Vous êtes sur la page 1sur 15

WELCOME

Prepared by:
Kshitij kumar singh
Ashish kumar
Aayush bhatnagar

WHAT IS SECURITY

Securityis the degree of resistance to, or


protectionfrom,harm.

It is the state of being free from danger or


threat.

Difference Between Security and Protection


Security and protection are extremely
closeconceptsthoughnotsame.
Securitymeasuresareadoptedtoincrease
thelevelofprotection
The feeling of protection arises when one
hasenoughsecuritymeasures
Security is a type of protection against
externalthreats.

Why Do We Need Ethical


Hacking
Protection from possible External Attacks
Social
Engineering
Automated
Attacks

Organizational
Attacks

Restricted
Data
Accidental
Breaches in
Security

Viruses, Trojan
Horses,
and Worms

Denial of
Service (DoS)

Why Cant We Defend Against Hackers?


There are many unknown security hole
Hackers need to know only one security hole to
hack the system
Admin need to know all security holes to defend
the system

Ethical Hacking Commandments

Working Ethically

Trustworthiness

Misuse for personal gain


Respecting Privacy
Not Crashing the Systems

Overview of Hacking
Hack

Examinesomethingveryminutely
Therapidcraftingofnewprogramorthemaking
of changes to existing, usually complicated
software

Hacker

Thepersonwhohacks

Cracker

Systemintruder/destroyer

History Of Hacking
The first hacker was appeared in 1960s at the
MassachusettsInstituteOfTechnology(MIT)
During the 1970s, a different kind of hacker
appeared:PhonePhreakerorPhoneHacker

In the 1980s, phreaks started to migrate to


computers,andthefirstBulletinBoardSystem(BBS)
appeared

During the 1990s, when the use of internet


widespreadaroundtheworld,hackersmultiplied

Hacker and Ethical Hacker


Hacker
Access computer system or network without
authorization
Breaksthelaw

EthicalHacker
Performsmostofthesameactivitiesbutwithowners
permission
EmployedbycompaniestoperformPenetrationTests

Types of Hacker
White Hat Hacker

Goodguys
Dontusetheirskillforillegalpurpose
Computer security experts and help to protect from
BlackHats.

Black Hat Hacker

Badguys
Usetheirskillmaliciouslyforpersonalgain
Hackbanks,stealcreditcardsanddefacewebsites

Grey Hat Hacker

ItisacombinationofWhitehatnBlackHatHackers
Goal of grey hat hackers is to provide national
security

Hacking Process
Footprinting

Escalating Privilege,
Covering Tracks and
Creating Backdoors

Attack and Gaining


Access

Scanning

Enumeration

Some Famous Hacker

Ian Murphy

Kevin Mitnick

Johan Helsinguis

Linus Torvald

Mark Abene

Robert Morris

Recent news of Hacking


Nextgenerationpatchmanagementtoolreleased-SecuniaCSI7.0
AnonymitytoolTORgainsmorethan1.2millionuserssinceNSA
PRISMScandal
Fear of NSA PRISM : Indian Government may ban US email
servicesforofficialCommunication
CISCO vulnerability allows remote attacker to take control of
WindowsSystem
NewYorkTimes.TwitterandHuffingtonPostDomainshijackedby
SyrianElectronicArmy
FBIusesAnonymousHackerstoattackforeignGovernments
PalestinianHacker,whohackedZuckerbergsFacebookAccountto
beawardedwith$12000

When solving
problems, dig at the
roots instead of just
hacking at the leaves.

ThankYou
ThankYou

Vous aimerez peut-être aussi