discusses the history and concepts of ethical hacking. It begins by covering the origins of hacking in the 1960s and 1970s and how it has evolved since the 1990s with internet proliferation. It defines hacking as accessing computer systems without authorization and explains ethical hacking involves obtaining permission to identify vulnerabilities. It outlines the different types of hackers - white hat, black hat, and grey hat - and explains the ethical hacking process which includes steps like footprinting, enumeration, and identifying vulnerabilities. The document also covers social engineering techniques used by hackers like phishing and publishing malicious apps, as well as defenses against social engineering attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
179 views24 pages

Ethical Hacking by Jay

The document discusses the history and concepts of ethical hacking. It begins by covering the origins of hacking in the 1960s and 1970s and how it has evolved since the 1990s with internet proliferation. It defines hacking as accessing computer systems without authorization and explains ethical hacking involves obtaining permission to identify vulnerabilities. It outlines the different types of hackers - white hat, black hat, and grey hat - and explains the ethical hacking process which includes steps like footprinting, enumeration, and identifying vulnerabilities. The document also covers social engineering techniques used by hackers like phishing and publishing malicious apps, as well as defenses against social engineering attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

INTEGRAL UNIVERSITY LUCKNOW

Ethical Hacking
By
Jayashwa Singh Chauhan

BCA 2nd Year


Group-B
History Of Hacking

The first hacker was appeared in 1960s at the


Massachusetts Institute Of Technology(MIT)
During the 1970s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker

During the 1990s, when the use of internet


widespread around the world, hackers multiplied

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 2


What is Hacking?

Process of breaking into systems for:


Personal or Commercial Gains
Malicious Intent Causing sever damage to
Information & Assets
Accessing computer system or network
without authorization.

INTEGRAL UNIVERSITY LUCKNOW 3


Introduction to Ethical Hacking

It is Legal
Permission is obtained from the target
Part of an overall security program
Identify vulnerabilities visible from Internet at
particular point of time
Ethical hackers possesses same skills,
mindset and tools of a hacker but the attacks
are done in a non-destructive manner

INTEGRAL UNIVERSITY LUCKNOW 4


5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 5
Who is a hacker?

Hackers are developers.


Hackers are those geeks and scientists who provide
IT solutions to real life problems.
Hackers think beyond the boundaries

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 6


Why Ethical Hacking

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 7


Hacker Classes

White Hat Hacker


Good guys
Dont use their skill for illegal purpose
Computer security experts and help to protect from Black Hats.

Black Hat Hacker


Bad guys
Use their skill maliciously for personal gain
Hack banks, steal credit cards and deface websites

Grey Hat Hacker


It is a combination of White hat n Black Hat Hackers
Goal of grey hat hackers is to provide national security

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 8


Hacking Process

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 9


Footprinting

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 10


Enumeration

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 11


Identification of Vulnerabilities, Gaining Access

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 12


5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 13
Creator of Dendroid
5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 14
What is Social Engineering?

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 15


Factors that Make Companies
Vulnerable to Attacks

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 16


Why Social Engineering is Effective?

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 17


Phases in a Social Engineering Attack

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 18


Types of Social Engineering

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 19


Computer-Based Social Engineering: Pop-Ups

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 20


Computer-Based Social Engineering: Phishing

5/16/17 09:59:30 AM INTEGRAL UNIVERSITY LUCKNOW 21


Mobile-Based Social Engineering : Publishing Malicious Apps

5/16/17 09:59:31 AM INTEGRAL UNIVERSITY LUCKNOW 22


Social Engineering Countermeasures

5/16/17 09:59:31 AM INTEGRAL UNIVERSITY LUCKNOW 23


Thank You

24

You might also like