KEMBAR78
Ethical Hacking - Explained | PPTX
Government Polytechnic, Ahmedabad
Government Polytechnic, Ahmedabad
Communities of
Categories
Hackers
of Hacker
1. White Hat
1.White Hat
2. Grey Hat
2.Grey Hat
3. Black Hat
3.Black Hat
4. Phreaker
4.Phreaker
5. Script Kiddies
5.Script Kiddies
6. Hactivist
6.Hacktivist

Government Polytechnic, Ahmedabad

Government Polytechnic, Ahmedabad
1. White Hat :
A white hat is the hero or good guy, especially in
computing, where it refers to an Ethical Hacker or
Penetration Tester who focuses on securing and
protecting IT systems.
Such
people
are
Employed by Companies
where these Professionals
are sometimes called
Tiger Teams or
Red Teams.

Government Polytechnic, Ahmedabad
2. Grey Hat :
A
grey
hat,
refers to a skilled
hacker
who
sometimes acts
legally,
sometimes
in
good will, and
sometimes not.

They are a hybrid between white and black hat hackers.

Government Polytechnic, Ahmedabad
3. Black Hat : A black hat is the villain or bad guy. It
refers to a hacker that breaks into networks or
computers, or creates computer viruses.
They are specialized in unauthorized penetration of
information systems.
They may use computers to attack systems for profit,
for fun, or for political motivations or as a part of a
social cause. Hence they should not be confused with
ethical hackers.
Government Polytechnic, Ahmedabad
4. Phreaker :
The person
who
acts
of
gaining
unauthorized
access
to
Telecommunication
systems, especially
to obtain Free Calls.

Government Polytechnic, Ahmedabad
5. Script Kiddies :
Script kiddies are
like amateur kids
who gains illegal
access
to
computer
systems, often by
using
hacking
programs
downloaded
from the internet.
Their objective is to try to impress their friends.

Government Polytechnic, Ahmedabad
6.
Hacktivist
:
Hacktivist
is
a
mixture
of
the
words Hacker and
Activist.
They have taken to
defacing websites
or
computer
systems for
political reasons
or social aim.

Government Polytechnic, Ahmedabad
Some Malicious Hacking Strategies :
As there are steps to develop any software so as Every hackers do
follow some predefined rules or steps to hack into the system.
1. Information : The basic information gathering about the target
system.
2. Scanning : Scanning the target system for open ports and services
running on the open ports etc.
3. Gaining Access : Gaining the actual access of the particular
target system by exploiting the system.
4. Maintaining Access : Keeping the access of the system.
5. Clearing Tracks : To remove the footprints if any so as to remain
undetected from the victim.
Government Polytechnic, Ahmedabad
Not all Hackers do evil work.
Here's what you need to know to use your
Hacking Skills to do Good.

'Ethical Hacking' Is A Form of
'Legal Hacking' That Is Done
With The Permission of An
Organization
To
Help
Increase Its Security.

Government Polytechnic, Ahmedabad
Why Do We Need Ethical Hacking
Social
Engineering
Automated
Attacks

Organizational
Attacks

Restricted
Data
Accidental
Breaches in
Security

Viruses, Trojan
Horses,
and Worms

Government Polytechnic, Ahmedabad

Government Polytechnic, Ahmedabad

Denial of
Service (DoS)
Who are CEH? :
Certified
Ethical
Hackers
are
Technically Skilled IT Professionals With
A Strong Desire To Solve Problems And
Prevent
Malicious
Hackers
From
Causing Damage To Network Systems.
Government Polytechnic, Ahmedabad
How To Be Ethical Hacker :
One Can Become A Ethical Hacker by
Getting Just A Formal Training in Ethical
Hacking to Learn The Basic Fundamentals of
Hacking.

As You Became A Ethical Hacker You Need
Motivation, Dedication, Initiative,
Self-education And Tough Knowledge
To Improve Your-Self
As Per The New Innovations.

Government Polytechnic, Ahmedabad
Job :
There Are Lucrative
Jobs Available In
Government
Organizations,
Banks,
Financial
Institutions,
Military
Establishments And
Private Companies.

India will need more than 4 lakh ethical
hackers by 2015. -Rediff.com

Government Polytechnic, Ahmedabad
What to Learn :
Learn
Operating
Systems like Windows,
Mac and especially
UNIX as it is regarded
as
the
original
operating system built
by hackers.
Evaluate your strengths and interests and gain
some basic programming knowledge such as
C,C++, or Java.
Experience with various networking devices
and networking protocols.
Government Polytechnic, Ahmedabad
As a Ethical Hacker Keep in Mind :
* Always keep learning new things.

* Don’t do it just for fun.
* Never do it just for money.
* Keep you focus intact in your job.
* Always work within the law and never try
to break it.

