Sei sulla pagina 1di 14

WELCOME

ETHICAL
HACKING
By
Suryansh Srivastava

WHAT IS SECURITY

Securityis the degree of resistance to, or


protectionfrom,harm.

It is the state of being free from danger or


threat.

Difference Between Security and Protection


Security and protection are extremely
closeconceptsthoughnotsame.
Securitymeasuresareadoptedtoincrease
thelevelofprotection
The feeling of protection arises when one
hasenoughsecuritymeasures
Security is a type of protection against
externalthreats.

Overview of Hacking
Hack

Examinesomethingveryminutely
Therapidcraftingofnewprogramorthemaking
of changes to existing, usually complicated
software

Hacker

Thepersonwhohacks

Cracker

Systemintruder/destroyer

History Of Hacking
The first hacker was appeared in 1960s at the
MassachusettsInstituteOfTechnology(MIT)
During the 1970s, a different kind of hacker
appeared:PhonePhreakerorPhoneHacker

In the 1980s, phreaks started to migrate to


computers,andthefirstBulletinBoardSystem(BBS)
appeared

During the 1990s, when the use of internet


widespreadaroundtheworld,hackersmultiplied

Hacker and Ethical Hacker


Hacker
Access computer system or network without
authorization
Breaksthelaw

EthicalHacker
Performsmostofthesameactivitiesbutwithowners
permission
EmployedbycompaniestoperformPenetrationTests

Types of Hacker
White Hat Hacker

Goodguys
Dontusetheirskillforillegalpurpose
Computer security experts and help to protect from
BlackHats.

Black Hat Hacker

Badguys
Usetheirskillmaliciouslyforpersonalgain
Hackbanks,stealcreditcardsanddefacewebsites

Grey Hat Hacker

ItisacombinationofWhitehatnBlackHatHackers
Goal of grey hat hackers is to provide national
security

Hacking Process

Some Tools
Footprinting

Some Famous Hacker

Ian Murphy

Kevin Mitnick

Johan Helsinguis

Linus Torvald

Mark Abene

Robert Morris

Recent news of Hacking


Nextgenerationpatchmanagementtoolreleased-SecuniaCSI7.0
AnonymitytoolTORgainsmorethan1.2millionuserssinceNSA
PRISMScandal
Fear of NSA PRISM : Indian Government may ban US email
servicesforofficialCommunication
CISCO vulnerability allows remote attacker to take control of
WindowsSystem
NewYorkTimes.TwitterandHuffingtonPostDomainshijackedby
SyrianElectronicArmy
FBIusesAnonymousHackerstoattackforeignGovernments
PalestinianHacker,whohackedZuckerbergsFacebookAccountto
beawardedwith$12000

When solving problems, dig at the roots instead of just hacking at the

ThankYou
ThankYou

Potrebbero piacerti anche