SlideShare a Scribd company logo
INTRODUCTION TO
HACKING &
SECURITY
BY : RAGHAV BISHT
What is Hacking ?
 Process to bypass the security mechanisms.
 Doing something awesome.
 Unauthorized use of computer and network.
 Hacking is the practice of modifying the
features of a system, in order to accomplish a
goal outside of the creator's original purpose.
 Hacking is the process of exploiting
vulnerabilities to gain unauthorized access to
systems or resources.
Who are hackers ?
 Hacker is a term used by some to mean "a
clever programmer" and by others, especially
those in popular media, to mean "someone
who tries to break into computer systems."
Types of Hackers
 White Hat
 IT professional
 Administrators
 Black Hat
 Crackers
 Grey Hat
Hackers Hierarchy
 Elite hackers
 Script kiddie
 Neophyte
 Hacktivist
 Green hat hackers
Understanding the need to
hack your own system
 Basis for Ethical Hacking.
 To catch a thief, think like a thief
Overall goals an an ethical
hacker
 Hack your systems in a nondestructive
fashion.
 Enumerate vulnerabilities and , if necessary,
prove to management that vulnerabilities exit
and can be exploited.
 Apply result to remove the vulnerabilities and
better secure your systems.
What is computer Security ?
 Security is process not product.
 The objective of computer security includes
protection of information and property from
theft, corruption, or natural disaster, while
allowing the information and property to
remain accessible, Use to minimize the
security threads (vulnerability + exploit)
How to become best hacker ?
 Books Says :
 Windows Knowledge + Linux + Unix
 Networking Knowledge + Creative thinking + expert in pen test
 IT Professional & SecurityAnalyst Says :
 Programming is key to success
 Raghav Bisht Says :
 “ If you can understand the system,You can hack it.”
Hackers Keywords
 RAT : Remote administration tool
 DDOS : Distributed denial of service
 FUD : Fully undetectable
 SQL : Structured query language
 XSS : Cross site scripting
 Skid : Script kiddie
 Malware : Malicious software
 SSH : Secure shell
 VPN :Virtual private network
 VPS :Virtual private service
Hacking Terms
 If you are a newbie in hacking then you need to learn
some things.There are some terms that every
hacker should know about them.
 Algorithm
 ANSI Bomb
 Back Door
 Bot and Botnet
 Buffer Overflow
 Cracker
 DDoS
 Deface
 DOX
 Worm
 Zero Day Exploit
Cont…
 Encryption
 Exploit
 FUD
 Keylogger
 Malware
 Packet
 Phreaking
 Proxy
 RainbowTable
 Rootkit (ring3 ring0)
 Reverse Engineering
 Shell
 Spoof
 Trojan
International Hacking &
Security Certifications
 CEH ( Certified Ethical Hacker )
 CHFI ( Computer hacking forensic investigator )
 ECSA ( EC – Council Certified Security Analyst )
 CISA ( Certified Information System Auditor )
 CISSP ( Certified Info Sys Security Professional )

More Related Content

Introduction To Hacking

  • 2. What is Hacking ?  Process to bypass the security mechanisms.  Doing something awesome.  Unauthorized use of computer and network.  Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.  Hacking is the process of exploiting vulnerabilities to gain unauthorized access to systems or resources.
  • 3. Who are hackers ?  Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems."
  • 4. Types of Hackers  White Hat  IT professional  Administrators  Black Hat  Crackers  Grey Hat
  • 5. Hackers Hierarchy  Elite hackers  Script kiddie  Neophyte  Hacktivist  Green hat hackers
  • 6. Understanding the need to hack your own system  Basis for Ethical Hacking.  To catch a thief, think like a thief
  • 7. Overall goals an an ethical hacker  Hack your systems in a nondestructive fashion.  Enumerate vulnerabilities and , if necessary, prove to management that vulnerabilities exit and can be exploited.  Apply result to remove the vulnerabilities and better secure your systems.
  • 8. What is computer Security ?  Security is process not product.  The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible, Use to minimize the security threads (vulnerability + exploit)
  • 9. How to become best hacker ?  Books Says :  Windows Knowledge + Linux + Unix  Networking Knowledge + Creative thinking + expert in pen test  IT Professional & SecurityAnalyst Says :  Programming is key to success  Raghav Bisht Says :  “ If you can understand the system,You can hack it.”
  • 10. Hackers Keywords  RAT : Remote administration tool  DDOS : Distributed denial of service  FUD : Fully undetectable  SQL : Structured query language  XSS : Cross site scripting  Skid : Script kiddie  Malware : Malicious software  SSH : Secure shell  VPN :Virtual private network  VPS :Virtual private service
  • 11. Hacking Terms  If you are a newbie in hacking then you need to learn some things.There are some terms that every hacker should know about them.  Algorithm  ANSI Bomb  Back Door  Bot and Botnet  Buffer Overflow  Cracker  DDoS  Deface  DOX  Worm  Zero Day Exploit
  • 12. Cont…  Encryption  Exploit  FUD  Keylogger  Malware  Packet  Phreaking  Proxy  RainbowTable  Rootkit (ring3 ring0)  Reverse Engineering  Shell  Spoof  Trojan
  • 13. International Hacking & Security Certifications  CEH ( Certified Ethical Hacker )  CHFI ( Computer hacking forensic investigator )  ECSA ( EC – Council Certified Security Analyst )  CISA ( Certified Information System Auditor )  CISSP ( Certified Info Sys Security Professional )