際際滷

際際滷Share a Scribd company logo
ETHICAL HACKING AND EMAIL
SCRAPPING ON OPEN PORTS
Presented By:- Sourabh Ruhil
A501132520016
Btech(AIML)
Sem 5
Guides:
Dr. Rajesh Tyagi Dr. Anil
Mishra
Professor Professor
Amity School of Engineering and
Technology
CONTENT
 Introduction
 Ethical Hacking
 Using kali Linux
 Who are Hackers
 Port Scanning
 Types of Hackers
 Hacking Process
 Why do We need Ethical Hacking
 Required Skills of an Ethical
Hacker
 Email Scrapping
 Advantages
 Disadvantages
 Future Enhancements
 Conclusion
INTRODUCTION
 Ethical hacking also known as penetration testing or white-hat hacking,
involves the same tools, tricks, and techniques that hackers use,but with
one major difference that Ethical hacking is legal.
ETHICAL HACKING
 Independent computer security Professionals breaking into the computer
systems.
 Neither damage the target systems nor steal information.
 Evaluate target systems security and report back to owners about the bugs
found.
WHO ARE HACKERS?
 A person who enjoys learning details of a
programming language or system.
 A person who enjoys actually doing the
programming rather than just theorizing about it.
 A person capable of appreciating someone else's
hacking.
 A person who picks up programming quickly.
 A person who is an expert at a particular
programming language or system.
PORT SCANNING :
 port scan is a common technique hackers use to discover
open doors or weak points in a network. A port scan attack
helps cyber criminals find open ports and figure out whether
they are receiving or sending data. It can also reveal
whether active security devices like firewalls are being used
by an organization.
When hackers send a message to a port, the response they
receive determines whether the port is being used and if
there are any potential weaknesses that could be exploited.
TYPES OF HACKERS
 Black Hat Hacker
 White Hat Hacker
 Grey Hat Hacker
BLACK-HAT HACKER
 A black hat hackers or crackers are individuals with extraordinary
computing skills, resorting to malicious or destructive activities.
 That is black hat hackers use their knowledge and skill for their own
personal gains probably by hurting others.
WHITE-HAT HACKER
 White hat hackers are those individuals professing hacker skills and using
them for defensive purposes.
 This means that the white hat hackers use their knowledge and skill for the
good of others and for the common good.
GREY-HAT HACKERS
 These are individuals who work both offensively and defensively at various
times.
 We cannot predict their behavior.
 Sometimes they use their skills for the common good while in some other
times he uses them for their personal gains.
HACKING PROCESS
 Foot Printing
 Scanning
 Gaining Access
 Maintaining Access
FOOT PRINTING
 Whois lookup
 NS lookup
 IP lookup
SCANNING
 Port Scanning
 Network Scanning
 Finger Printing
 Fire Walking
GAINING ACCESS
 Password Attacks
 Social Engineering
 Viruses
MAINTAINING ACCESS
 Os BackDoors
 Trojans
 Clears Tracks
WHY DO YOU NEED ETHICAL HACKING
 Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks
Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks
Restricted Data Protection from possible External Attacks
REQUIRED SKILLS OF AN ETHICAL HACKER
 Microsoft: skills in operation, configuration and management.
 Linux: knowledge of Linux/Unix; security setting, configuration, and
services.
 Firewalls: configurations, and operation of intrusion detection systems.
EMAIL SCRAPPING
 Email scraping is a method of obtaining email information by
automatically extracting the necessary data from another source.
 The information that you receive can be either publicly available
or private, depending on authorization settings and how its
stored.
ADVANTAGES
 To catch a thief you have to think like a thief.
 Helps in closing the open holes in the system network.
 Provides security to banking and financial establishments.
 Prevents website defacements.
 An evolving technique.
DISADVANTAGES
 All depends upon the trustworthiness of the ethical hacker
 Hiring professionals is expensive.
CONCLUSION
 In the preceding sections we saw the methodology of hacking, why should
we aware of hacking and some tools which a hacker may use.
 Now we can see what can we do against hacking or to protect ourselves
from hacking.
 The first thing we should do is to keep ourselves updated about those
softwares we and using for official and reliable sources.
 Educate the employees and the users against black hat hacking.
REFERENCES
 www.google.com
 www.wikipedia.org
 www.tutorialspoint.com

