Hacking: Types, Hackers, and Ethics

 
Hacking
 
.
 
02.10.2024
 
Mohammad Homayoon Fayez, Associate professor, Zealand Akademy of techologies and business
 
Hacking
 
Hacking is a broad area, which covers a wide range of topics.
The term hacking is originated at MIT in 1960
Hacking is the act of finding vulnerabelities in a computer system or network (software and
communication protocols)
Hacking could be used to gain unautherized access to a computer or network
Harm the system
Steal information
Hacking could be used ligally – Ethical hacking
Find weaknesses in a computer system or network
Testing computer system or network
 
 
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
 
2
 
Types of Hacking
 
W
e
b
s
i
t
e
 
H
a
c
k
i
n
g
 
 
u
n
a
u
t
h
o
r
i
z
e
d
 
a
c
c
e
s
s
 
a
n
d
 
c
o
n
t
r
o
l
 
o
f
 
a
 
w
e
b
 
s
e
r
v
e
r
 
a
n
d
 
i
t
s
 
a
s
s
o
c
i
a
t
e
d
 
s
o
f
t
w
a
r
e
s
u
c
h
 
a
s
 
d
a
t
a
b
a
s
e
s
.
N
e
t
w
o
r
k
 
H
a
c
k
i
n
g
 
 
g
a
t
h
e
r
i
n
g
 
i
n
f
o
r
m
a
t
i
o
n
 
a
b
o
u
t
 
a
 
n
e
t
w
o
r
k
 
b
y
 
u
s
i
n
g
 
t
o
o
l
s
 
l
i
k
e
 
T
e
l
n
e
t
,
 
N
S
 
l
o
o
k
u
p
,
P
i
n
g
,
 
T
r
a
c
e
r
t
,
 
N
e
t
s
t
a
t
,
 
e
t
c
.
 
w
i
t
h
 
t
h
e
 
i
n
t
e
n
t
 
t
o
 
h
a
r
m
 
t
h
e
 
n
e
t
w
o
r
k
 
s
y
s
t
e
m
 
a
n
d
 
h
a
m
p
e
r
 
i
t
s
 
o
p
e
r
a
t
i
o
n
.
C
o
m
p
u
t
e
r
 
H
a
c
k
i
n
g
 
 
T
h
e
 
p
r
o
c
e
s
s
 
g
e
t
t
i
n
g
 
u
n
a
u
t
h
o
r
i
z
e
d
 
a
c
c
e
s
s
 
t
o
 
a
 
c
o
m
p
u
t
e
r
 
s
y
s
t
e
m
.
E
m
a
i
l
 
H
a
c
k
i
n
g
 
 
g
e
t
t
i
n
g
 
u
n
a
u
t
h
o
r
i
z
e
d
 
a
c
c
e
s
s
 
o
n
 
a
n
 
E
m
a
i
l
 
a
c
c
o
u
n
t
E
t
h
i
c
a
l
 
H
a
c
k
i
n
g
 
F
i
n
d
i
n
g
 
w
e
a
k
n
e
s
s
e
s
 
i
n
 
a
 
c
o
m
p
u
t
e
r
 
o
r
 
n
e
t
w
o
r
k
 
s
y
s
t
e
m
 
f
o
r
 
g
e
t
t
i
n
g
 
t
h
e
m
 
f
i
x
e
d
.
P
a
s
s
w
o
r
d
 
H
a
c
k
i
n
g
 
 
T
h
e
 
p
r
o
c
e
s
s
 
o
f
 
r
e
c
o
v
e
r
i
n
g
 
p
a
s
s
w
o
r
d
s
 
f
r
o
m
 
h
a
s
h
e
d
 
d
a
t
a
 
t
h
a
t
 
h
a
s
 
b
e
e
n
 
s
t
o
r
e
d
i
n
 
a
 
d
a
t
a
b
a
s
e
 
o
r
 
t
r
a
n
s
m
i
t
t
e
d
 
b
y
 
a
 
c
o
m
p
u
t
e
r
 
s
y
s
t
e
m
.
 
