Ethical Hacking

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

Aditi - 1,2,3,4

Mridula - 5,6,7,8

Harsh - 9,10,11,12

Rehan - 13,14,15,16

Priyanka - 17,18

Prajakta - 19,20,21,22

WHO IS A HACKER?

• A hacker is an individual who uses computer, networking


or other skills to overcome a technical problem.

• The term also may refer to anyone who uses their abilities
to gain unauthorized access to systems or networks in order
to commit crimes. 

• The term hacker has historically been a divisive one,


sometimes being used as a term of admiration for
individuals who exhibit a high degree of skill and creativity
in their approach to technical problems.

• Hacker was first used in the 1960s to describe a


programmer or an individual who, in an era of highly
constrained computer capabilities, could increase the
efficiency of computer code in a way that removed,
or hacked, excess machine code instructions from a
program.

• A hacker may, for example, steal information to hurt


people via identity theft or bring down a system and, often,
hold it hostage in order to collect a ransom.

TYPES OF HACKERS

• The security community informally used references to hat


colour as a way to identify different types of hackers,
usually divided into five main types.

• A few of these terms have been replaced to reflect cultural


changes.
 White Hat: Authorized Hackers

Similar to black hat hackers, white hat hackers are cybersecurity experts who use their
skills to find vulnerabilities in organizational networks and computer systems.

The key difference between them, however, is that white hat hackers are authorized to
hack these systems for the purpose of spotting security vulnerabilities before a criminal
hacker can.

Grey hat hackers: “Just for Fun” Hackers


Grey hat hacker’s fall somewhere between ethical hackers
and threat actors. 

Typically, they engage in hacking activities for the pure enjoyment of finding gaps in
computer systems, and they might even let the owner know if any weak points are
found.
Black Hat: Criminal Hackers
A black hat hacker is a cybercriminal who breaks into
computer systems with malicious or criminal intent. 

Their advanced technical knowledge and ability to navigate


the cybersecurity landscape is what makes them so skilled
in carrying out their attacks.
Blue Hat: Authorized Software Hackers
Blue hat hackers, also known as vengeful hackers, use
hacking as a social weapon. Blue hat hackers are hired by organizations to
bug-test a new software or system network before it’s released.

Their role is to find loopholes or security vulnerabilities in the new software and remedy
them before it launches.

Green Hat: Hackers-in-Training


A green hat hacker is someone who is new to the hacking world but is intently focused
on increasing their cyberattack skills.

They primarily focus on gaining knowledge on how to perform cyberattacks on the same
level as their black hat counterparts.

Their main intent is to eventually evolve into a full-fledged hacker, so they spend their
time looking for learning opportunities from more experienced hackers.

Red Hat: Government-Hired Hackers


Red hat hackers, also called eagle-eyed or vigilante
hackers, are similar to ethical hackers.

Red hat hackers are hired by government agencies to spot vulnerabilities in security
systems, with a specific focus on finding and disarming black hat hackers. 
BEST PROGRAMMING LANGUAGES FOR ETHICAL HACKERS

• C Programming

• C++ Programming

• Structured Query Language (SQL)

• Hypertext Preprocessor (PHP)

• Python

• JavaScript

• Ruby Programming

• Assembly

COMMON HACKING TECHNIQUES

While the technological basis of these techniques is constantly evolving to keep up


with developments in cybersecurity, the following common hacking techniques are
persistent:

• Phishing

• User interface (UI) redress

• DoS and DDoS. 

• Domain name system (DNS) cache poisoning.


• Structured Query Language (SQL) injection. 

• Keylogger injection. 

 Phishing. The criminal hacker creates a fraudulent email that appears to come


from a legitimate organization and prompts the user to open it.

 Users are then tricked into entering their login credentials and disclosing other
personal information, such as birth date, Social Security number or credit card
details.

 User interface (UI) redress. This technique, also known as click jacking, creates
a fake UI and link on top of an authentic webpage and tricks the user into clicking
on the link.

 The threat actor can then take access of the user's computer without their
knowledge.

 DoS and DDoS. These techniques make it impossible for users to access their
computer systems, networks, services or other information technology (IT)
resources.

 Typically, a criminal hacker uses this technique to crash web servers, systems or
networks by disrupting the normal flow of traffic.

 Domain name system (DNS) cache poisoning. This technique, also known


as DNS spoofing, exploits DNS clients and web servers by diverting internet traffic
to fake servers.

 Structured Query Language (SQL) injection. This technique adds SQL code to


a web form input box in order to gain access to unauthorized resources and data.

 Keylogger injection. A keylogging program is injected into the user's system as


malware to monitor and record each of the user's keystrokes.

 This enables the threat actor to steal personally identifiable information, login
credentials and sensitive enterprise data.
 Brute-force attack. These attacks commonly use automated tools to guess various
combinations of username and password until they find the correct combination

DEFINITION OF ETHICAL HACKING

 Ethical hacking involves an authorized attempt to gain unauthorized access to a


computer system, application, or data.

