search
Login | Signup | Support
  • 0
  • Add as FriendETHICAL HACKING

    by: rajatseth0711

    Current Rating : Rate It :

    5069

    Views

    Download
     
    1 : Ethical hacking
    2 : PRESENTED BY RAJAT SETH MAHENDRA SHAH
    3 : Introduction : The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few.
    4 : WHAT IS ETHICAL HACKING Ethical hacking and a ethical hacker are terms that describe hacking performed to help a company or individual identify potential threats on the computer or network. An ethical hacker attempts to hack their way past the system security, finding any weak points in the security that could be exploited by other hackers. The organization uses what the ethical hacker finds to improve the system security, in an effort to minimize, if not eliminate, any potential hacker attacks.
    5 : HOW ETHICAL HACKING IS DIFFER FROM HACKING It is Legal Permission is obtained from the target Part of an overall security program Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
    6 : TYPES OF HACKING So many types of Computer hacking are there, like. Password hacking Email hacking ( yahoo , g-mail , Hotmail….) Site hacking\ Credit card hacking
    7 : HACKING PRONE AREAS
    8 : HACKERS vs. CRACKERS Very knowledgeable Good guy Help to improve security Strong ethics Have prior permission Very knowledgeable Bad guy Want to cause cyber destruction No ethics No prior permission
    9 : TYPES OF HACKER White Hat Hackers: who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. Black Hat Hackers: A black hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat.
    10 : Gray Hat Hackers: A grey hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra Script Kiddies: who use scripts or programs developed by others to attack computer systems and networks and deface websites.
    11 : Why do hackers hack? Just for fun Show off Hack system network secretly Notify many people their thought Steal important information Destroy enemy’s computer
    12 : WAYS OF HACKING Phishing Pharming
    13 : ABC BANK Your bank account password is about to expire. Please login… Phishing = Fake Email The bank has found problems with your account. Please contact …”
    14 : Pharming = Fake web pages A fake web page may lead to a real web page The fake web page looks like the real thing Extracts account information Login Passwd Welcome To ABC Bank www.abc.com www.abcBank.com
    15 : Hackers language translation 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l \ -> n \/ -> m s -> z z -> s f -> ph ph-> f x -> ck ck -> x
    16 : EXAMPLE:- Hacking is good H4ck||\|g 1$ 900d
    17 : HACKING TOOLS SCANNERS TELNET FTP LAN WATCH THERE ARE MANY TOOLS ARE AVILABLE
    18 : SCANNERS IT IS NOT A PHOTO SCANNER SCANNER IS PROGRAM THAT AUTOMATICALLY DETECTS SECURITY WEAKNESS IN REMOTE HOST PORT SCANNERS ARE USE IN HACKING PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN PORT ON THAT SYSTEM AND WHICH SERVICE IS RUNNING ON THAT IT CAN USE ALMOST ALL OPERATING SYSTEM EX. SATAN,NMAP
    19 : TELNET TELNET IS ALTIMATE HACKING TOOL IT IS TERMINAL EMULATION PROGRAM THAT ALLOW US TO CONNECT TO REMOTE SYSTEM YOU HAVE TO FOLLOW THIS STEP TO USE TELNET C:\WINDOWS\TELNET [IP ADDRESS] PORT
    20 : FTP FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS USE AS HACKING TOOL PORT 21 FOR THE FTP FOR CONNECTING FTP WE NEED SOME FTP S/W KNOWN AS FTP CLIENT FOR CONNECTING FTP SERVER YOU HAVE TO HAMMERING THAT SERVER COMMAND: C:\WINDOWS\FTP [IP ADDRESS]:PORT
    21 : Preparation Foot printing Identification of Vulnerabilities Gaining Access Covering tracks HACKING PROCESS
    :

    Presentation Tags

    Copyright © 2019 www.slideworld.com. All rights reserved.