SlideShare a Scribd company logo
Ethical Hacking
Afaq Mansoor Khan
Content
● Introduction
● Ethical Hackers
● What do Ethical Hackers do?
● Ethical Hacking Process
● Why do We need Ethical Hacking
● Required Skills
● Advantages
● Disadvantages
● Conclusion
Introduction
● Ethical hacking also known as penetration testing or white-hat hacking, involves
the same tools, tricks, and techniques that hackers use, but with one major
difference that Ethical hacking is legal.
● It focuses on authorized attempts to gain unauthorized access to systems and
find vulnerabilities. Ethical hacking is done with the legal permission of a
company to test and increase the security of its systems and networks.
What do Ethical Hackers do?
● Independent computer security Professionals breaking into the computer
systems.
● Neither damage the target systems nor steal information.
● Evaluate target systems security and report back to owners about the bugs
found
● They use their skills to improve the security of networks, systems, and
applications, utilizing different methods to exploit computer systems and
discover vulnerabilities.
Ethical Hacking Process
● Foot Printing
○ NS lookup
○ IP lookup
● Scanning
○ Port Scanning
○ Network Scanning
● Gaining Access
○ Password Attacks
○ Social Engineering
● Maintaining Access
○ Os BackDoors
○ Trojans
Why do we need Ethical Hacking?
Why are Ethical Hackers in Demand?
● The world is changing — technology is growing, organizations are expanding,
and malicious attacks are increasing.
● However, there is still a lack of professional ethical hackers who can think
critically and have problem-solving skills. Governments and organizations need
experts who are familiar with ethical hacking methods to secure networks and
data.
● An ethical hacker should have the ability to resolve issues before it becomes a
danger, and provide the best security practices.
Required Skills
● Good programming skills (HTML, JSP, Java, Python)
● Be able to resolve problems related to asset security.
● Deep understanding of operating systems, firewalls, and file systems.
● Knowledge about databases and their operations.
● You should understand what is ethically right and what is ethically wrong. Basic
knowledge of networking is also a must.
Advantages
● To catch a thief you have to think like a thief.
● Helps in closing the open holes in the system network.
● Provides security to banking and financial establishments.
● Prevents website defacements.
● An evolving technique.
Disadvantages
● All depends upon the trustworthiness of the ethical hacker
● Hiring professionals is expensive.
Carrier Opportunities
● Security Analyst
● IT Security Administrator
● Cyber Defense Analyst
● System Security Administrator
● Information Security Manager
● Cybersecurity Consultant
● Security Compliance Analyst
Conclusion
● In the preceding sections we saw the methodology of hacking, why should we
aware of hacking and some tools which a hacker may use.
● Now we can see what can we do against hacking or to protect ourselves from
hacking.
● The first thing we should do is to keep ourselves updated about those
software’s we and using for official and reliable sources.
● Educate the employees and the users against black hat hacking.
References
● https://www.tutorialspoint.com/
● https://www.wikipedia.org/
Thank You!

More Related Content

PPTX
EthicalHacking_AakashTakale
Aakash Takale
 
PPT
Ethical hacking
shinigami-99
 
PPTX
Ethical Hacking Tools & Techniques
begmohsin
 
PPTX
Ethical hacking
Garla Prajwal
 
PPTX
Atm sequrity
niteshsayal
 
PDF
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
Edureka!
 
ODP
Unlock Security Insight from Machine Data
Narudom Roongsiriwong, CISSP
 
PPT
Introduction To Ethical Hacking
Akshay Kale
 
EthicalHacking_AakashTakale
Aakash Takale
 
Ethical hacking
shinigami-99
 
Ethical Hacking Tools & Techniques
begmohsin
 
Ethical hacking
Garla Prajwal
 
Atm sequrity
niteshsayal
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
Edureka!
 
