SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Ethical Hacking
Gaurav Yadav
Indian Institute of Information Technology Sonepat
Gaurav Yadav IIITS
Contents
Gaurav Yadav IIITS
• Introduction to Hacking
• The Evolution of Hacking
• Types of Hackers
• Understanding Ethical Hacking
• Law and Ethics
• Why Ethical Hacking?
• Types of Ethical Hacking
• Industry Perspective of Ethical Hacking
• Certifications for Ethical Hacking
Introduction to Hacking
Gaurav Yadav IIITS
• Hacking is the act of identifying security vulnerabilities in networks, computer
systems or electronic gadgets and exploiting them. For example – gaining
unauthorized access to someone’s Wi-Fi.
• Hacking requires creative thinking, persistent learning, and a lot of patience.
The Evolution of Hacking
Gaurav Yadav IIITS
• The birth of hacking took place at MIT in 1969.
• Earlier hacking was done just to improve performance by manipulating
software and hardware.
• In 1971 John Draper hacked a phone system.
• In 1983 Fred Cohen developed a virus.
• And further, more malwares were created and more hacking activities took
place.
Types of Hackers
Gaurav Yadav IIITS
• Black Hat Hackers (Crackers): They gain unauthorized system access. Data Theft,
Ransom, Defamation are their major reasons.
• Grey Hat Hackers: They often gain unauthorized system access, and report the
vulnerabilities to the owners, for a little fee. But if the owner doesn’t comply, they
make the vulnerabilities public.
• White Hat Hackers (Ethical Hackers): They gain authorized system access when the
owner allows them. They intend to secure computer networks or systems.
Understanding Ethical Hacking
Gaurav Yadav IIITS
Cybersecurity
Ethical
Hacking
• Ethical hacking is an essential part of
Cybersecurity.
• Ethical hacking is the act of finding security
loopholes in computer systems, networks, or
other electronic gadgets such as IoT Devices, by
the permission of the owner.
Law and Ethics
Gaurav Yadav IIITS
• All Ethical hackers are aware of laws and they know how the laws will impact their
work.
• Trust is the most import thing between an ethical hacker and the client.
• Going beyond the test limits can make clients to take legal action against ethical
hackers.
Why Ethical Hacking?
Gaurav Yadav IIITS
• To know weaknesses of the security architecture.
• For better preparation against cyberattacks.
• For better reaction to an ongoing cyberattack.
• For an understanding of the hacker’s point of view.
• For ensuring safety and privacy standards.
• In the ever-growing $150 billion* cybersecurity industry, ethical hacking is an
in-demand and rapidly growing career option.
*https://www.mordorintelligence.com/industry-reports/cyber-security-market
Types of Ethical Hacking
Gaurav Yadav IIITS
1. System Hacking : It involves gaining access into computers on a network by means of malware,
etc. For example – Privilege escalation in an operating system.
2. Wireless Network Hacking : It involves gaining access into private unsecured networks. For
Example – Hacking an unsecured Wi-Fi.
3. Web Application Hacking : It involves hacking into websites. It involves attacks like XSS, RCE,
IDORs, CSRF, Path Traversal, etc.
4. Web Server Hacking : It involves hacking into dedicated web servers of websites and altering
the content. For example - SQLi attacks.
5. Social Engineering : It involves the usage of social skills to lure people to provide sensitive
information. For example – Phone Phishing.
Industry Perspective of Ethical Hacking
Gaurav Yadav IIITS
• Companies either hire employ teams or launch public/private
VDPs(Vulnerability Disclosure Programs) to maintain security standards.
Platforms like Hackerone, Bugcrowd, Intigriti offer bug bounties on
behalf of several tech companies for a valid bug report.
• Ethical hacking reduces losses extensively.
Certifications for Ethical Hacking
Gaurav Yadav IIITS
• Cybersecurity giants like Cisco, Palo Alto Networks, etc. approve people based on
practical exams, and certify them accordingly.
• Certifications represent practical learning and an individual’s skillset.
• Certifications help in career upliftment.
• Some of the most popular certifications are OSCP, CompTIA Security+, CISSP,
CEH, etc.
References
Gaurav Yadav IIITS
1. https://www.eccouncil.org/ethical-hacking/
2. https://us.norton.com/internetsecurity-emerging-threats.html
3. https://www.kaspersky.co.in/enterprise-security/threat-management-defense-solution
4. https://www.guru99.com/ethical-hacking-tutorials.html
5. https://www.mordorintelligence.com/industry-reports/cyber-security-market
Gaurav Yadav IIITS
“Is hacking ever acceptable? It depends on the motive”
~ Charlie Brooker

Weitere ähnliche Inhalte

Was ist angesagt?

Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingNitish Kasar
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingKeith Brooks
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speechtalhaabid
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Moduleankit sarode
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingshinigami-99
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentationSuryansh Srivastava
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To HackingRaghav Bisht
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical HackingVanipriya Sakthivel
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingSanu Subham
 

Was ist angesagt? (20)

Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st ModuleBasic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Ă„hnlich wie Ethical hacking

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptxambemPrashanthi
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Cyber security
Cyber securityCyber security
Cyber securityTanmoyMaitra
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfuzair
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptxjohnnymaaza
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2Ishaq Shinwari
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........AalyanAbid
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptxInfosectrain3
 
Etical hacking
Etical hackingEtical hacking
Etical hackingtalhaabid
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hackingritik shukla
 
Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi SamridhiJain48
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Mohammad Affan
 

Ă„hnlich wie Ethical hacking (20)

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Hacking
HackingHacking
Hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Web security chapter#2
Web security chapter#2Web security chapter#2
Web security chapter#2
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Introduction of ethical hacking.........
Introduction of ethical hacking.........Introduction of ethical hacking.........
Introduction of ethical hacking.........
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Hacking
HackingHacking
Hacking
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
 
Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi Best Ethical Hacking Institute in Delhi
Best Ethical Hacking Institute in Delhi
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
 

KĂĽrzlich hochgeladen

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 

KĂĽrzlich hochgeladen (20)

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 

Ethical hacking

  • 1. Ethical Hacking Gaurav Yadav Indian Institute of Information Technology Sonepat Gaurav Yadav IIITS
  • 2. Contents Gaurav Yadav IIITS • Introduction to Hacking • The Evolution of Hacking • Types of Hackers • Understanding Ethical Hacking • Law and Ethics • Why Ethical Hacking? • Types of Ethical Hacking • Industry Perspective of Ethical Hacking • Certifications for Ethical Hacking
  • 3. Introduction to Hacking Gaurav Yadav IIITS • Hacking is the act of identifying security vulnerabilities in networks, computer systems or electronic gadgets and exploiting them. For example – gaining unauthorized access to someone’s Wi-Fi. • Hacking requires creative thinking, persistent learning, and a lot of patience.
  • 4. The Evolution of Hacking Gaurav Yadav IIITS • The birth of hacking took place at MIT in 1969. • Earlier hacking was done just to improve performance by manipulating software and hardware. • In 1971 John Draper hacked a phone system. • In 1983 Fred Cohen developed a virus. • And further, more malwares were created and more hacking activities took place.
  • 5. Types of Hackers Gaurav Yadav IIITS • Black Hat Hackers (Crackers): They gain unauthorized system access. Data Theft, Ransom, Defamation are their major reasons. • Grey Hat Hackers: They often gain unauthorized system access, and report the vulnerabilities to the owners, for a little fee. But if the owner doesn’t comply, they make the vulnerabilities public. • White Hat Hackers (Ethical Hackers): They gain authorized system access when the owner allows them. They intend to secure computer networks or systems.
  • 6. Understanding Ethical Hacking Gaurav Yadav IIITS Cybersecurity Ethical Hacking • Ethical hacking is an essential part of Cybersecurity. • Ethical hacking is the act of finding security loopholes in computer systems, networks, or other electronic gadgets such as IoT Devices, by the permission of the owner.
  • 7. Law and Ethics Gaurav Yadav IIITS • All Ethical hackers are aware of laws and they know how the laws will impact their work. • Trust is the most import thing between an ethical hacker and the client. • Going beyond the test limits can make clients to take legal action against ethical hackers.
  • 8. Why Ethical Hacking? Gaurav Yadav IIITS • To know weaknesses of the security architecture. • For better preparation against cyberattacks. • For better reaction to an ongoing cyberattack. • For an understanding of the hacker’s point of view. • For ensuring safety and privacy standards. • In the ever-growing $150 billion* cybersecurity industry, ethical hacking is an in-demand and rapidly growing career option. *https://www.mordorintelligence.com/industry-reports/cyber-security-market
  • 9. Types of Ethical Hacking Gaurav Yadav IIITS 1. System Hacking : It involves gaining access into computers on a network by means of malware, etc. For example – Privilege escalation in an operating system. 2. Wireless Network Hacking : It involves gaining access into private unsecured networks. For Example – Hacking an unsecured Wi-Fi. 3. Web Application Hacking : It involves hacking into websites. It involves attacks like XSS, RCE, IDORs, CSRF, Path Traversal, etc. 4. Web Server Hacking : It involves hacking into dedicated web servers of websites and altering the content. For example - SQLi attacks. 5. Social Engineering : It involves the usage of social skills to lure people to provide sensitive information. For example – Phone Phishing.
  • 10. Industry Perspective of Ethical Hacking Gaurav Yadav IIITS • Companies either hire employ teams or launch public/private VDPs(Vulnerability Disclosure Programs) to maintain security standards. Platforms like Hackerone, Bugcrowd, Intigriti offer bug bounties on behalf of several tech companies for a valid bug report. • Ethical hacking reduces losses extensively.
  • 11. Certifications for Ethical Hacking Gaurav Yadav IIITS • Cybersecurity giants like Cisco, Palo Alto Networks, etc. approve people based on practical exams, and certify them accordingly. • Certifications represent practical learning and an individual’s skillset. • Certifications help in career upliftment. • Some of the most popular certifications are OSCP, CompTIA Security+, CISSP, CEH, etc.
  • 12. References Gaurav Yadav IIITS 1. https://www.eccouncil.org/ethical-hacking/ 2. https://us.norton.com/internetsecurity-emerging-threats.html 3. https://www.kaspersky.co.in/enterprise-security/threat-management-defense-solution 4. https://www.guru99.com/ethical-hacking-tutorials.html 5. https://www.mordorintelligence.com/industry-reports/cyber-security-market
  • 13. Gaurav Yadav IIITS “Is hacking ever acceptable? It depends on the motive” ~ Charlie Brooker