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
 
3
 
Hacker
 
A person who does the act of hacking
Seek knowledge
Understand how the computer system works
Harms the system
Steals sensitive information
 
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
 
4
 
Types of Hackers
 
W
h
i
t
e
 
H
a
t
 
H
a
c
k
e
r
s
 
 
a
k
a
 
E
t
h
i
c
a
l
 
h
a
c
k
e
r
s
Do penetration testing
Do not harm the system.
Try to find out about weaknesses
Black Hat Hackers – aka Crackers
Hack to gain unauthorized access
Harms a systems operation
Steal sensitive information
Violate privacy
Block network communication
Gray Hat Hackers
A blend of white and Black Hat Hackers
Have no malicious intent
Exploit security weakness without permission or owners knowledge
The intent is to get appreciation or a little bounty by informing the owner about the weakness
 
 
 
 
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
 
5
 
Types of Hackers
 
Red Hat Hackers
Like grey hat hackers but target the goverment agencies, sencitive information hubs
Blue Hat Hackers
Bug tests the system before its launch
Elite Hackers
Most skilled hackers
Newly discovered exploit circulate amoung these hackers
Script kedies
Non-expert
Uses tools made by others
With little understanding of underlying concepts
Neophyte – n00b, newbie, Green Hat Hacker
New to hacking, has almost no knowledge of underlying concepts and technologies
Hacktivist
A hacker who uses technology to announce a social, religious, ideological or political message
Most of them involved in Denial Of Service and defame of websites
 
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
 
6
 
Ethical Hacking - Terminologies
 
A
d
w
a
r
e
 
A
t
t
a
c
k
B
a
c
k
 
d
o
o
r
B
o
t
 
B
o
t
n
e
t
B
r
u
t
e
 
f
o
r
c
e
 
a
t
t
a
c
k
B
u
f
f
e
r
 
O
v
e
r
f
l
o
w
C
l
o
n
e
 
p
h
i
s
h
i
n
g
C
r
a
c
k
e
r
C
r
o
s
s
-
s
i
t
e
 
S
c
r
i
p
t
i
n
g
D
e
n
i
a
l
 
o
f
 
s
e
r
v
i
c
e
 
a
t
t
a
c
k
 
(
D
o
S
)
D
D
o
S
E
x
p
l
o
i
t
 
K
i
t
E
x
p
l
o
i
t
F
i
r
e
w
a
l
l
K
e
y
L
o
g
i
c
 
b
o
m
b
M
a
l
w
a
r
e
 
 
M
a
s
t
e
r
 
P
r
o
g
r
a
m
P
h
i
s
h
i
n
g
P
h
r
e
a
k
e
r
R
o
o
t
k
i
t
s
t
r
o
k
e
 
l
o
g
g
i
n
g
S
h
r
i
n
k
 
W
r
a
p
 
c
o
d
e
S
o
c
i
a
l
 
e
n
g
i
n
e
e
r
i
n
g
S
p
a
m
S
p
o
o
f
i
n
g
S
p
y
w
a
r
e
S
Q
L
 
I
n
j
e
c
t
i
o
n
T
h
r
e
a
t
T
r
o
j
a
n
V
i
r
u
s
V
u
l
n
e
r
a
b
i
l
i
t
y
W
o
r
m
s
Z
o
m
b
i
e
 
D
r
o
n
e
 
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
 
7
 
Ethical Hacking - Tools
 
NMAP
Metasploit
Burp Suit
Angry IP Scanner
Cain & Abel
Ettercap
EtherPeek
SuperScan
QualysGuard
WebInspect
LC4
LANguard Network Security Scanner
Network Stumbler
ToneLoc
 
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
 
8
 
Ethical Hacking - Skills
 
As an ethical hacker, you will need to understand various hacking techniques such as −
Password guessing and cracking
Session hijacking
Session spoofing
Network traffic sniffing
Denial of Service attacks
Exploiting buffer overflow vulnerabilities
SQL injection
 
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
 
9
 
Ethical Hacking - Process
 
The following Ethical hacking processes are not a standard. You may use a very different process as long as you are able to get
the desired results.
 