More Related Content

Similar to sourabh_sipPPT.pptx (20)

PPTX
Jaishreeethicalhackingppt-171011183223.pptx
jaiswalanita056588
PPTX
Presentation on Ethical Hacking ppt
Shravan Sanidhya
DOCX
Ethical hacking
Nitheesh Adithyan
PPTX
Cse ethical hacking ppt
shreya_omar
PPT
Ethical hacking presentation
Georgekutty Francis
RTF
Hacking and its types
Rishab Gupta
PPTX
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
PPTX
ethical hacking.pptx
daxgame
PPTX
Ethical hacking
Ritwick Mukherjee
PPTX
Summer training in jaipur
cyber cure
PPTX
Ethical-Hacking-ppt.pptx
MaheshDhope1
PPTX
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
GovandJamalSaeed
PPTX
Ethical Hacking.pptx
MadhuKumar114889
PPTX
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
PPTX
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
SantoshChintawar
PPTX
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
PPTX
Ethical hacking
Anumadil1
DOCX
Ethical hacking.
Khushboo Aggarwal
PPT
Ethi mini - ethical hacking
Being Uniq Sonu
DOCX
Full seminar report on ethical hacking
Georgekutty Francis
Jaishreeethicalhackingppt-171011183223.pptx
jaiswalanita056588
Presentation on Ethical Hacking ppt
Shravan Sanidhya
Ethical hacking
Nitheesh Adithyan
Cse ethical hacking ppt
shreya_omar
Ethical hacking presentation
Georgekutty Francis
Hacking and its types
Rishab Gupta
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
ethical hacking.pptx
daxgame
Ethical hacking
Ritwick Mukherjee
Summer training in jaipur
cyber cure
Ethical-Hacking-ppt.pptx
MaheshDhope1
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
GovandJamalSaeed
Ethical Hacking.pptx
MadhuKumar114889
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
SantoshChintawar
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
Ethical hacking
Anumadil1
Ethical hacking.
Khushboo Aggarwal
Ethi mini - ethical hacking
Being Uniq Sonu
Full seminar report on ethical hacking
Georgekutty Francis

Recently uploaded (20)

PDF
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...
ijujournal
PDF
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
PPTX
Artificial Intelligence jejeiejj3iriejrjifirirjdjeie
VikingsGaming2
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
PDF
Generative AI & Scientific Research : Catalyst for Innovation, Ethics & Impact
AlqualsaDIResearchGr
PPTX
ASBC application presentation template (ENG)_v3 (1).pptx
HassanMohammed730118
PPTX
Introduction to File Transfer Protocol with commands in FTP
BeulahS2
PDF
June 2025 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
PPTX
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
PDF
LLC CM NCP1399 SIMPLIS MODEL MANUAL.PDF
ssuser1be9ce
PPTX
Precooling and Refrigerated storage.pptx
ThongamSunita
PPTX
FSE_LLM4SE1_A Tool for In-depth Analysis of Code Execution Reasoning of Large...
cl144
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
PDF
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
PPTX
CST413 KTU S7 CSE Machine Learning Neural Networks and Support Vector Machine...
resming1
PDF
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
PPT
惆惘悋愕悸 忰悋 惘悸 惠惺 悴惡 愃惘惡 悋愕惆悋
忰惆 惶惶 惠惠悸
PDF
Tesia Dobrydnia - An Avid Hiker And Backpacker
Tesia Dobrydnia
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
PDF
bs-en-12390-3 testing hardened concrete.pdf
ADVANCEDCONSTRUCTION
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...
ijujournal
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
Artificial Intelligence jejeiejj3iriejrjifirirjdjeie
VikingsGaming2
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
Generative AI & Scientific Research : Catalyst for Innovation, Ethics & Impact
AlqualsaDIResearchGr
ASBC application presentation template (ENG)_v3 (1).pptx
HassanMohammed730118
Introduction to File Transfer Protocol with commands in FTP
BeulahS2
June 2025 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
LLC CM NCP1399 SIMPLIS MODEL MANUAL.PDF
ssuser1be9ce
Precooling and Refrigerated storage.pptx
ThongamSunita
FSE_LLM4SE1_A Tool for In-depth Analysis of Code Execution Reasoning of Large...
cl144
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
CST413 KTU S7 CSE Machine Learning Neural Networks and Support Vector Machine...
resming1
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
惆惘悋愕悸 忰悋 惘悸 惠惺 悴惡 愃惘惡 悋愕惆悋
忰惆 惶惶 惠惠悸
Tesia Dobrydnia - An Avid Hiker And Backpacker
Tesia Dobrydnia
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
bs-en-12390-3 testing hardened concrete.pdf
ADVANCEDCONSTRUCTION

