Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

ETHICAL HACKING

Presented by: Hamna Khawar


CONTENTS
WHAT IS HACKING
 ETHICAL HACKING
ROLE OF ETHICAL HACKING
TYPES OF HACKER
DIFFERENT TYPES OF HACKERS
PHASES OF ETHICAL HACKING
RECONNAISANCE
FOOT PRINTING
ADVANTAGES
DISADVANTAGES
What is Hacking?

What do you think, who is a hacker?

OR
WHO IS A HACKER?
The term “hacker” has a dual usage in the computer industry today.
Originally, the term was define as:
A person who enjoys learning details of a programming language or
system and how to stretch their capabilities
One who programs enthusiastically or who enjoys programming rather
than just theorizing about programming.
A person who picks up programming quickly.
WHO IS A HACKER
Due to Restriction to access, initially, people began to steal password,
accounts etc
Later on, turned into damaging system, bringing down server, deleting
files etc. with special motives.
The media began using the term “hacker” to describe “Individuals who
break into computer for fun, revenge, or profit” and the process is
known as hacking.
These people were called “Cracker” by Computer Security
Professionals.
ETHICAL HACKING:
Such people, who hack into a system with permission, without any malicious
intent, are known as “Ethical Hackers” and the process is known as
ethical hacking.

Ethical Hacking ≈ Hacking Ethical Hacking ≠ Cracking


ROLE OF ETHICAL HACKER:
• Providing security to important people or places
• Protecting yourself from becoming a victim of hacking
• Providing security to the common people who are not so aware of
this such as banks, offices etc.
• To decrease cyber attacks
TYPES OF HACKER:

White Hat Black Hat Grey Hat Suicide


Hacker Hacker Hacker Hacker
DIFFERENT TYPES OF HACKING:
Website Hacking:
Hacking a website means taking unauthorized control over a web
server and its associated software such as databases and other
interfaces.
Network Hacking:
Hacking a network means gathering information about a network by
using tools like Netstat etc. with the intent to harm the network
system and hamper its operation.
DIFFERENT TYPES OF HACKING:
Email Hacking:
This includes gaining unauthorized access to an Email account and
using it without taking the consent of its owner for sending out spam
links, third-party threats, and other such harmful activities.
 
Password Hacking:
This is the process of recovering secret passwords from data that has
been stored in or transmitted by a computer system.
DIFFERENT TYPES OF HACKING:

Computer Hacking 
This is the process of stealing computer ID and password by applying
hacking methods and getting unauthorized access to a computer
system.
PHASES OF ETHICAL HACKING:
RECONNAISSANCE:
I’ve already mentioned that it is the process of gathering information
about the target system, but what kind of information are we trying to
gather? The following types of info can be gather:
• Gather initial information
• Determine the network range
• Identify active machines
• Fingerprint the operating system
• Map the network
ACTIVE RECONNAISSANCE:
Active Reconnaissance refers to the
process when you, the hacker,
directly interact with the computer
system to gain information. This
information can be relevant and
accurate. But there is a risk of
getting detected if you are planning
active reconnaissance without
permission. If you are detected, the
system admin can take severe
action against you and trail your
subsequent activities.
PASSIVE RECONNAISSANCE:
Passive Reconnaissance, on the
other hand, doesn’t directly
interact with the computer. This
process is used to gather
essential information without
ever interacting with the target
systems.
FOOTPRINTING:
Footprinting is basically the first step where hacker gathers as much
information as possible to find ways to intrude into a target system or at
least decide what type of attacks will be more suitable for the target.
Footprinting is a part of the reconnaissance process which is used for
gathering possible information about a target computer system or
network. Footprinting could be both passive and active. Reviewing a
company’s website is an example of passive footprinting, whereas
attempting to gain access to sensitive information through social
engineering is an example of active information gathering.
FOOTPRINTING:
ADVANTAGES:
• It helps to fight against cyber terrorism
• It helps to take preventive action against hackers.
• It helps to build a system which prevents any kinds of penetration by
hackers.
• Ethical hacking offers security to banking and financial establishments.
• It helps to identify and close the open holes in a computer system or
network.
DISADVANTAGE:
• Ethical hacker might use information gained for malicious use.Hence
trustful hackers are needed to have success in this system.
• Hiring such professionals will increase cost to the company.
• The technique can harm someone's privacy.
THANK YOU

You might also like