際際滷

際際滷Share a Scribd company logo
An ethical hacker is a computer and                    increasingly         common       outside           the
network expert who attacks a security                  government and technology sectors where
system on behalf of its owners, seeking                it began. Many large companies, such as
vulnerabilities that a malicious hacker                IBM, maintain employee teams of ethical
could exploit.                                         hackers.

To test a security system, ethical hackers             Attack Types and Vulnerabilities:
use the same methods as their less
                                                                There exist numerous ways to
principled     counterparts,         but     report
                                                       attack a target system. It could be
problems instead of taking advantage of
                                                       achieved        by      exploiting               known
them.
                                                       vulnerabilities in software or taking
Ethical     hacking      is   also     known     as    advantage of a badly configured security
penetration testing, intrusion testing and             policy; it could be implemented remotely
red teaming.                                           or     internally.    The     techniques            and
                                                       methods      used      are    likely        to     vary
An ethical hacker is sometimes called a
                                                       depending on the target and they should
white hat, a term that comes from old
                                                       be chosen appropriately having assessed
Western movies, where the "good guy"
                                                       the situation fully. The attack types and
wore a white hat and the "bad guy" wore
                                                       vulnerabilities discussed in this module
a black hat.
                                                       are:
        One of the first examples of ethical
hackers at work was in the 1970s, when                          Buffer Overflow attacks.

the   United        States    government       used             Denial of Service (DoS) attacks.

groups of experts called red teams to hack                      Distributed     Denial        of        Service

its own computer systems.                                       (DDoS) attacks.
                                                                Misconfigurations.
          According to Ed Skoudis, Vice
                                                                Abuse of Trust.
President      of     Security    Strategy      for
                                                                Brute force attacks.
Predictive     Systems'       Global       Integrity
                                                                CGI and WWW services.
consulting practice, ethical hacking has
                                                                Back doors and Trojans.
continued to grow in an otherwise
lackluster IT industry, and is becoming
Types of Hacking:

     Website Hacking
     Email Hacking
     Network Hacking
     Password Hacking
     Online banking Hacking
     Computer Hacking

Advantages and disadvantages of
hacking:

  Advantages-

     -Can be used to recover lost
     information where the computer
     password has been lost.
     -Teaches u that no technology is
     100% secure
     -None really

  Disadvantages-

     -Criminals can use it to their
     advantage.
     -It can harm someone's privacy
     -Its illegal

More Related Content

What's hot (20)

Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
Rob Ragan
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
Ahmed Musaad
Social engineering
Social engineeringSocial engineering
Social engineering
Alexander Zhuravlev
Social engineering
Social engineeringSocial engineering
Social engineering
Maulik Kotak
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
Luke Rusten
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
Pankaj Dubey
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Cyber Agency
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
UISGCON
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
abercius24
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
John Intindolo
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
Raghunath G
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Paul Devassy, CPP
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
Pankaj Dubey
Hackers
HackersHackers
Hackers
post_it
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
Marin Ivezic
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
ABHAY PATHAK
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
Rob Ragan
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
Ahmed Musaad
Social engineering
Social engineeringSocial engineering
Social engineering
Maulik Kotak
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
Luke Rusten
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
Pankaj Dubey
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Cyber Agency
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
UISGCON
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
abercius24
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
John Intindolo
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
Raghunath G
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
Pankaj Dubey
Hackers
HackersHackers
Hackers
post_it
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
Marin Ivezic
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
ABHAY PATHAK
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum

Viewers also liked (13)

