Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
What to Upload to SlideShare
What to Upload to SlideShare
Loading in …3
×
1 of 13

Ethical hacking

1

Share

Download to read offline

Ethical Hacking Introduction

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Ethical hacking

  1. 1. Ethical Hacking Gaurav Yadav Indian Institute of Information Technology Sonepat Gaurav Yadav IIITS
  2. 2. Contents Gaurav Yadav IIITS • Introduction to Hacking • The Evolution of Hacking • Types of Hackers • Understanding Ethical Hacking • Law and Ethics • Why Ethical Hacking? • Types of Ethical Hacking • Industry Perspective of Ethical Hacking • Certifications for Ethical Hacking
  3. 3. Introduction to Hacking Gaurav Yadav IIITS • Hacking is the act of identifying security vulnerabilities in networks, computer systems or electronic gadgets and exploiting them. For example – gaining unauthorized access to someone’s Wi-Fi. • Hacking requires creative thinking, persistent learning, and a lot of patience.
  4. 4. The Evolution of Hacking Gaurav Yadav IIITS • The birth of hacking took place at MIT in 1969. • Earlier hacking was done just to improve performance by manipulating software and hardware. • In 1971 John Draper hacked a phone system. • In 1983 Fred Cohen developed a virus. • And further, more malwares were created and more hacking activities took place.
  5. 5. Types of Hackers Gaurav Yadav IIITS • Black Hat Hackers (Crackers): They gain unauthorized system access. Data Theft, Ransom, Defamation are their major reasons. • Grey Hat Hackers: They often gain unauthorized system access, and report the vulnerabilities to the owners, for a little fee. But if the owner doesn’t comply, they make the vulnerabilities public. • White Hat Hackers (Ethical Hackers): They gain authorized system access when the owner allows them. They intend to secure computer networks or systems.
  6. 6. Understanding Ethical Hacking Gaurav Yadav IIITS Cybersecurity Ethical Hacking • Ethical hacking is an essential part of Cybersecurity. • Ethical hacking is the act of finding security loopholes in computer systems, networks, or other electronic gadgets such as IoT Devices, by the permission of the owner.
  7. 7. Law and Ethics Gaurav Yadav IIITS • All Ethical hackers are aware of laws and they know how the laws will impact their work. • Trust is the most import thing between an ethical hacker and the client. • Going beyond the test limits can make clients to take legal action against ethical hackers.
  8. 8. Why Ethical Hacking? Gaurav Yadav IIITS • To know weaknesses of the security architecture. • For better preparation against cyberattacks. • For better reaction to an ongoing cyberattack. • For an understanding of the hacker’s point of view. • For ensuring safety and privacy standards. • In the ever-growing $150 billion* cybersecurity industry, ethical hacking is an in-demand and rapidly growing career option. *https://www.mordorintelligence.com/industry-reports/cyber-security-market
  9. 9. Types of Ethical Hacking Gaurav Yadav IIITS 1. System Hacking : It involves gaining access into computers on a network by means of malware, etc. For example – Privilege escalation in an operating system. 2. Wireless Network Hacking : It involves gaining access into private unsecured networks. For Example – Hacking an unsecured Wi-Fi. 3. Web Application Hacking : It involves hacking into websites. It involves attacks like XSS, RCE, IDORs, CSRF, Path Traversal, etc. 4. Web Server Hacking : It involves hacking into dedicated web servers of websites and altering the content. For example - SQLi attacks. 5. Social Engineering : It involves the usage of social skills to lure people to provide sensitive information. For example – Phone Phishing.
  10. 10. Industry Perspective of Ethical Hacking Gaurav Yadav IIITS • Companies either hire employ teams or launch public/private VDPs(Vulnerability Disclosure Programs) to maintain security standards. Platforms like Hackerone, Bugcrowd, Intigriti offer bug bounties on behalf of several tech companies for a valid bug report. • Ethical hacking reduces losses extensively.
  11. 11. Certifications for Ethical Hacking Gaurav Yadav IIITS • Cybersecurity giants like Cisco, Palo Alto Networks, etc. approve people based on practical exams, and certify them accordingly. • Certifications represent practical learning and an individual’s skillset. • Certifications help in career upliftment. • Some of the most popular certifications are OSCP, CompTIA Security+, CISSP, CEH, etc.
  12. 12. References Gaurav Yadav IIITS 1. https://www.eccouncil.org/ethical-hacking/ 2. https://us.norton.com/internetsecurity-emerging-threats.html 3. https://www.kaspersky.co.in/enterprise-security/threat-management-defense-solution 4. https://www.guru99.com/ethical-hacking-tutorials.html 5. https://www.mordorintelligence.com/industry-reports/cyber-security-market
  13. 13. Gaurav Yadav IIITS “Is hacking ever acceptable? It depends on the motive” ~ Charlie Brooker

×