 Carrying out an ethical hack involves duplicating strategies and actions of


malicious attackers.

 This practice helps to identify security vulnerabilities which can then be


resolved before a malicious attacker has the opportunity to exploit them.

 Ethical hacker are also known as “white hats”.

 The word "hacker" derives from the seventeenth-century word of a "lusty


laborer" who harvested fields by dogged and rough swings of his hoe.

 Although the idea of "hacking" has existed long before the term "hacker"‍—‌
with the most notable example of Lightning Ellsworth, it was not a word that
the first programmers used to describe themselves.

WHAT IS ETHICAL HACKING??

• Ethical Hacking is an authorized practice of bypassing system security to


identify potential data breaches and threats in a network.

• The company that owns the system or network allows Cyber Security


engineers to perform such activities in order to test the system’s defences.
• Ethical hackers aim to investigate the system or network for weak points that
malicious hackers can exploit or destroy.

• They collect and analyse the information to figure out ways to strengthen the
security of the system/network/applications.

• By doing so,  they can improve the security footprint so that it can better
withstand attacks or divert them.

• Ethical hackers are hired by organizations to look into the vulnerabilities of


their systems and networks and develop solutions to prevent data breaches.

WHY IS ETHICAL HACKING IMPORTANT?

1. There is no doubt that information is the most valuable asset in today’s


business environment.

2. From government agencies to private companies, all kinds and sizes of


organizations deal with massive amounts of sensitive and valuable data on a
daily basis.

3. As a result, they are often targeted by terrorist groups, hacker teams, cyber


criminals and such.

4. In order to be safe and protected, organisations of all sizes take numerous


security measures but simply locking your doors and shutting your windows
can’t ensure your safety.

5. In today’s world, organizations need to take proactive measures and update


their security on a regular basis.

6. Ethical hackers, or white hat hackers, offer a new approach to safety. In order
to test your security measures, they perform ‘pen tests’ on your organisation.
7. In other words, they ‘hack’ your systems for you and provide you with insight
and valuable information regarding your organization’s security posture.

WHO IS A HACKER?

• A hacker is an individual who uses computer, networking or other skills to


overcome a technical problem.

• The term also may refer to anyone who uses their abilities to gain unauthorized
access to systems or networks in order to commit crimes. 

• The term hacker has historically been a divisive one, sometimes being used as a


term of admiration for individuals who exhibit a high degree of skill and
creativity in their approach to technical problems.

• Hacker was first used in the 1960s to describe a programmer or an individual


who, in an era of highly constrained computer capabilities, could increase the
efficiency of computer code in a way that removed, or hacked, excess machine
code instructions from a program.

TYPES OF HACKERS

• The security community informally used references to hat colour as a way to


identify different types of hackers, usually divided into five main types.

• A few of these terms have been replaced to reflect cultural changes.

• Ethical hackers

• Threat actors

• Gray hat hackers
• Red hat hackers

• Blue hat hackers

• Script kiddies 

• Hacktivists 

BEST PROGRAMMING LANGUAGES FOR ETHICAL HACKERS

• C Programming

• C++ Programming

• Structured Query Language (SQL)

• Hypertext Preprocessor (PHP)

• Python

• JavaScript

• Ruby Programming

• Assembly

COMMON HACKING TECHNIQUES

While the technological basis of these techniques is constantly evolving to keep up


with developments in cybersecurity, the following common hacking techniques are
persistent:

• Phishing
• Viruses and malicious code

• User interface (UI) redress

• DoS and DDoS. 

• Domain name system (DNS) cache poisoning.

• Structured Query Language (SQL) injection. 

• Keylogger injection. 

 Phishing. The criminal hacker creates a fraudulent email that appears to come


from a legitimate organization and prompts the user to open it. Users are then
tricked into entering their login credentials and disclosing other personal
information, such as birth date, Social Security number or credit card details.

 Viruses and malicious code. A hacker inserts malicious code, including worms
and Trojan horses, into website files, often with the intent to steal cookies that
track a user's online activity.

 User interface (UI) redress. This technique, also known as clickjacking, creates a


fake UI and link on top of an authentic webpage and tricks the user into clicking
on the link. The threat actor can then take access of the user's computer without
their knowledge.

 DoS and DDoS. These techniques make it impossible for users to access their
computer systems, networks, services or other information technology (IT)
resources. Typically, a criminal hacker uses this technique to crash web servers,
systems or networks by disrupting the normal flow of traffic.

 Domain name system (DNS) cache poisoning. This technique, also known


as DNS spoofing, exploits DNS clients and web servers by diverting internet traffic
to fake servers.
 Structured Query Language (SQL) injection. This technique adds SQL code to
a web form input box in order to gain access to unauthorized resources and data.