R
e
c
o
n
n
a
i
s
s
a
n
c
e
Reconnaissance is the phase where the attacker gathers information about a target using active or passive means. The
tools that are widely used in this process are NMAP, Hping, Maltego, and Google Dorks.
S
c
a
n
n
i
n
g
In this process, the attacker begins to actively probe a target machine or network for vulnerabilities that can be exploited.
The tools used in this process are Nessus, Nexpose, and NMAP.
G
a
i
n
i
n
g
 
A
c
c
e
s
s
In this process, the vulnerability is located and you attempt to exploit it in order to enter into the system. The primary tool
that is used in this process is Metasploit.
 
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
 
10
 
Ethical Hacking - Process
 
 
M
a
i
n
t
a
i
n
i
n
g
 
A
c
c
e
s
s
I
t
 
i
s
 
t
h
e
 
p
r
o
c
e
s
s
 
w
h
e
r
e
 
t
h
e
 
h
a
c
k
e
r
 
h
a
s
 
a
l
r
e
a
d
y
 
g
a
i
n
e
d
 
a
c
c
e
s
s
 
i
n
t
o
 
a
 
s
y
s
t
e
m
.
 
A
f
t
e
r
 
g
a
i
n
i
n
g
 
a
c
c
e
s
s
,
 
t
h
e
 
h
a
c
k
e
r
 
i
n
s
t
a
l
l
s
 
s
o
m
e
b
a
c
k
d
o
o
r
s
 
i
n
 
o
r
d
e
r
 
t
o
 
e
n
t
e
r
 
i
n
t
o
 
t
h
e
 
s
y
s
t
e
m
 
w
h
e
n
 
h
e
 
n
e
e
d
s
 
a
c
c
e
s
s
 
i
n
 
t
h
i
s
 
o
w
n
e
d
 
s
y
s
t
e
m
 
i
n
 
f
u
t
u
r
e
.
 
M
e
t
a
s
p
l
o
i
t
 
i
s
 
t
h
e
p
r
e
f
e
r
r
e
d
 
t
o
o
l
 
i
n
 
t
h
i
s
 
p
r
o
c
e
s
s
.
C
l
e
a
r
i
n
g
 
T
r
a
c
k
s
This process is actually an unethical activity. It has to do with the deletion of logs of all the activities that take place during
the hacking process.
R
e
p
o
r
t
i
n
g
Reporting is the last step of finishing the ethical hacking process. Here the Ethical Hacker compiles a report with his
findings and the job that was done such as the tools used, the success rate, vulnerabilities found, and the exploit
processes.
 
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
02.10.2024
 
11
Slide Note
Embed
Share

Hacking is a complex area covering various topics and activities, originating from MIT in 1960. It involves finding vulnerabilities in computer systems and networks for unauthorized access, potentially harming systems or stealing information. Ethical hacking serves the purpose of identifying and fixing weaknesses. Different types of hacking include website, network, computer, email, and password hacking. Hackers can be categorized as White Hat, Black Hat, Gray Hat, Red Hat, Blue Hat, Elite, Script Kiddies, Neophyte, and Hacktivist. Each category has its own characteristics and intentions within the realm of hacking.

  • Hacking
  • Types
  • Hackers
  • Ethics
  • Security

Uploaded on Oct 02, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Hacking Mohammad Homayoon Fayez, Associate professor, Zealand Akademy of techologies and business 02.10.2024 .

