SlideShare a Scribd company logo
Ethical Hacking
Agenda
 Cyber security
 Cyber Threats
 Fundamentals of Networking
 Penetration Testing
 Nmap
 XSS
 DDOS
 SQL
 Steganography
Basics of cyber security
Three pillars
Cyber Threats
Skills
Necessary
Footprinting
This gives the Information like IP,host
etc.
Netcraft
ARIN
Important commands
 Whois Netflix.com
 dig geu.ac.in
 “index of:”
 Goggle hacking database
Networking Fundamentals
Addressing
 Unicast
 Broadcast
 Multicast
DHCP
Difference in DHCP and Nat
 Nat is used to translate public to private ip address inside a
network, dhcp is used for automatically giving the hosts in a network an ip,
so that they can communicate with the router, and the outside world.
... NAT is when device's address in network 1 is exposed to network 2
under a different address.
Certificate
Hashing
SSL and TLS
TLS
Bitlocker
IDS
Cross site-scripting
Types of Cross site scripting

More Related Content

PPT
Ch11 Basic Cryptography
Information Technology
 
PPT
Network security
Dhaval Kaneria
 
PPTX
Cryptographic tools
CAS
 
PDF
Ch 12: Cryptography
Sam Bowne
 
PPTX
Enhancing lan using cryptography and other modules
Murali Krishna
 
PPTX
Basic concept of pki
Prabhat Goel
 
PPT
Cryptography
amiable_indian
 
PPTX
Network security and cryptography
RajKumar Rampelli
 
Ch11 Basic Cryptography
Information Technology
 
Network security
Dhaval Kaneria
 
Cryptographic tools
CAS
 
Ch 12: Cryptography
Sam Bowne
 
Enhancing lan using cryptography and other modules
Murali Krishna
 
Basic concept of pki
Prabhat Goel
 
Cryptography
amiable_indian
 
Network security and cryptography
RajKumar Rampelli
 

What's hot (10)

PPTX
Tunneling
Ilan Mindel
 
PPTX
Cryptography on cloud
krprashant94
 
PPTX
Cryptography and Encryptions,Network Security,Caesar Cipher
Gopal Sakarkar
 
PDF
Ss
yuyatamaru
 
PPTX
Creds extraction
Ilan Mindel
 
PPTX
Pgp pretty good privacy
Pawan Arya
 
ODP
Encryption Techniques
Del Elson
 
PPTX
Cryptography
Neeraj Mali
 
PPTX
Cryptography
Muhammad Shoaib Saleem
 
PPT
key distribution in network security
babak danyal
 
Tunneling
Ilan Mindel
 
Cryptography on cloud
krprashant94
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Gopal Sakarkar
 
Creds extraction
Ilan Mindel
 
Pgp pretty good privacy
Pawan Arya
 
Encryption Techniques
Del Elson
 
Cryptography
Neeraj Mali
 
key distribution in network security
babak danyal
 

Similar to Ethical hacking (20)

PPT
DDOS (1).ppt
HaipengCai1
 
PDF
modul2-footprintingscanningenumeration.pdf
tehkotak4
 
PPT
Modul 2 - Footprinting Scanning Enumeration.ppt
cemporku
 
DOCX
CEH v9 cheat sheet notes Certified Ethical Hacker
David Sweigert
 
PDF
INE_Assessment_Methodologies_Footprinting_and_Scanning_Course_File.pdf
anshulnautiyal2006
 
PPTX
Cyber_Threat_Intelligent_Cyber_Operation_Contest
nkrafacyberclub
 
PPTX
Security in network
DaNang University of Technology
 
PPTX
An introduction to denial of service attack
Mohammad Reza Mousavinasr
 
PDF
An introduction into ip networking
gthomsontd
 
PPT
Hacking Cisco
guestd05b31
 
PDF
Security Issues in Next Generation IP and Migration Networks
IOSR Journals
 
PDF
D017131318
IOSR Journals
 
PPT
Module 5 Sniffers
leminhvuong
 
PPT
Ethical Hacking
shahhardik27
 
PPT
Ethical hacking
shahhardik27
 
PDF
Network and DNS Vulnerabilities
n|u - The Open Security Community
 
DOC
Controlling ip spoofing through inter domain packet filters(synopsis)
Mumbai Academisc
 
PDF
Malicious Topologies of IPv4
Bob Rudis
 
DDOS (1).ppt
HaipengCai1
 
modul2-footprintingscanningenumeration.pdf
tehkotak4
 
Modul 2 - Footprinting Scanning Enumeration.ppt
cemporku
 
CEH v9 cheat sheet notes Certified Ethical Hacker
David Sweigert
 
INE_Assessment_Methodologies_Footprinting_and_Scanning_Course_File.pdf
anshulnautiyal2006
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
nkrafacyberclub
 
Security in network
DaNang University of Technology
 
An introduction to denial of service attack
Mohammad Reza Mousavinasr
 
An introduction into ip networking
gthomsontd
 
Hacking Cisco
guestd05b31
 
Security Issues in Next Generation IP and Migration Networks
IOSR Journals
 
D017131318
IOSR Journals
 
Module 5 Sniffers
leminhvuong
 
Ethical Hacking
shahhardik27
 
Ethical hacking
shahhardik27
 
Network and DNS Vulnerabilities
n|u - The Open Security Community
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Mumbai Academisc
 
Malicious Topologies of IPv4
Bob Rudis
 

Recently uploaded (20)

PPT
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PPTX
quantum computing transition from classical mechanics.pptx
gvlbcy
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
Zero Carbon Building Performance standard
BassemOsman1
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
quantum computing transition from classical mechanics.pptx
gvlbcy
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 

Ethical hacking