Unlock Security Insight from Machine Data
Narudom Roongsiriwong, CISSP
 
Introduction To Ethical Hacking
Akshay Kale
 

What's hot (20)

PPT
Hacking and its terms
kunalverma12345
 
PPT
Risky project Enterprise
Intaver Insititute
 
PPTX
ethical Hacking [007]
SiddheshPowar
 
PPTX
Ethical hacking
SVishnupriya5
 
PPTX
Ethical Hacking
Nasir Arafat
 
PPTX
Ethical hacking11601031 (1)
Mohammad Affan
 
PPT
Ethical hacking
Being Uniq Sonu
 
PPT
Risk Based Software Planning
Muhammad Alhalaby
 
PDF
Security and Penetration Testing Overview
QA InfoTech
 
PDF
Enterprise 360 degree risk management
Infosys
 
PDF
Automated tools for security, the challenge 2.0?
Romain Gaucher
 
PPTX
Hacking
Shukla Aakash
 
PPTX
Ethical Hacking
Kunal Gawade, CFE
 
PPT
3.Secure Design Principles And Process
phanleson
 
PPT
Ethical Hacking
Mukul Agarwal
 
PPTX
Intruders and Intrusion detection in Cryptosystems
VelanSalis
 
PPTX
Secure Software Development
Asankhaya Sharma
 
PPTX
Security is sim
Tim Krabec
 
PDF
Data security in the age of GDPR – most common data security problems
Exove
 
PPTX
Ethical Hacking (basics)
DeepHaria4
 
Hacking and its terms
kunalverma12345
 
Risky project Enterprise
Intaver Insititute
 
ethical Hacking [007]
SiddheshPowar
 
Ethical hacking
SVishnupriya5
 
Ethical Hacking
Nasir Arafat
 
Ethical hacking11601031 (1)
Mohammad Affan
 
Ethical hacking
Being Uniq Sonu
 
Risk Based Software Planning
Muhammad Alhalaby
 
Security and Penetration Testing Overview
QA InfoTech
 
Enterprise 360 degree risk management
Infosys
 
Automated tools for security, the challenge 2.0?
Romain Gaucher
 
Hacking
Shukla Aakash
 
Ethical Hacking
Kunal Gawade, CFE
 
3.Secure Design Principles And Process
phanleson
 
Ethical Hacking
Mukul Agarwal
 
Intruders and Intrusion detection in Cryptosystems
VelanSalis
 
Secure Software Development
Asankhaya Sharma
 
Security is sim
Tim Krabec
 
Data security in the age of GDPR – most common data security problems
Exove
 
Ethical Hacking (basics)
DeepHaria4
 

Similar to Ethical Hacking - An Overview (20)

PPTX
Ethical Hacking and Cyber Security for Beginners
reachadhinvs
 
PPTX
this ppt is based on ethica l hacking _
SantoshChintawar
 
PDF
Ethical Hacker Training.pdf
SpiritsoftsTraining
 
PPTX
Introduction-to-Ethical-Hacking and Terminologies.pptx
OlajideAmusat
 
PPTX
Ethical hacking BY Thariq ibnu Ubaidhullah
pongada123
 
PDF
🔐 Ethical Hacking Lifecycle_ A Beginner’s Guide to Cybersecurity’s First Line...
Usman siddiqui
 
PPTX
Ethical Hacking.pptx
Manojverma564461
 
PPTX
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
PDF
Ethical hacking: Safeguarding your digital world.
Cetpa Infotech
 
PPTX
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
SantoshChintawar
 
PPTX
Ethical Hacking.pptx
ambemPrashanthi
 
PPTX
Ethical Hacking Course in Delhi
SurbhiJyoti1
 
PPTX
Ethical hacking
VipinYadav257
 
PPTX
What is penetration testing and career path
Vikram Khanna
 
PPTX
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
atulkumaratulkumar18
 
PPTX
Ethical Hacking.pptx Hacker Presentation
sahilhussain2006bth
 
PPTX
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
 
PPTX
Ethical hacking.pptx
NilkanthPatel38
 
PPTX
Ethical Hacking Training in Noida
RaviRajput330772
 
PPTX
Jaishreeethicalhackingppt-171011183223.pptx
jaiswalanita056588
 
Ethical Hacking and Cyber Security for Beginners
reachadhinvs
 
this ppt is based on ethica l hacking _
SantoshChintawar
 
Ethical Hacker Training.pdf
SpiritsoftsTraining
 
Introduction-to-Ethical-Hacking and Terminologies.pptx
OlajideAmusat
 
Ethical hacking BY Thariq ibnu Ubaidhullah
pongada123
 
🔐 Ethical Hacking Lifecycle_ A Beginner’s Guide to Cybersecurity’s First Line...
Usman siddiqui
 
