Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Introduction To Ethical Hacking

Third Eye Ethical Hackers (R)
by

Rajan Kohli

on 7 January 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Introduction To Ethical Hacking

System Hacking

Email Attacks

Stealer Attacks

Website Hacking Attacks

Remote Adminstration Attacks

Session Hijacking Attacks Top Attacks WHITE HATS

BLACK HATS

GREY HATS TYPES OF HACKERS Hacker is anyone who can apply his aptitude and attitude to anything passionately. There is a shared culture which has formed the layers of digital matrix around us, and anyone who has contributed to it is a hacker. Generally, a hacker is defined as a software pirate, but that’s not the end of it. Who is Hacker ? Mr.Eric
Security Division at&t Grey Hat’s are Between Good & Bad
May disclose codes for Profit
Their Actions are Questionable & Variable in Nature GREY HATS REVERSE OF WHITE HATS “the_ut” also known as Stephen Wyatt
PROJECT MAYHEM BLACK HATS INTRODUCTION TO ETHICAL HACKING
& TYPES OF HACKERS Online Accounts of Indian Cricketer “Harbhajan Singh” Recovered .
Facebook Fan Page of Pakistani Singer Zaain Ul Abeedin Recovered .
Done Investigation for Netbanking Fraud of 6.6Million INR (66 Lacs) of a Ltd Company based in Jalandhar City.
Did Penetration Testing for Various MNC’s & Fortune 500 Companies.
Solved Various Cases on Mobile Phone Tapping & Fake Profile Deletion on Facebook. Recent Cases Solved Contribute Code to Society
Does not cause any damage
Find Vulnerabilities and disclose them. ( Working With MICROSOFT , found a flaw in DNS) Dan Kaminsky White Hats
Full transcript