Professional Documents
Culture Documents
BY
Madhu Dadi
WHO IS A
HACKER ?
Hacker
Access computer System or network without
authorization
Breaks the law
Ethical Hackers
Performs the same activities with the Owner’s
Permission
Employed the companies to perform the Penetration
Tests
NEED FOR ETHICAL HACKING
• ’To catch a thief you have to
think like a thief”
• Helps in closing the open
holes in the system network
• Provides security to banking
and financial establishments
• Prevents website
defacements
• An evolving
technique
WHAT IS THE NEED FOR ETHICAL HACKING?
Protection from possible External Attacks
Social
Engineering
Automated
Organizationa Attacks
l Attacks
Restricte
d Data
Accidental Breaches in
Security
Denial of
Viruses, Trojan Horses, Service (DoS)
and Worms
TYPES OF HACKERS
▶ White Hat
▶ Good Guys
▶ Don’t use their Skill for illegal purpose
▶ Computer Security experts and help to protect from Black Hats
▶ Black Hat
▶ Bad Guys
▶ Use the skill for malicious purpose
▶ Hack banks, websites, credit cards
▶ Grey Hat
▶ Combination of black hat and white hat
Hacking Process
Escalating Footprinting
privilege,
Covering (information
Tracks, and gathering)
Creating
Backdoors
Attack and
Gaining Scanning
Access
Enumerations
TYPES OF ATTACKING
MODES
• Brute force attack
• Social engineering/cyber fraud
• Denial-of-Service(DoS)
• Malware attacks
• SQL Injection
• Phishing attack
• MITM attack
• Cross Site Scripting (XSS)
BRUTE FORCE ATTACK