Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
HACKING
BY:
1) RISHABH DHINGRA
2) NAINA GUPTA
3) SOMYA JAIN
4) JAVITESH MOT
5) SEEMANT KHANNA
6) SOUMIK MANDAL
7) VASUDEV ANURAG
8) ANURADHA BAKSHI
9) DEBLINA MUKHERJEE
INTRODUCTION
WHAT IS HACK?
WHAT IS HACKING?
2. Black Hat – Also known as crackers, these are the men and women you hear about i
n the news. They find banks or other companies with weak security and steal money
or credit card information. The surprising truth about their methods of attack is that th
ey often use common hacking practices they learned early on.
3. Gray Hat – Nothing is ever just black or white; the same is true in the world of hackin
g. Gray Hat hackers don’t steal money or information (although, sometimes they defa
ce a website or two), yet they don’t help people for good (but, they could if they want
ed to). These hackers comprise most of the hacking world, even though Black Hat ha
ckers garner most (if not all) of the media’s attention.
DIFFERENCE BETWEEN
HACKER
&
ETHICAL HACKER
MODES OF ETHICAL HACKING
• INSIDER ATTACK
• OUTSIDER ATTACK
• PHYSICAL ENTRY
• SOCIAL ENGINEERING
PROCESS OF ETHICAL HACKING
1. Reconnaissance
2. Scanning
3. Gaining Access
4. Maintaining Access
5. Clearing Tracks
6. Reporting
INDETAIL VEIW OF THE STEPS INVOLVED IN ETHICAL HACKING
As with all types of activities which have a darker side, there will be……dishonest people
presenting drawbacks. The possible drawbacks of ethical hacking include:
1. The ethical hacker using the knowledge they gain to do malicious hacking activities
3. The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and
other destructive and harmful things on a computer system
These are not common; however, they are something all companies should consider when using the
services of an ethical hacker.
CONCLUSION
• Ethical Hackers
THANK
YOU