Ethical Hacking
Ethical Hacking
Ethical Hacking
Mridula - 5,6,7,8
Harsh - 9,10,11,12
Rehan - 13,14,15,16
Priyanka - 17,18
Prajakta - 19,20,21,22
WHO IS A HACKER?
• The term also may refer to anyone who uses their abilities
to gain unauthorized access to systems or networks in order
to commit crimes.
TYPES OF HACKERS
Similar to black hat hackers, white hat hackers are cybersecurity experts who use their
skills to find vulnerabilities in organizational networks and computer systems.
The key difference between them, however, is that white hat hackers are authorized to
hack these systems for the purpose of spotting security vulnerabilities before a criminal
hacker can.
Typically, they engage in hacking activities for the pure enjoyment of finding gaps in
computer systems, and they might even let the owner know if any weak points are
found.
Black Hat: Criminal Hackers
A black hat hacker is a cybercriminal who breaks into
computer systems with malicious or criminal intent.
Their role is to find loopholes or security vulnerabilities in the new software and remedy
them before it launches.
They primarily focus on gaining knowledge on how to perform cyberattacks on the same
level as their black hat counterparts.
Their main intent is to eventually evolve into a full-fledged hacker, so they spend their
time looking for learning opportunities from more experienced hackers.
Red hat hackers are hired by government agencies to spot vulnerabilities in security
systems, with a specific focus on finding and disarming black hat hackers.
BEST PROGRAMMING LANGUAGES FOR ETHICAL HACKERS
• C Programming
• C++ Programming
• Python
• JavaScript
• Ruby Programming
• Assembly
• Phishing
• Keylogger injection.
Users are then tricked into entering their login credentials and disclosing other
personal information, such as birth date, Social Security number or credit card
details.
User interface (UI) redress. This technique, also known as click jacking, creates
a fake UI and link on top of an authentic webpage and tricks the user into clicking
on the link.
The threat actor can then take access of the user's computer without their
knowledge.
DoS and DDoS. These techniques make it impossible for users to access their
computer systems, networks, services or other information technology (IT)
resources.
Typically, a criminal hacker uses this technique to crash web servers, systems or
networks by disrupting the normal flow of traffic.
This enables the threat actor to steal personally identifiable information, login
credentials and sensitive enterprise data.
Brute-force attack. These attacks commonly use automated tools to guess various
combinations of username and password until they find the correct combination
Although the idea of "hacking" has existed long before the term "hacker"—
with the most notable example of Lightning Ellsworth, it was not a word that
the first programmers used to describe themselves.
• They collect and analyse the information to figure out ways to strengthen the
security of the system/network/applications.
• By doing so, they can improve the security footprint so that it can better
withstand attacks or divert them.
6. Ethical hackers, or white hat hackers, offer a new approach to safety. In order
to test your security measures, they perform ‘pen tests’ on your organisation.
7. In other words, they ‘hack’ your systems for you and provide you with insight
and valuable information regarding your organization’s security posture.
WHO IS A HACKER?
• The term also may refer to anyone who uses their abilities to gain unauthorized
access to systems or networks in order to commit crimes.
TYPES OF HACKERS
• Ethical hackers
• Threat actors
• Gray hat hackers
• Red hat hackers
• Script kiddies
• Hacktivists
• C Programming
• C++ Programming
• Python
• JavaScript
• Ruby Programming
• Assembly
• Phishing
• Viruses and malicious code
• Keylogger injection.
Viruses and malicious code. A hacker inserts malicious code, including worms
and Trojan horses, into website files, often with the intent to steal cookies that
track a user's online activity.
DoS and DDoS. These techniques make it impossible for users to access their
computer systems, networks, services or other information technology (IT)
resources. Typically, a criminal hacker uses this technique to crash web servers,
systems or networks by disrupting the normal flow of traffic.
Predators who stalk people while online can pose a serious physical threat. Using extreme
caution when agreeing to meet an online “friend” or acquaintance in person is always the best
way to keep safe.
Ethical Hackers must follow certain guidelines in order to perform hacking legally. A
good hacker knows his or her responsibility and adheres to all of the ethical guidelines.
Here are the most important rules of Ethical Hacking:
An ethical hacker must seek authorization from the organization that owns the
system. Hackers should obtain complete approval before performing any security
assessment on the system or network.
Determine the scope of their assessment and make known their plan to the
organization.
Report any security breaches and vulnerabilities found in the system or network.
Keep their discoveries confidential. As their purpose is to secure the system or
network, ethical hackers should agree to and respect their non-disclosure agreement.
Erase all traces of the hack after checking the system for any vulnerability. It
prevents malicious hackers from entering the system through the identified
loopholes.
WHO IS A HACKER?
• The term also may refer to anyone who uses their abilities to gain
unauthorized access to systems or networks in order to commit
crimes.