Ethical Hacking.pptx
Manojverma564461
 
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Ethical hacking: Safeguarding your digital world.
Cetpa Infotech
 
VIVEK_JADHAV[1].pptx this ppt is based on ethical hacking
SantoshChintawar
 
Ethical Hacking.pptx
ambemPrashanthi
 
Ethical Hacking Course in Delhi
SurbhiJyoti1
 
Ethical hacking
VipinYadav257
 
What is penetration testing and career path
Vikram Khanna
 
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
atulkumaratulkumar18
 
Ethical Hacking.pptx Hacker Presentation
sahilhussain2006bth
 
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
 
Ethical hacking.pptx
NilkanthPatel38
 
Ethical Hacking Training in Noida
RaviRajput330772
 
Jaishreeethicalhackingppt-171011183223.pptx
jaiswalanita056588
 

More from Afaq Mansoor Khan (20)

PPTX
Feature Selection - Natural Language Processing
Afaq Mansoor Khan
 
PPTX
WiFi vs LiFi - A Comparison
Afaq Mansoor Khan
 
PPTX
Role of Electronic Media in Pakistan
Afaq Mansoor Khan
 
PPTX
Agile Testing - Approach and Strategies
Afaq Mansoor Khan
 
PPTX
Software Architecture Design Decisions
Afaq Mansoor Khan
 
PPTX
How to Design an Algorithm
Afaq Mansoor Khan
 
PPTX
Software Quality Qssurance, Scrum and Linkedin
Afaq Mansoor Khan
 
PPTX
Quick sort
Afaq Mansoor Khan
 
PPTX
.Physics presentation - Asteroids
Afaq Mansoor Khan
 
PPTX
Graph Data Structure
Afaq Mansoor Khan
 
PPTX
AVL Tree Data Structure
Afaq Mansoor Khan
 
PPTX
Binary tree
Afaq Mansoor Khan
 
PPTX
Queue Data Structure
Afaq Mansoor Khan
 
PPTX
Prefix, Infix and Post-fix Notations
Afaq Mansoor Khan
 
PPTX
Stack Data Structure
Afaq Mansoor Khan
 
PPTX
Doubly & Circular Linked Lists
Afaq Mansoor Khan
 
PPTX
Linked List - Insertion & Deletion
Afaq Mansoor Khan
 
PPTX
Dynamic Memory & Linked Lists
Afaq Mansoor Khan
 
PPTX
Sorting Algorithms
Afaq Mansoor Khan
 
PPTX
Recursion and Sorting Algorithms
Afaq Mansoor Khan
 
Feature Selection - Natural Language Processing
Afaq Mansoor Khan
 
WiFi vs LiFi - A Comparison
Afaq Mansoor Khan
 
Role of Electronic Media in Pakistan
Afaq Mansoor Khan
 
Agile Testing - Approach and Strategies
Afaq Mansoor Khan
 
Software Architecture Design Decisions
Afaq Mansoor Khan
 
How to Design an Algorithm
Afaq Mansoor Khan
 
Software Quality Qssurance, Scrum and Linkedin
Afaq Mansoor Khan
 
Quick sort
Afaq Mansoor Khan
 
.Physics presentation - Asteroids
Afaq Mansoor Khan
 
Graph Data Structure
Afaq Mansoor Khan
 
AVL Tree Data Structure
Afaq Mansoor Khan
 
Binary tree
Afaq Mansoor Khan
 
Queue Data Structure
Afaq Mansoor Khan
 
Prefix, Infix and Post-fix Notations
Afaq Mansoor Khan
 
Stack Data Structure
Afaq Mansoor Khan
 
Doubly & Circular Linked Lists
Afaq Mansoor Khan
 
Linked List - Insertion & Deletion
Afaq Mansoor Khan
 
Dynamic Memory & Linked Lists
Afaq Mansoor Khan
 
Sorting Algorithms
Afaq Mansoor Khan
 
Recursion and Sorting Algorithms
Afaq Mansoor Khan
 

Recently uploaded (20)

PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PDF
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
PPTX
B2B_Ecommerce_Internship_Simranpreet.pptx
LipakshiJindal
 
PPTX
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
PPTX
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
PPTX
Crypto Recovery California Services.pptx
lionsgate network
 
PDF
Slides: PDF Eco Economic Epochs for World Game (s) pdf
Steven McGee
 
PPTX
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
PPTX
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
PDF
LOGENVIDAD DANNYFGRETRRTTRRRTRRRRRRRRR.pdf
juan456ytpro
 
PPTX
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
PDF
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
PPTX
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
PPTX
Different Generation Of Computers .pptx
divcoder9507
 
PDF
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
PDF
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
PPTX
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
PPTX
原版北不列颠哥伦比亚大学毕业证文凭UNBC成绩单2025年新版在线制作学位证书
e7nw4o4
 
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
B2B_Ecommerce_Internship_Simranpreet.pptx
LipakshiJindal
 
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
Crypto Recovery California Services.pptx
lionsgate network
 
Slides: PDF Eco Economic Epochs for World Game (s) pdf
Steven McGee
 
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
LOGENVIDAD DANNYFGRETRRTTRRRTRRRRRRRRR.pdf
juan456ytpro
 
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
Different Generation Of Computers .pptx
divcoder9507
 
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
原版北不列颠哥伦比亚大学毕业证文凭UNBC成绩单2025年新版在线制作学位证书
e7nw4o4
 

Ethical Hacking - An Overview

  • 2. Content ● Introduction ● Ethical Hackers ● What do Ethical Hackers do? ● Ethical Hacking Process ● Why do We need Ethical Hacking ● Required Skills ● Advantages ● Disadvantages ● Conclusion
  • 3. Introduction ● Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. ● It focuses on authorized attempts to gain unauthorized access to systems and find vulnerabilities. Ethical hacking is done with the legal permission of a company to test and increase the security of its systems and networks.
  • 4. What do Ethical Hackers do? ● Independent computer security Professionals breaking into the computer systems. ● Neither damage the target systems nor steal information. ● Evaluate target systems security and report back to owners about the bugs found ● They use their skills to improve the security of networks, systems, and applications, utilizing different methods to exploit computer systems and discover vulnerabilities.
  • 5. Ethical Hacking Process ● Foot Printing ○ NS lookup ○ IP lookup ● Scanning ○ Port Scanning ○ Network Scanning ● Gaining Access ○ Password Attacks ○ Social Engineering ● Maintaining Access ○ Os BackDoors ○ Trojans
  • 6. Why do we need Ethical Hacking?
  • 7. Why are Ethical Hackers in Demand? ● The world is changing — technology is growing, organizations are expanding, and malicious attacks are increasing. ● However, there is still a lack of professional ethical hackers who can think critically and have problem-solving skills. Governments and organizations need experts who are familiar with ethical hacking methods to secure networks and data. ● An ethical hacker should have the ability to resolve issues before it becomes a danger, and provide the best security practices.
  • 8. Required Skills ● Good programming skills (HTML, JSP, Java, Python) ● Be able to resolve problems related to asset security. ● Deep understanding of operating systems, firewalls, and file systems. ● Knowledge about databases and their operations. ● You should understand what is ethically right and what is ethically wrong. Basic knowledge of networking is also a must.
  • 9. Advantages ● To catch a thief you have to think like a thief. ● Helps in closing the open holes in the system network. ● Provides security to banking and financial establishments. ● Prevents website defacements. ● An evolving technique.
  • 10. Disadvantages ● All depends upon the trustworthiness of the ethical hacker ● Hiring professionals is expensive.
  • 11. Carrier Opportunities ● Security Analyst ● IT Security Administrator ● Cyber Defense Analyst ● System Security Administrator ● Information Security Manager ● Cybersecurity Consultant ● Security Compliance Analyst
  • 12. Conclusion ● In the preceding sections we saw the methodology of hacking, why should we aware of hacking and some tools which a hacker may use. ● Now we can see what can we do against hacking or to protect ourselves from hacking. ● The first thing we should do is to keep ourselves updated about those software’s we and using for official and reliable sources. ● Educate the employees and the users against black hat hacking.