18

Ethical hacking

Embed Size (px)

Citation preview

WARNING :

•THIS IS PURELY FOR EDUCATIONAL

PURPOSE AND I AM NOT RESPONSIBLE IF

YOU CRCK SOMWTHING AND GO TO JAIL

FOR YEARS

HACKER

H-HIDE IP

A-AIM VICTIM

C-CRACK ENCRYPT

K-KILL FIREWALL

E-ENTER INTO DATABASE

R-RETURN ANONYMOUS

WHAT IS ETHICAL HACKING?

IT IS LEGAL

PERMISSION IS OBTAINED FROM THE TARGET

PART OF AN OVERALL SECURITY PROGRAM

IDENTIFY VULNERABILITIES VISIBLE FROM INTERNET AT PARTICULAR POINT OF

TIME

ETHICAL HACKERS POSSESSES SAME SKILLS, MINDSET AND TOOLS OF A HACKER

BUT THE ATTACKS ARE DONE IN A NON-DESTRUCTIVE MANNER

WHAT IS HACKING..? &

WHO IS ETHICAL HACKER..?

HACKING is Nothing But an art of using some software and other

resources.

Using these skill for a good Purpose will make you an ethical

hacker and using it with bad intent will make you a malicious Hacker.

WHY DO HACKERS HACK ?

JUST FOR FUN.

SHOW OFF.

HACK OTHER SYSTEMS SECRETLY.

NOTIFY MANY PEOPLE THEIR THOUGHT.

STEAL IMPORTANT INFORMATION.

DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.

SKILLS NEEDED

TECHNICAL KNOWLEDGE.

SOFT SKILLS / SOCIAL

ENGINEERING.

BECOMING A CERTIFIED

ETHICAL HACKER (CEH).

TYPES OF HACKING

WEBSITE HACKING

NETWORK HACKING

EMAIL HACKING

PASSWORD HACKING

ONLINE BANKING HACKING

COMPUTER HACKING

ADVANTAGES OF HACKING

CAN BE USED TO RECOVER LOST INFORMATION WHERE THE

COMPUTER PASSWORD HAS BEEN LOST.

TEACHES YOU THAT NO TECHNOLOGY IS 100% SECURE.

TO TEST HOW GOOD SECURITY IS ON YOUR OWN NETWORK.

THEY CALL IT WHITE HAT COMPUTER HACKING.

DISADVANTAGES OF HACKING

CRIMINALS CAN USE IT TO THEIR ADVANTAGE.

IT CAN HARM SOMEONE'S PRIVACY

IT'S ILLEGAL

Some Famous Hacker

Ian Murphy Kevin Mitnick Johan Helsinguis

Linus Torvald Mark Abene Robert Morris

WHAT TO DO AFTER BEING HACKED?

SHUTDOWN THE SYSTEM

CLEAR THE MEMORY USING CLEANERS (LIKE CCLEANER)

SCAN INFECTED SECTIONS WITH GOOD ANTIVIRUS

SEPARATE THE SYSTEM FROM NETWORK (DO NOT USE INTERNET)

RESTORE THE SYSTEM WITH THE BACKUP (IF O/S PROBLEM)

FINALLY, CONNECT THE SYSTEM TO THE NETWORK

Tips on how to not get hacked :

Never entertain any pop-up windows.

Always use VIRTUAL KEYPAD to prevent keyloggers.

Never click suspicious link of an email.

Differentiate original link and fake links properly.

(For example :200.122.14.0/onlinesbi.com is a fake link.)

Always remain updated.

Be Careful Of What you download.

Please change your Password regularly and remember

to use alphanumeric password.

(For Example : StRongPasswor@145.)

CONCLUSION

KEEP YOUR PASSWORD PROTECTED. WRITE YOUR PASSWORD

SHOULD BE WITH COMBINATION OF CHARACTERS, DIGITS,

SPECIAL SYMBOLS. DO NOT RESPOND TO FECK ON FISHING EMAIL.

WHEN YOU ARE DOING ANY ONLINE TRANSECTION ALWAYS KEEP

WATCH ON SITE WHETHER THE PROTOCOL OF SITE IS HTTPS &

WHETHER THERE IS A LOCK SYMBOL .

“Parctice Makes a Man Perfect”