Ethical Hacker 1

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 35

• ETHICAL HACKING

AUTHOR : KIRAN PRAJAPATI K.


INTRODUCTION TO HACKING
1. Hacking :
• Hacking simply refers to “Gaining Unauthorized access”
• IN India HACKERS are Treated as Criminal by those who are Not Familiar with
Working of a hacker.
• They only see – ve side of hacker.
• That’s why India have less Hacker’s As compared to other developing and Developed
countries.
• IN India ,Ethical Hacker are also known as Cyber Security Analyst or Information
Security Expert.
TYPES OF HACKERS :

1. White Hat Hacker : They perform hacking and security checks with authority.
2. Black Hat Hacker : They believe in breaking the security without any
permission or authority.
3. Grey Hat Hacker : Hacker Who is like a coin, two sided. They work for both
offensive and defensive work. Generally benefit oriented.
4. Script Kiddie : They copy code and use it for a virus or something else.
Script Kiddies will never hack for themselves
PHASES OF HACKING :
INTRODUCTION TO PORTS && PROTOCOLS.

• Ports : A port is logical access channel between two devices which help in their
communication. A port is used for to transfer the data.
• There are total 65535 ports.
• Protocols : It is a Simply a set of rules which defines a standard way for
exchanging information over a network.
• Most commonly control Protocol are :
1.TCP 2. IP 3. UDP
FOOTPRINTING
• Footprinting is first phase of Hacking. Using Footprinting attacker can collect
information like emails,contacts,domain name information.
• Types
(1) Internal Footprinting.
(2) External Footprinting.
1.Website 2.Google. 3.Whois.
• How to Use Whois.sc :
• Navigate to www.whois.sc & Provide the domain name.

You might also like