sourabh_sipPPT.pptx

  • 1. ETHICAL HACKING AND EMAIL SCRAPPING ON OPEN PORTS Presented By:- Sourabh Ruhil A501132520016 Btech(AIML) Sem 5 Guides: Dr. Rajesh Tyagi Dr. Anil Mishra Professor Professor Amity School of Engineering and Technology
  • 2. CONTENT Introduction Ethical Hacking Using kali Linux Who are Hackers Port Scanning Types of Hackers Hacking Process Why do We need Ethical Hacking Required Skills of an Ethical Hacker Email Scrapping Advantages Disadvantages Future Enhancements Conclusion
  • 3. INTRODUCTION Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use,but with one major difference that Ethical hacking is legal.
  • 4. ETHICAL HACKING Independent computer security Professionals breaking into the computer systems. Neither damage the target systems nor steal information. Evaluate target systems security and report back to owners about the bugs found.
  • 5. WHO ARE HACKERS? A person who enjoys learning details of a programming language or system. A person who enjoys actually doing the programming rather than just theorizing about it. A person capable of appreciating someone else's hacking. A person who picks up programming quickly. A person who is an expert at a particular programming language or system.
  • 6. PORT SCANNING : port scan is a common technique hackers use to discover open doors or weak points in a network. A port scan attack helps cyber criminals find open ports and figure out whether they are receiving or sending data. It can also reveal whether active security devices like firewalls are being used by an organization. When hackers send a message to a port, the response they receive determines whether the port is being used and if there are any potential weaknesses that could be exploited.
  • 7. TYPES OF HACKERS Black Hat Hacker White Hat Hacker Grey Hat Hacker
  • 8. BLACK-HAT HACKER A black hat hackers or crackers are individuals with extraordinary computing skills, resorting to malicious or destructive activities. That is black hat hackers use their knowledge and skill for their own personal gains probably by hurting others.
  • 9. WHITE-HAT HACKER White hat hackers are those individuals professing hacker skills and using them for defensive purposes. This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.
  • 10. GREY-HAT HACKERS These are individuals who work both offensively and defensively at various times. We cannot predict their behavior. Sometimes they use their skills for the common good while in some other times he uses them for their personal gains.
  • 11. HACKING PROCESS Foot Printing Scanning Gaining Access Maintaining Access
  • 12. FOOT PRINTING Whois lookup NS lookup IP lookup
  • 13. SCANNING Port Scanning Network Scanning Finger Printing Fire Walking
  • 14. GAINING ACCESS Password Attacks Social Engineering Viruses
  • 15. MAINTAINING ACCESS Os BackDoors Trojans Clears Tracks
  • 16. WHY DO YOU NEED ETHICAL HACKING Viruses, Trojan Horses, and Worms Social Engineering Automated Attacks Accidental Breaches in Security Denial of Service (DoS) Organizational Attacks Restricted Data Protection from possible External Attacks
  • 17. REQUIRED SKILLS OF AN ETHICAL HACKER Microsoft: skills in operation, configuration and management. Linux: knowledge of Linux/Unix; security setting, configuration, and services. Firewalls: configurations, and operation of intrusion detection systems.
  • 18. EMAIL SCRAPPING Email scraping is a method of obtaining email information by automatically extracting the necessary data from another source. The information that you receive can be either publicly available or private, depending on authorization settings and how its stored.
  • 19. ADVANTAGES To catch a thief you have to think like a thief. Helps in closing the open holes in the system network. Provides security to banking and financial establishments. Prevents website defacements. An evolving technique.
  • 20. DISADVANTAGES All depends upon the trustworthiness of the ethical hacker Hiring professionals is expensive.
  • 21. CONCLUSION In the preceding sections we saw the methodology of hacking, why should we aware of hacking and some tools which a hacker may use. Now we can see what can we do against hacking or to protect ourselves from hacking. The first thing we should do is to keep ourselves updated about those softwares we and using for official and reliable sources. Educate the employees and the users against black hat hacking.