Chove em 102 munic鱈pios cearenses no dia de s達o jos辿Chove em 102 munic鱈pios cearenses no dia de s達o jos辿
Chove em 102 munic鱈pios cearenses no dia de s達o jos辿
Jos辿 Ripardo
Seguridad, higiene y medio ambiente(eleo) (17)diecisieteSeguridad, higiene y medio ambiente(eleo) (17)diecisiete
Seguridad, higiene y medio ambiente(eleo) (17)diecisiete
Eriberto Guerrero
Cult
CultCult
Cult
Guillermo Torres
27 de juliol27 de juliol
27 de juliol
institut2012
丼亳 仆舒 从仂于 于 于仂仄亳从亠
丼亳 仆舒 从仂于 于 于仂仄亳从亠丼亳 仆舒 从仂于 于 于仂仄亳从亠
丼亳 仆舒 从仂于 于 于仂仄亳从亠
kirleer3
Pro_Tools_Tier_4_Post
Pro_Tools_Tier_4_PostPro_Tools_Tier_4_Post
Pro_Tools_Tier_4_Post
Jon Gerber
Comportamente de cooperare in grup
Comportamente de cooperare in grupComportamente de cooperare in grup
Comportamente de cooperare in grup
Ramona Gabriela
energy_certificate
energy_certificateenergy_certificate
energy_certificate
Naveed Ahmed
Res炭men de recursos financierosRes炭men de recursos financieros
Res炭men de recursos financieros
Decoarte Mini Empresa
Future Normal - Why Every IT Trend Points to PaaS
Future Normal - Why Every IT Trend Points to PaaSFuture Normal - Why Every IT Trend Points to PaaS
Future Normal - Why Every IT Trend Points to PaaS
Peter Coffee
The Voyage of The First Hessian Army - American Revolution
The Voyage of The First Hessian Army -  American RevolutionThe Voyage of The First Hessian Army -  American Revolution
The Voyage of The First Hessian Army - American Revolution
Chuck Thompson
446_fb5ze0wmpbemuxf
446_fb5ze0wmpbemuxf446_fb5ze0wmpbemuxf
446_fb5ze0wmpbemuxf
Mark Pinoli
Chove em 102 munic鱈pios cearenses no dia de s達o jos辿Chove em 102 munic鱈pios cearenses no dia de s達o jos辿
Chove em 102 munic鱈pios cearenses no dia de s達o jos辿
Jos辿 Ripardo
Seguridad, higiene y medio ambiente(eleo) (17)diecisieteSeguridad, higiene y medio ambiente(eleo) (17)diecisiete
Seguridad, higiene y medio ambiente(eleo) (17)diecisiete
Eriberto Guerrero
27 de juliol27 de juliol
27 de juliol
institut2012
丼亳 仆舒 从仂于 于 于仂仄亳从亠
丼亳 仆舒 从仂于 于 于仂仄亳从亠丼亳 仆舒 从仂于 于 于仂仄亳从亠
丼亳 仆舒 从仂于 于 于仂仄亳从亠
kirleer3
Pro_Tools_Tier_4_Post
Pro_Tools_Tier_4_PostPro_Tools_Tier_4_Post
Pro_Tools_Tier_4_Post
Jon Gerber
Comportamente de cooperare in grup
Comportamente de cooperare in grupComportamente de cooperare in grup
Comportamente de cooperare in grup
Ramona Gabriela
energy_certificate
energy_certificateenergy_certificate
energy_certificate
Naveed Ahmed
Res炭men de recursos financierosRes炭men de recursos financieros
Res炭men de recursos financieros
Decoarte Mini Empresa
Future Normal - Why Every IT Trend Points to PaaS
Future Normal - Why Every IT Trend Points to PaaSFuture Normal - Why Every IT Trend Points to PaaS
Future Normal - Why Every IT Trend Points to PaaS
Peter Coffee
The Voyage of The First Hessian Army - American Revolution
The Voyage of The First Hessian Army -  American RevolutionThe Voyage of The First Hessian Army -  American Revolution
The Voyage of The First Hessian Army - American Revolution
Chuck Thompson
446_fb5ze0wmpbemuxf
446_fb5ze0wmpbemuxf446_fb5ze0wmpbemuxf
446_fb5ze0wmpbemuxf
Mark Pinoli

Similar to Ethical hacking (20)

Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
Hackers
HackersHackers
Hackers
Reyansh Vishwakarma
HACKING presentation by Team Shivam.pptx
HACKING presentation by Team Shivam.pptxHACKING presentation by Team Shivam.pptx
HACKING presentation by Team Shivam.pptx
shivamgond951
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
AliyuMuhammadButu
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
DexterJanPineda
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
homeworkping4
Hacking
HackingHacking
Hacking
VipinYadav257
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
54 Chapter 1 The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1  The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1  The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfVulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdf
MithunJV
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
Cyber terroristism
Cyber terroristismCyber terroristism
Cyber terroristism
Nur Athirah Ahmad Zainee
Cyber terroristism
Cyber terroristismCyber terroristism
Cyber terroristism
Nur Athirah Ahmad Zainee
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S ShaktawatCyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
G.S Shaktawat
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
HACKING presentation by Team Shivam.pptx
HACKING presentation by Team Shivam.pptxHACKING presentation by Team Shivam.pptx
HACKING presentation by Team Shivam.pptx
shivamgond951
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
AliyuMuhammadButu
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
DexterJanPineda
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
homeworkping4
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
54 Chapter 1 The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1  The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1  The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfVulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdf
MithunJV
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S ShaktawatCyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
G.S Shaktawat

Ethical hacking

  • 1. An ethical hacker is a computer and increasingly common outside the network expert who attacks a security government and technology sectors where system on behalf of its owners, seeking it began. Many large companies, such as vulnerabilities that a malicious hacker IBM, maintain employee teams of ethical could exploit. hackers. To test a security system, ethical hackers Attack Types and Vulnerabilities: use the same methods as their less There exist numerous ways to principled counterparts, but report attack a target system. It could be problems instead of taking advantage of achieved by exploiting known them. vulnerabilities in software or taking Ethical hacking is also known as advantage of a badly configured security penetration testing, intrusion testing and policy; it could be implemented remotely red teaming. or internally. The techniques and methods used are likely to vary An ethical hacker is sometimes called a depending on the target and they should white hat, a term that comes from old be chosen appropriately having assessed Western movies, where the "good guy" the situation fully. The attack types and wore a white hat and the "bad guy" wore vulnerabilities discussed in this module a black hat. are: One of the first examples of ethical hackers at work was in the 1970s, when Buffer Overflow attacks. the United States government used Denial of Service (DoS) attacks. groups of experts called red teams to hack Distributed Denial of Service its own computer systems. (DDoS) attacks. Misconfigurations. According to Ed Skoudis, Vice Abuse of Trust. President of Security Strategy for Brute force attacks. Predictive Systems' Global Integrity CGI and WWW services. consulting practice, ethical hacking has Back doors and Trojans. continued to grow in an otherwise lackluster IT industry, and is becoming
  • 2. Types of Hacking: Website Hacking Email Hacking Network Hacking Password Hacking Online banking Hacking Computer Hacking Advantages and disadvantages of hacking: Advantages- -Can be used to recover lost information where the computer password has been lost. -Teaches u that no technology is 100% secure -None really Disadvantages- -Criminals can use it to their advantage. -It can harm someone's privacy -Its illegal