2. Contents
Gaurav Yadav IIITS
• Introduction to Hacking
• The Evolution of Hacking
• Types of Hackers
• Understanding Ethical Hacking
• Law and Ethics
• Why Ethical Hacking?
• Types of Ethical Hacking
• Industry Perspective of Ethical Hacking
• Certifications for Ethical Hacking
3. Introduction to Hacking
Gaurav Yadav IIITS
• Hacking is the act of identifying security vulnerabilities in networks, computer
systems or electronic gadgets and exploiting them. For example – gaining
unauthorized access to someone’s Wi-Fi.
• Hacking requires creative thinking, persistent learning, and a lot of patience.
4. The Evolution of Hacking
Gaurav Yadav IIITS
• The birth of hacking took place at MIT in 1969.
• Earlier hacking was done just to improve performance by manipulating
software and hardware.
• In 1971 John Draper hacked a phone system.
• In 1983 Fred Cohen developed a virus.
• And further, more malwares were created and more hacking activities took
place.
5. Types of Hackers
Gaurav Yadav IIITS
• Black Hat Hackers (Crackers): They gain unauthorized system access. Data Theft,
Ransom, Defamation are their major reasons.
• Grey Hat Hackers: They often gain unauthorized system access, and report the
vulnerabilities to the owners, for a little fee. But if the owner doesn’t comply, they
make the vulnerabilities public.
• White Hat Hackers (Ethical Hackers): They gain authorized system access when the
owner allows them. They intend to secure computer networks or systems.
6. Understanding Ethical Hacking
Gaurav Yadav IIITS
Cybersecurity
Ethical
Hacking
• Ethical hacking is an essential part of
Cybersecurity.
• Ethical hacking is the act of finding security
loopholes in computer systems, networks, or
other electronic gadgets such as IoT Devices, by
the permission of the owner.
7. Law and Ethics
Gaurav Yadav IIITS
• All Ethical hackers are aware of laws and they know how the laws will impact their
work.
• Trust is the most import thing between an ethical hacker and the client.
• Going beyond the test limits can make clients to take legal action against ethical
hackers.
8. Why Ethical Hacking?
Gaurav Yadav IIITS
• To know weaknesses of the security architecture.
• For better preparation against cyberattacks.
• For better reaction to an ongoing cyberattack.
• For an understanding of the hacker’s point of view.
• For ensuring safety and privacy standards.
• In the ever-growing $150 billion* cybersecurity industry, ethical hacking is an
in-demand and rapidly growing career option.
*https://www.mordorintelligence.com/industry-reports/cyber-security-market
9. Types of Ethical Hacking
Gaurav Yadav IIITS
1. System Hacking : It involves gaining access into computers on a network by means of malware,
etc. For example – Privilege escalation in an operating system.
2. Wireless Network Hacking : It involves gaining access into private unsecured networks. For
Example – Hacking an unsecured Wi-Fi.
3. Web Application Hacking : It involves hacking into websites. It involves attacks like XSS, RCE,
IDORs, CSRF, Path Traversal, etc.
4. Web Server Hacking : It involves hacking into dedicated web servers of websites and altering
the content. For example - SQLi attacks.
5. Social Engineering : It involves the usage of social skills to lure people to provide sensitive
information. For example – Phone Phishing.
10. Industry Perspective of Ethical Hacking
Gaurav Yadav IIITS
• Companies either hire employ teams or launch public/private
VDPs(Vulnerability Disclosure Programs) to maintain security standards.
Platforms like Hackerone, Bugcrowd, Intigriti offer bug bounties on
behalf of several tech companies for a valid bug report.
• Ethical hacking reduces losses extensively.
11. Certifications for Ethical Hacking
Gaurav Yadav IIITS
• Cybersecurity giants like Cisco, Palo Alto Networks, etc. approve people based on
practical exams, and certify them accordingly.
• Certifications represent practical learning and an individual’s skillset.
• Certifications help in career upliftment.
• Some of the most popular certifications are OSCP, CompTIA Security+, CISSP,
CEH, etc.