0% found this document useful (0 votes)
96 views23 pages

Ethical Hacking

Uploaded by

jangraradhika34
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views23 pages

Ethical Hacking

Uploaded by

jangraradhika34
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

ETHICAL

HACKING
FULL COURSE
LEARN | HACK | PROTECT

iNSTRUCTOR:- PARAG
CHAWLA
-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------
DISCLAIMER
Every thing that will be shown in this course is for Education
purpose only.
I am not harming anyone device or system nor i have any intention
of harm anyone or their system. I will my own devices for every
practical that will be shown in this Course.
So please don’t use these method to harm anyone or to do any
ingillel and malicious activity because hacking is a crime.

If you do it will cause your problem and you will be in jail. So be


careful and don’t use it for any ILLEGAL activity.

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


WHO IS A HACKER?

WHAT WHAT A HACKING?

WILL YOU
LEARN TYPES OF HACKER?

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


ADVANTAGES OF
HACKING

WHAT DISADVANTAGES OF
HACKING
WILL YOU
LEARN SKILLS REQUIRED

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


WHO IS A HACKER?
A hacker is an individual who uses computer, networking or other
skills to overcome a technical problem. The term also may refer to
anyone who uses their abilities to gain unauthorized access to
systems or networks in order to commit crimes. A hacker may, for
example, steal information to hurt people via identity theft or bring
down a system and, often, hold it hostage in order to collect a
ransom.
WHAT IS HACKING?
Hacking is the act of compromising digital devices
and networks by gaining unauthorized access to
an account or computer system.

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


TYPES OF HACKING

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


TYPES OF HACKING

1. WEB APPLICATION HACKING:- Web hacking refers to exploitation of applications via HTTP which can be done by manipulating the
application via its graphical web interface, tampering the Uniform Resource Identifier (URI) or tampering HTTP elements not contained in the URI.

2. SYSTEM HACKING:- System hacking is the practice of attempting to manipulate the normal behavior of a system, usually a computer
system, to gain unauthorized access or perform unauthorized actions.

3. WEB SERVER HACKING:- Web content is generated in real time by a software application running at server-side. So hackers attack on
the web server to steal credential information, passwords, and business information by using DoS (DDos) attacks, SYN flood, ping flood, port
scan, sniffing attacks, and social engineering attacks.

4. HACKING WIRELESS NETWORK:- By using a technique called DNS (Domain Name Server) hijacking, hackers can breach the
security of your home Wi‑Fi and potentially cause you a great deal of harm. They can redirect your traffic to a website run by them, causing you
to unwittingly give your credit card number or Facebook login credentials to a criminal.

5. SOCIAL ENGINEERING:- Social engineering is a manipulation technique that exploits human error to gain private information, access,
or valuables. In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing data, spreading malware infections, or
giving access to restricted systems.

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


TYPES OF
HACKERS

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


BLACK HAT HACKER

Black Hat Hacker, also known as crackers, are those who hack in order
to gain unauthorized access to a system and harm its operations or steal
sensitive information.

A hacker may exploit security vulnerabilities for monetary gain; steal or


destroy private data; or alter, disrupt or shut down websites and
networks.

The hacker may also sell these exploits to other criminal organizations.
The term black hat has been used to differentiate criminal hackers from
white hat and gray hat hackers.

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


WHITE HAT HACKER

A white hat hacker, also called an ethical hacker, is the antithesis of a


black hat hacker. White hat hackers are not cybercriminals, rather they
are security specialists hired by organizations to conduct tasks such as
penetration tests and vulnerability assessments on their systems to
improve their security defenses.

When working as pen testers, white hat hackers conduct tests and attacks
on networks, websites and software in order to identify possible
vulnerabilities. They also follow established rules, such as bug bounty
policies.

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


GREY HAT HACKER

Gray hat hackers operate with more ethical ambiguity. While they do not
hack into systems with the malicious goal of stealing data, they don't
participate in true ethical hacking either.

For example, they may be willing to use illegal methods to find flaws.
They might then expose vulnerabilities to the public or sell zero-day
exploits to government and intelligence agencies.

