Professional Documents
Culture Documents
Study of Ethical Hacking: Micro Project
Study of Ethical Hacking: Micro Project
Study of Ethical Hacking: Micro Project
MICRO PROJECT
Academic year: 2020-21
Place: Nanded
(Signature of Faculty)
DR.G V GARJE SIR
SR.NO.
CONTENT PAGE NO.
1
Introduction
2 Need of ethical
3
Types of Ethical Hacking
● Web application hacking
● Social engineering
● System hacking
● Hacking wireless networks
● Web server hacking
Conclusion
10
Introduction
Social Engineering
In the context of information security, social
engineering is the psychological manipulation of
people into performing actions or divulging
confidential information. This differs from social
engineering within the social sciences, which
does not concern the divulging of confidential
information. A type of confidence trick for the
purpose of information gathering, fraud, or
system access, it differs from a traditional "con"
in that it is often one of many steps in a more
complex fraud scheme.
System Hacking
System hacking is a vast subject that consists
of hacking the different software-based
technological systems such as laptops, desktops,
etc. System hacking is defined as the
compromise of computer systems and software
to access the target computer and steal or misuse
their sensitive information. Here the malicious
hacker exploits the weaknesses in a computer
system or network to gain unauthorized access to
its data or take illegal advantage.
4) Miscellaneous Hackers
Apart from the above well-known classes of
hackers, we have the following categories of
hackers based on what they hack and how they
do it −
1) Red Hat Hackers
Red hat hackers are again a blend of both
black hat and white hat hackers. They are usually
on the level of hacking government agencies,
top-secret information hubs, and generally
anything that falls under the category of sensitive
information.
2) Blue Hat Hackers
A blue hat hacker is someone outside
computer security consulting firms who is used
to bug-test a system prior to its launch. They
look for loopholes that can be exploited and try
to close these gaps. Microsoft also uses the term
BlueHat to represent a series of security briefing
events.
3) Elite Hackers
This is a social status among hackers, which is
used to describe the most skilled. Newly
discovered exploits will circulate among these
hackers.
4) Script Kiddie
A script kiddie is a non-expert who breaks
into computer systems by using pre-packaged
automated tools written by others, usually with
little understanding of the underlying concept,
hence the term Kiddie.
5) Neophyte
A neophyte, "n00b", or "newbie" or "Green
Hat Hacker" is someone who is new to hacking
or phreaking and has almost no knowledge or
experience of the workings of technology and
hacking.
6) Hacktivist
A hacktivist is a hacker who utilizes
technology to announce a social, ideological,
religious, or political message. In general, most
hacktivism involves website defacement or
denialof-service attacks.
List of Top 10 Best
Professional Hackers in India
● Vivek Ramachandran
● Benild Joseph
● Ankit Fadia
● Sunny Vaghela
● Falgun Rathod
● Anand Prakash
● Koushik Dutta
● Pranav Mistry
● Trishnit Arora
● Rahul Tyagi
Conclusion
In conclusion, ethical hacking is not a criminal
activity and should not be considered as such.
While it is
true that malicious hacking is a computer crime
and criminal activity, ethical hacking is never a
crime. Ethical
hacking is in line with industry regulation and
organizational IT policies. Malicious hacking
should be
prevented while ethical hacking which promotes
research, innovation, and technological
breakthroughs should
be encouraged and allowed