Government Polytechnic, Ahmedabad
“The one who can hack it, can only
secure it”
Always Stay connected …
To The Hacker Community By Sharing Technical
Information And Ideas.
Government Polytechnic, Ahmedabad
Government Polytechnic
Ahmedabad

TechNet 2014
Gunjan Panara
(126170307057)

Vishwa Soni
(126170307020)

Government Polytechnic, Ahmedabad

Pooja Mahida
(126170307029)

Ethical Hacking - Explained

  • 2.
  • 3.
  • 4.
    Communities of Categories Hackers of Hacker 1.White Hat 1.White Hat 2. Grey Hat 2.Grey Hat 3. Black Hat 3.Black Hat 4. Phreaker 4.Phreaker 5. Script Kiddies 5.Script Kiddies 6. Hactivist 6.Hacktivist Government Polytechnic, Ahmedabad Government Polytechnic, Ahmedabad
  • 5.
    1. White Hat: A white hat is the hero or good guy, especially in computing, where it refers to an Ethical Hacker or Penetration Tester who focuses on securing and protecting IT systems. Such people are Employed by Companies where these Professionals are sometimes called Tiger Teams or Red Teams. Government Polytechnic, Ahmedabad
  • 6.
    2. Grey Hat: A grey hat, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not. They are a hybrid between white and black hat hackers. Government Polytechnic, Ahmedabad
  • 7.
    3. Black Hat: A black hat is the villain or bad guy. It refers to a hacker that breaks into networks or computers, or creates computer viruses. They are specialized in unauthorized penetration of information systems. They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Hence they should not be confused with ethical hackers. Government Polytechnic, Ahmedabad
  • 8.
    4. Phreaker : Theperson who acts of gaining unauthorized access to Telecommunication systems, especially to obtain Free Calls. Government Polytechnic, Ahmedabad
  • 9.
    5. Script Kiddies: Script kiddies are like amateur kids who gains illegal access to computer systems, often by using hacking programs downloaded from the internet. Their objective is to try to impress their friends. Government Polytechnic, Ahmedabad
  • 10.
    6. Hacktivist : Hacktivist is a mixture of the words Hacker and Activist. Theyhave taken to defacing websites or computer systems for political reasons or social aim. Government Polytechnic, Ahmedabad
  • 11.
    Some Malicious HackingStrategies : As there are steps to develop any software so as Every hackers do follow some predefined rules or steps to hack into the system. 1. Information : The basic information gathering about the target system. 2. Scanning : Scanning the target system for open ports and services running on the open ports etc. 3. Gaining Access : Gaining the actual access of the particular target system by exploiting the system. 4. Maintaining Access : Keeping the access of the system. 5. Clearing Tracks : To remove the footprints if any so as to remain undetected from the victim. Government Polytechnic, Ahmedabad
  • 12.
    Not all Hackersdo evil work. Here's what you need to know to use your Hacking Skills to do Good. 'Ethical Hacking' Is A Form of 'Legal Hacking' That Is Done With The Permission of An Organization To Help Increase Its Security. Government Polytechnic, Ahmedabad
  • 13.
    Why Do WeNeed Ethical Hacking Social Engineering Automated Attacks Organizational Attacks Restricted Data Accidental Breaches in Security Viruses, Trojan Horses, and Worms Government Polytechnic, Ahmedabad Government Polytechnic, Ahmedabad Denial of Service (DoS)
  • 14.
    Who are CEH?: Certified Ethical Hackers are Technically Skilled IT Professionals With A Strong Desire To Solve Problems And Prevent Malicious Hackers From Causing Damage To Network Systems. Government Polytechnic, Ahmedabad
  • 15.
    How To BeEthical Hacker : One Can Become A Ethical Hacker by Getting Just A Formal Training in Ethical Hacking to Learn The Basic Fundamentals of Hacking. As You Became A Ethical Hacker You Need Motivation, Dedication, Initiative, Self-education And Tough Knowledge To Improve Your-Self As Per The New Innovations. Government Polytechnic, Ahmedabad
  • 16.
    Job : There AreLucrative Jobs Available In Government Organizations, Banks, Financial Institutions, Military Establishments And Private Companies. India will need more than 4 lakh ethical hackers by 2015. -Rediff.com Government Polytechnic, Ahmedabad
  • 17.
    What to Learn: Learn Operating Systems like Windows, Mac and especially UNIX as it is regarded as the original operating system built by hackers. Evaluate your strengths and interests and gain some basic programming knowledge such as C,C++, or Java. Experience with various networking devices and networking protocols. Government Polytechnic, Ahmedabad
  • 18.
    As a EthicalHacker Keep in Mind : * Always keep learning new things. * Don’t do it just for fun. * Never do it just for money. * Keep you focus intact in your job. * Always work within the law and never try to break it. Government Polytechnic, Ahmedabad
  • 19.
    “The one whocan hack it, can only secure it” Always Stay connected … To The Hacker Community By Sharing Technical Information And Ideas. Government Polytechnic, Ahmedabad
  • 20.
    Government Polytechnic Ahmedabad TechNet 2014 GunjanPanara (126170307057) Vishwa Soni (126170307020) Government Polytechnic, Ahmedabad Pooja Mahida (126170307029)