 Keylogger injection. A keylogging program is injected into the user's system as


malware to monitor and record each of the user's keystrokes. This enables the
threat actor to steal personally identifiable information, login credentials and
sensitive enterprise data.

 Brute-force attack. These attacks commonly use automated tools to guess various


combinations of username and password until they find the correct combinatio

What are things that a hacker can do to me?


While your computer is connected to the Internet, the malware a hacker has installed on your PC
quietly transmits your personal and financial information without your knowledge or consent.
Or, a computer predator may pounce on the private information you unwittingly revealed. In
either case, they will be able to:

 Hijack your usernames and passwords


 Steal your money and open credit card and bank accounts in your name
 Ruin your credit
 Request new account Personal Identification Numbers (PINs) or additional credit cards
 Make purchases
 Add themselves or an alias that they control as an authorized user so it’s easier to use
your credit
 Obtain cash advances
 Use and abuse your Social Security number
 Sell your information to other parties who will use it for illicit or illegal purposes

Predators who stalk people while online can pose a serious physical threat. Using extreme
caution when agreeing to meet an online “friend” or acquaintance in person is always the best
way to keep safe.

There is six-step usually performed by ethical hackers in the ethical hacking


process.
1. Reconnaissance –
It is the principal stage where the Hacker attempts to gather data about the
objective. It incorporates Identifying the Target, discovering the objective’s IP
Address Range, DNS records, Network, and so on.
 
2. Scanning – 
In this stage, the hacker starts to effectively test an objective machine or
organization for weaknesses that can be abused. It incorporates the
utilization of apparatuses like dialers, network mappers, sweepers, port
scanners, and weakness scanners to check information.
 
3. Gaining Access – 
In this stage, the hacker plans the outline of the organization of the objective
with the assistance of information gathered during observation and checking.
The hacker has got done with identifying and checking the organization and
now concludes that they have a few alternatives to access the organization.
 
4. Maintaining Access – 
It is the interaction where the hacker has effectively gotten entrance into a
framework. By getting entrance, the hacker introduces a few secondary
passages to go into the framework when he needs access in this possessed
framework in the future. Metasploit is the favored apparatus in this cycle.
 
5. Clearing Tracks – 
This process is basically an unethical activity. It has to do with the erasure of
logs of the multitude of exercises that occur during the hacking interaction.
 
6. Reporting – 
It is the last step of finishing the ethical hacking process. In this the Ethical
Hacker aggregates a report with his discoveries and the work that was done,
for example, the instruments utilized, weaknesses found, the achievement
rate, and the endeavor measures.

Ethical Hacker Roles and Responsibilities

Ethical Hackers must follow certain guidelines in order to perform hacking legally. A
good hacker knows his or her responsibility and adheres to all of the ethical guidelines.
Here are the most important rules of Ethical Hacking:

 An ethical hacker must seek authorization from the organization that owns the
system. Hackers should obtain complete approval before performing any security
assessment on the system or network.

 Determine the scope of their assessment and make known their plan to the
organization.

 Report any security breaches and vulnerabilities found in the system or network.
 Keep their discoveries confidential. As their purpose is to secure the system or
network, ethical hackers should agree to and respect their non-disclosure agreement.

 Erase all traces of the hack after checking the system for any vulnerability. It
prevents malicious hackers from entering the system through the identified
loopholes.

 Definition Of Ethical Hacking


 What Is Ethical Hacking??
 Why Is Ethical Hacking Important?
 Who Is A Hacker?
 Types Of Hackers
 Best Programming Languages For Ethical Hackers
 Common Hacking Techniques
 Cartoon Pics With Message
 Quotes
 Graphical Re-Presentation
 What Are Things That A Hacker Can Do??
 Modes Of Ethical Hacking?
 Advantages Of Ethical Hacking
 Disadvantages Of Ethical Hacking
 Ethical Hacking Process
 Skills Required To Become An Ethical Hacker
 Hacker Challenge Website
 Ethical Hacker Roles And Responsibilities

WHO IS A HACKER?

• A hacker is an individual who uses computer, networking or other


skills to overcome a technical problem.

• The term also may refer to anyone who uses their abilities to gain
unauthorized access to systems or networks in order to commit
crimes. 

• The term hacker has historically been a divisive one, sometimes


being used as a term of admiration for individuals who exhibit a
high degree of skill and creativity in their approach to technical
problems.

• Hacker was first used in the 1960s to describe a programmer or an


individual who, in an era of highly constrained computer
capabilities, could increase the efficiency of computer code in a
way that removed, or hacked, excess machine code instructions
from a program.

• A hacker may, for example, steal information to hurt people via


identity theft or bring down a system and, often, hold it hostage in
order to collect a ransom.
• However, the term is also commonly applied to individuals who
use this skill for illegal or unethical purposes.

• It has evolved over the years to refer to someone with an advanced


understanding of computers, networking, programming or
hardware.

You might also like