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


SCRIPT KIDDIE

Script kiddies, also known as skiddies, are unskilled individuals who use
prewritten scripts and software to carry out their hacking ATTACK. They
are primarily known for using scripts or programs developed by others
for malicious purposes. Script kiddies are believed to reject the ethical
principles held by professional hackers, which include the pursuit of
knowledge, respect for skills, and a motive of self-education

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


HACKTIVISM

Hacktivism happens when political or social activists use computer technology to


make a statement supporting one of their causes. In most cases, hacktivism focuses on
either government or corporate targets, but it can include any significant institution,
such as religious groups, drug dealers, terrorists. Hacking means breaking into
someone’s computer. Activism refers to promoting a social perspective.

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


PURPOSE OF
HACKING
 SHOW-OFF
 FOR FUN
 REVENGE
 MONEY
 STEALING IMPORTANT INFORMATION
 SYSTEM SECURITY TESTING
 DAMAGING SYSTEM

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


ADVANTAGES OF
HACKING
• Recovering lost information, especially passwords.
• Performing penetration testing to strengthen computer and network
security.
• Identifying vulnerabilities and enhancing cybersecurity.
• To construct a computer system that prevents systems from hackers
and malicious threat and at the same time protects them.
• This helps to fight against cyber terrorism and to fight against
national security breaches.

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


DISADVANTAGES OF
HACKING

• Cybersecurity risks: Hacking can compromise the security of computer systems and
networks.
• Online threats: Hacking can lead to malware distribution, phishing attacks, and other
harmful activities.
• Data breaches: Hacking can expose sensitive information, leading to privacy invasion
and identity theft.
• Cybercrime implications: Hacking is often associated with fraud, extortion, and other
illegal activities.
• Illegal activities: Hacking can involve stealing valuable information, accessing restricted
spaces, and using unauthorized software

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


SKILLS REQUIRED TO BECAME A
HACKER
COMPUTER SKILLS PROGRAMMING LANGUAGE

1) COMPUTER SKILLS  PYTHON PROGRAMMING LANGUAGE


2) COMPUTER NETWORKING SKILLS  C++ PROGRAMMING LANGUAGE
3) LINUX SKILLS (KALI,PARROT)  PHP
4) HARDWARE KNOWLEDGE  JAVASCRIPT
5) DATABASE SKILLS  RUBY
6) PROGRAMMING SKILLS  BASH
7) SOCIAL ENGEENERING SKILLS  POWERSHELL SCRIPTING
8) PROBLEM SOLVING SKILLS  JAVA
9) REVERSE ENGEENERING

NOTE:- LEARN MORE LANGUAGE TO BECAME


ELITE HACKER

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


q

TYPES OF
CYBERCRIME
• Identity Theft
• Fraud
• Theft of Password
• Dos/Ddos
• Network Hacking
• Cyber Bullying
• Ransomeware
• Phishing
• Malware
• Cyberterrorism

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


CYBER SECURITY

C - Confidentiality
I - integrity
A - Availability

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


1. Confidentiality:-
Confidentiality involves the efforts of an organization to make sure data is kept secret
or private. To accomplish this, access to information must be controlled to prevent the unauthorized sharing of data
whether intentional or accidental.(Data must need to be encrepted)

2. Integrity:-
Integrity involves making sure your data is trustworthy and free from tampering. The
integrity of your data is maintained only if the data is authentic, accurate, and reliable.(there is no modification in
data)

3. Availability:-
Even if data is kept confidential and its integrity maintained, it is often useless unless it is
available to those in the organization and the customers they serve. This means that systems, networks, and
applications must be functioning as they should and when they should. Also, individuals with access to specific
information must be able to consume it when they need to, and getting to the data should not take an inordinate
amount of time.(The data must be available no unavailable)

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


RECONNAISSAN
CE

COVERING TARCKS
PHASES OF HACKING
SCANNING

MAINTAINING
GAINING ACCESS
ACCESS

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


Motives, Goals, and Objectives of Information Security Attacks

In the information security world, an attacker attacks the target system with the three main components
behind it. "Motive or Objective" of an attack makes an attacker focus on attacking a particular system.
Another major component is "Method" that is used by an attacker to gain access to a target system.
Vulnerability also helps the attacker to fulfill his intentions. These three components are the major blocks
on which an attack depends.

ATTACK MOTIVE METHOD VULNERABILITY

-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------


-- © Tech Academyy ------------------------------- www.techacademyy.in------------------- 001 -----------

You might also like