Professional Documents
Culture Documents
Hacking
Hacking
to
Ethical Hacking
Overview
1.Introduction
2.Types of Hackers
3.Purpose Of Hacking
4.Hacking Methodology
5.Hacking Techniques
7.References
What is Hacking ?
They use their knowledge and skill set for illegal activities,
destructive intents, without authorization.
They exhibits traits from both white hats & black hats.
Like a white hat, he'll inform the administrator of the
website of the vulnerabilities, he found after hacking
through the site.
Like a black hat, he’ll hack any site freely and without any
authorization from owners whatsoever.
He'll even offer to repair the vulnerable site, that he exposed .
Purpose Of Hacking
#Show off
12/17/2021
Maintaining Access
12/17/2021
Covering Tracks
This is the last & final stage where a hacker deletes all
logs showing his malicious behavior.
So, They don’t get caught.
2.Evidence Elimination
3.Hiding
12/17/2021
Hacking Techniques
12/17/2021
Low Tech Methods
Social Engineering
•Hacker takes advantage of trusting human being to get
information from them
•eg a ploy to install new security update on your system
Shoulder Surfing
Guessing
•weak password like death of birth, pet name, nick name etc..
12/17/2021
High Tech Methods
Phishing
Brute Force Attacks
Sniffing
LFI(Local File Inclusion)
Metasploit
Dos Attack
SQL Injection
12/17/2021
Hacking Tools
BackTrack
Kali Linux
BugTraq
BackBox
12/17/2021
How to get rid of?
• Keep firewall ON
www.google.com/
http://sectools.org/
Wikipedia
http://thehackernews.com/
12/17/2021