Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

ETHICAL HACKING

PRESENTOR : SYED ASAD ABBAS ABIDI & SYED AHAD IMRAN


ROLL NO : BCSM-F19-367 & BCSM-F19-360
PRESENTED TO : MISS QAISRA HONEY
SUPERIOR UNIVERSITY, LAHORE

PRESENTER : ABDULLAH NAVEED


Basic definiton of Hacking:
 The process of gaining unauthorized access to the
“Data”.
A brief description about Hacking:
 The financial industry is dependent on Technology.
 What if some unauthorized person gets access to it?
 It will result in Financial Loss and Damaged Reputation.
Types of “Hacking”:
 Hacking can be categorized into three
ways:
 Black Hat Hacking.
 Grey Hat Hacking.
 White Hat Hacking.

Here we’ll discuss about these terms which


are actually the classifications of
“Hacking” .
Black Hat Hacking:
 This term is referrred to as the Hacking
which is done for personal intentions
and profits.
 Black Hat Hacking is illegal because it is
gaining access to the server’s data
without letting them know or without
their permission.
White Hat Hacking:
 White Hat Hackers penetrates the
system with the permission of the
developers.
 The White Hat Hackers identifies the
insecurities in the system to improve the
security.
 White Hat Hacking is considered Legal
as these types of hackers hack the
system on the will of the developers.
Grey Hat Hacking:
 The Grey Hat Hackers are a combo of
both White Hat and Black Hat hackers.
 A Grey Hat Hacker works for “Bug
Bounty”.
 Bug Bounty is a process where the
developers pays reward for finding bugs
in the system.
“Ethical Hacking:”
 Ethical Hacking is a type of White Hat
Hacking.
 Ethical Hacking is when a friendly
hackers tries to break into a system and
identifies it’s weaknesses and enhance
its Cyber Resilience.
Goals of Ethical Hacking:
o The main purposes of Ethical Hackers
are:

 Protect the privacy of organization.


 Identify the weaknesses(with details)
and identify the solution to this problem.
Importance of Ethical Hacking:

 They deal with Security Threats.


 What is a Security Threat?
Any risk that can potentially harm a
computer system is known as a
‘Security Threat.
Skills of an Ethical Hacker:
o An Ethical Hacker should have command
over programming languages such as:
• HTML
• JAVASCRIPT
• PYTHON
• JAVA
o In-depth knowledge of
OS’s(Windows,MacOS,Linux).
Ethical Hacking Tools:
 The modern tools used by Ethical
Hackers are:
 Netsparker(Web-App security scanner).
 BURPSUITE.
 NMAP.
 ACUNETIX.
 HASHCAT.
 SQLMAP.
Thank you!!!

You might also like