ethical hacking
TRANSCRIPT
ETHICAL HACKING
HarshaVardhan Brahmandam
III B.Tech, Computer Science, N.B.K.R.I.S.T
Vidyanagar, Kota Mandal, S.P.S.R.Nellore District, Andhra Pradesh-524413, India
Email: [email protected]
Contents
1. Introduction to hacking
2. Classification of hackers
3. Types of attacks
4. Types of hacking
5. Kali Linux1. Hacking methods
1. Tools provided in Kali Linux
6. Ethical hacking through Kali Linux
7. Advantages & Disadvantages
8. Conclusion
9. Summary
INTRODUCTION TO HACKING
CLASSIFICATION OF HACKERS
Hackers
Classification of “HATS” based on Intention
Black Hat White Hat Grey Hat
Qualification
Computer Science Technician Script
Kiddies
TYPES OF ATTACKS
DoS
Trojan Horse
Virus
Phishing
Worm
Logic Bomb
TYPES OF HACKING
Hacking
Website Hacking• Vulnerable loopholes
• Collapses the information• Make changes in the information
Kali Linux
Hacking
Ethical Hacking
Tools
HACKING METHODS
INFORMATION GATHERING
VULNERABILITY ANALYSIS
WIRELESS ATTACKS
WEB APPLICATIONS ATTACKS
STRESS TESTING
SNIFFING & SPOOFING
PASSWORD ATTACKS
HARDWARE HACKING
TOOLS PROVIDED IN KALI LINUX
TOOLS
….
….
ETHICAL HACKING THOUGH KALI LINUX
Ethical hacking
What can an intruder see on
the target systems ?
What are you trying to protect ?
What can an intruder do with that information
?
DISADVANTAGES
ADVANTAGES
ADVANTAGES
• Understanding the terms of security.• Protection himself/herself for external attacks.
• Ethical hackers are majorly hired by multinational companies.• Self Employment
• Exposing over self to the latest technology.
DISADVANTAGES
• Every ethical hacker is a real time hacker.• Could also a full time offensive hacker.• Internet is always under surveillance.
• prison.• could lead to legal charges.
CONCLUSION
One should know their level of security.Privacy is essential to every individual.Security should be given more priority.
Terms & Conditions should be noticed before confirming an action across the internet.
Proper ethical hackers should be employed.
SUMMARY
• Hacking is of two types
• There are several types of hacking
• Hacking through Kali Linux
• Ethical hacking – a legal method
• Consequences of illegal hacking
Any queries