Ethical Hacking and Cybersecurity
Pablo Molina Escriche
Introduction
During this presentation, we'll learn about the meaning and differences of hacking and cyber-attacking. Some of the most common tools that are used. Usual hacking techniques to be aware of, and useful methods to protect our accounts and privacy from them.
INDEX
What is hacking?
Tools
Common techniques
Prevention measures
What is Hacking?
- Exploiting vulnerabilities in an organization's networks and IT systems to gain unauthorized access or control over digital files. Hackers are not the same as "cyber attackers."
- Ethical hacking, on the other hand, is defined as the use of hacking skills and tools to legally and ethically evaluate the security of a computer system or network. The goal is to identify and fix vulnerabilities before they are exploited.
Tools
Wireshark:
Kali Linux:
03
01
Network protocol analysis.
A distribution specifically designed for penetration testing and security auditing.
Contextualiza tu tema con un subtítulo
Invicti:
04
Nmap:
02
Simulates hacker behavior, enabling automated vulnerability detection.
Network exploration.
Common hacking techniques
PHISHING
- Pretending to be a legitimate company or website through emails or pop-ups to deceive the victim and trick them into entering their information on a fake form, leaving them vulnerable to hackers.
Brute Force Attacks
Man-in-the-Middle (MitM)
Social Engineering
Based on trial and error, often used to crack weak passwords.
Methods such as conversations, eavesdropping, psychological manipulation, and others to directly extract information from an individual.
Also known as data spying, it involves intercepting and manipulating communications between two systems.
Keyloggers
Malware that records keystrokes and sends them to its distributor.
Prevention Measures
Secure and updated passwords.
Minimize digital footprint.
Avoid public networks.
Prevention Measures
Authentication mechanisms.
Antivirus and antimalware software.
Bibliography and references
- EC-Council Official Website: https://www.eccouncil.org
- Kali Linux Official Documentation: https://www.kali.org/docs
- Nmap Official Website: https://nmap.org
- Wireshark Documentation: https://www.wireshark.org/docs
- OWASP (Open Web Application Security Project): https://owasp.org
- National Institute of Standards and Technology (NIST): https://www.nist.gov
Ethical Hacking and Cybersecurity
Pablo
Created on November 25, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Corporate Christmas Presentation
View
Customer Service Manual
View
Business Results Presentation
View
Meeting Plan Presentation
View
Business vision deck
View
Economic Presentation
View
Tech Presentation Mobile
Explore all templates
Transcript
Ethical Hacking and Cybersecurity
Pablo Molina Escriche
Introduction
During this presentation, we'll learn about the meaning and differences of hacking and cyber-attacking. Some of the most common tools that are used. Usual hacking techniques to be aware of, and useful methods to protect our accounts and privacy from them.
INDEX
What is hacking?
Tools
Common techniques
Prevention measures
What is Hacking?
Tools
Wireshark:
Kali Linux:
03
01
Network protocol analysis.
A distribution specifically designed for penetration testing and security auditing.
Contextualiza tu tema con un subtítulo
Invicti:
04
Nmap:
02
Simulates hacker behavior, enabling automated vulnerability detection.
Network exploration.
Common hacking techniques
PHISHING
Brute Force Attacks
Man-in-the-Middle (MitM)
Social Engineering
Based on trial and error, often used to crack weak passwords.
Methods such as conversations, eavesdropping, psychological manipulation, and others to directly extract information from an individual.
Also known as data spying, it involves intercepting and manipulating communications between two systems.
Keyloggers
Malware that records keystrokes and sends them to its distributor.
Prevention Measures
Secure and updated passwords.
Minimize digital footprint.
Avoid public networks.
Prevention Measures
Authentication mechanisms.
Antivirus and antimalware software.
Bibliography and references