Transcript for:
Introduction to Ethical Hacking

[Music] hello everyone today our topic is Introduction to ethical hacking before moving to this ethical hacking let us try to understand what exactly hacking refers hacking is nothing but just stealing the information where the digital word is world is running with the completely data so stealing this data is a completely a crime or an illegal activity so from the recent statistics it is showing like for every 30 seconds there is a hack there are lot of security breaches are happening in our day-to-day life so because of the security breaches there is a lot of demand for this ethical hacking recently I found a court like if you want the job for next few years work in technology if you want job for a life work in cyber security why because the world is digital now everything became online if there is no security for that that's all the online thing is not at all possible here so the security place major role when you wanted to when you wanted to run a successful digital world so coming to this ethical hackers what ethical hackers are going to do in the industry hacking is completely an illegal activity without taking any permission you are stealing some information by learning this kind of activities what in you are doing in the industry what exactly the ethical hacker will do so what exactly the ethical hacker will do is when the project moves into prediction after the development any mobile application or web application or servers whatever it may be before moving into production the project comes to this ethical hacker so what this ethical hackers will be doing is they will be acting like a hacker not in a single hacker not in a single way they will be acting like a multiple attackers or hackers and they will try to hack the application so once the application has been hacked we are not going to utilize for any of our personal purpose so once the application is hacked we have to analyze what is the root cause behind this what is the lole behind this why I can do this attack we have to analyze this root cause after analyzing the root cause so why I'm able to do this attack if I am able to do this attack obviously the attacker also can do this attack so I have to close this door I have to close this loophole once after the doing the attack we have to make a clear report that these are the weakness present in your application here for the weakness will be seeing the terminology or will be using the terminology called as vulnerability so these are the vulnerabilities present in your application because of this vulnerability you can do this attack the because of this attack there are lots of risk behind this and the security fix for that what is the security fix what is the mitigation for that vulnerability we have to give it very clearly so as we are ethical hackers we have to learn how to hack the things as well how to mitigate it we are just hacking the applications or servers just to analyze the root CA just to analyze the root CA and give the security fix so that is why the industry is hiring this ethical hackers ethical hacker have to look in the attacker perception and try to hack the appli appliation in multiple ways not in a single way try to hack the application in multiple ways if it is hacked we are going to give the security fix for that so that's what ethical hackers will be doing once the application is more secured all the security fix whatever the ethical hackers are suggesting if they implemented all the security fix then happily they can move that application into production so the way you are finding the information and finding the vulnerabilities and trying to do the attack giving the security fix for that all this process whatever you are doing that process will be consider as a penetration testing or pen testing so ethical hackers are also called as a pen testers or white hat hackers or also I will say as a professional hackers so that's what ethical hackers will do in the industry we are not going to do any attack for our personal purpose so so coming to this why ethical hacking we need to protect from all the social engineering activities organizational attacks automated attacks denial of service attacks virus troen horses and ws and accidental breaches in security to protect from all these attacks the ethical hacker need to do security assessment before moving into production so the ethical hacker will be testing for all this kind of attacks and will be giving the security fix once the security fix implemented you can happily move the application into production so that you can escape from all this kind of attacks so the no attack will be done on any application once the application is done with the security assessment so coming to this uh types of hackers we are having black hat white hat and gray hat hackers so what does this black hat hackers represents these people are very bad guys I can say they will be utilizing their skills only for the malicious activities or I can say for the personal purpose they are stealing the information just to earn money just to Blackmail someone and to earn some lot of money so these people will be doing utilizing their skills only to do some illegal activities that is completely illegal activity when you are doing this hacking kind of things without taking any permissions then you will be sitting in a chair it's a completely illegal activity coming to white hat hackers the company hires only the white hat hackers and the client itself will give you the project and will request you please do attack on my application and try to find out the vulnerabilities and give the security fix for that if the client itself asking you to do the attack that then only you are doing attack here and after doing attack also we are not utilizing any information for our Prof personal purpose so we are utilizing our skills just to protect from the black hat hackers and combination of this black hat hackers and white hat hackers are called as a gray hat hackers so they will be working in the industry for the flow of money or to earn the money or to get a salary and they will be doing this illegal activities as well both the ways they are earning money these people are considered as a gray hat hackers and let's see few essential terminologies so vulnerability vulnerability in the sense weakness present in the system and coming to exploit a method to do the exploitation for example there is a gun and there is a bullet so if the bullet is going and injecting on any person automatically the person get destroyed here our bullet is nothing but payload a malicious code if this malicious code is going and inject in or executing in any server or any application automatically the server comes to our control