You are on page 1of 14

WELCOME

ETHICAL
HACKING
By
Suryansh Srivastava
WHAT IS SECURITY
Securityis the degree of resistance to, or
protectionfrom,harm.

It is the state of being free from danger or


threat.
Difference Between Security and Protection

Securityandprotectionareextremelyclose
conceptsthoughnotsame.

Securitymeasuresareadoptedtoincrease
thelevelofprotection

The feeling of protection arises when one


hasenoughsecuritymeasures

Security is a type of protection against


externalthreats.
Overview of Hacking
Hack
Examinesomethingveryminutely
Therapidcraftingofnewprogramorthemaking
of changes to existing, usually complicated
software

Hacker
Thepersonwhohacks

Cracker
Systemintruder/destroyer

History Of Hacking
The first hacker was appeared in 1960s at the
MassachusettsInstituteOfTechnology(MIT)
During the 1970s, a different kind of hacker
appeared:PhonePhreakerorPhoneHacker
In the 1980s, phreaks started to migrate to
computers,andthefirstBulletinBoardSystem(BBS)
appeared

During the 1990s, when the use of internet


widespreadaroundtheworld,hackersmultiplied
Hacker and Ethical Hacker
Hacker
Access computer system or network without
authorization
Breaksthelaw

EthicalHacker
Performsmostofthesameactivitiesbutwithowners
permission
EmployedbycompaniestoperformPenetrationTests
Types of Hacker
White Hat Hacker
Goodguys
Dontusetheirskillforillegalpurpose
Computer security experts and help to protect from
BlackHats.

Black Hat Hacker


Badguys
Usetheirskillmaliciouslyforpersonalgain
Hackbanks,stealcreditcardsanddefacewebsites

Grey Hat Hacker


ItisacombinationofWhitehatnBlackHatHackers
Goal of grey hat hackers is to provide national
security
Hacking Process
Some Tools
Some Famous Hacker

Ian Murphy Kevin Mitnick Johan Helsinguis

Linus Torvald Mark Abene Robert Morris


Recent news of Hacking
Nextgenerationpatchmanagementtoolreleased-SecuniaCSI7.0
AnonymitytoolTORgainsmorethan1.2millionuserssinceNSA
PRISMScandal
Fear of NSA PRISM : Indian Government may ban US email
servicesforofficialCommunication
CISCO vulnerability allows remote attacker to take control of
WindowsSystem
NewYorkTimes.TwitterandHuffingtonPostDomainshijackedby
SyrianElectronicArmy
FBIusesAnonymousHackerstoattackforeignGovernments
PalestinianHacker,whohackedZuckerbergsFacebookAccountto
beawardedwith$12000
ThankYou
ThankYou

You might also like