  2. Hacking Hacking is a broad area, which covers a wide range of topics. The term hacking is originated at MIT in 1960 Hacking is the act of finding vulnerabelities in a computer system or network (software and communication protocols) Hacking could be used to gain unautherized access to a computer or network Harm the system Steal information Hacking could be used ligally Ethical hacking Find weaknesses in a computer system or network Testing computer system or network 2 0 2 . 1 0 . 2

  3. Types of Hacking Website Hacking unauthorized access and control of a web server and its associated software such as databases. Network Hacking gathering information about a network by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation. Computer Hacking The process getting unauthorized access to a computer system. Email Hacking getting unauthorized access on an Email account Ethical Hacking Finding weaknesses in a computer or network system for getting them fixed. Password Hacking The process of recovering passwords from hashed data that has been stored in a database or transmitted by a computer system. 3 0 2 . 1 0 . 2

  4. Hacker A person who does the act of hacking Seek knowledge Understand how the computer system works Harms the system Steals sensitive information 4 0 2 . 1 0 . 2

  5. Types of Hackers White Hat Hackers aka Ethical hackers Do penetration testing Do not harm the system. Try to find out about weaknesses Black Hat Hackers aka Crackers Hack to gain unauthorized access Harms a systems operation Steal sensitive information Violate privacy Block network communication Gray Hat Hackers A blend of white and Black Hat Hackers Have no malicious intent Exploit security weakness without permission or owners knowledge The intent is to get appreciation or a little bounty by informing the owner about the weakness 5 0 2 . 1 0 . 2

  6. Types of Hackers Red Hat Hackers Like grey hat hackers but target the goverment agencies, sencitive information hubs Blue Hat Hackers Bug tests the system before its launch Elite Hackers Most skilled hackers Newly discovered exploit circulate amoung these hackers Script kedies Non-expert Uses tools made by others With little understanding of underlying concepts Neophyte n00b, newbie, Green Hat Hacker New to hacking, has almost no knowledge of underlying concepts and technologies Hacktivist A hacker who uses technology to announce a social, religious, ideological or political message Most of them involved in Denial Of Service and defame of websites 6 0 2 . 1 0 . 2

  7. Ethical Hacking - Terminologies Master Program Phishing Phreaker Rootkit stroke logging Shrink Wrap code Social engineering Spam Spoofing Spyware SQL Injection Threat Trojan Virus Vulnerability Worms Zombie Drone Adware Attack Back door Bot Botnet Brute force attack Buffer Overflow Clone phishing Cracker Cross-site Scripting Denial of service attack (DoS) DDoS Exploit Kit Exploit Firewall Key Logic bomb Malware 7 0 2 . 1 0 . 2

  8. Ethical Hacking - Tools NMAP Metasploit Burp Suit Angry IP Scanner Cain & Abel Ettercap EtherPeek SuperScan QualysGuard WebInspect LC4 LANguard Network Security Scanner Network Stumbler ToneLoc 8 0 2 . 1 0 . 2

  9. Ethical Hacking - Skills As an ethical hacker, you will need to understand various hacking techniques such as Password guessing and cracking Session hijacking Session spoofing Network traffic sniffing Denial of Service attacks Exploiting buffer overflow vulnerabilities SQL injection 9 0 2 . 1 0 . 2

  10. Ethical Hacking - Process The following Ethical hacking processes are not a standard. You may use a very different process as long as you are able to get the desired results. Reconnaissance Reconnaissance is the phase where the attacker gathers information about a target using active or passive means. The tools that are widely used in this process are NMAP, Hping, Maltego, and Google Dorks. Scanning In this process, the attacker begins to actively probe a target machine or network for vulnerabilities that can be exploited. The tools used in this process are Nessus, Nexpose, and NMAP. Gaining Access In this process, the vulnerability is located and you attempt to exploit it in order to enter into the system. The primary tool that is used in this process is Metasploit. 10 0 2 . 1 0 . 2

  11. Ethical Hacking - Process Maintaining Access It is the process where the hacker has already gained access into a system. After gaining access, the hacker installs some backdoors in order to enter into the system when he needs access in this owned system in future. Metasploit is the preferred tool in this process. Clearing Tracks This process is actually an unethical activity. It has to do with the deletion of logs of all the activities that take place during the hacking process. Reporting Reporting is the last step of finishing the ethical hacking process. Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used, the success rate, vulnerabilities found, and the exploit processes. 11 0 2 . 1 0 . 2

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#