for education

&

presents
Ethical Hacking Workshop

BY
RISHABH SINHA
Founder & CEO at TecHacks
rishabh.info
Basics of Hacking
First thing first...
What is a hack?

Unconventional way of hacking
Computer hacking
Unconventional Hacking
The way hacking should be looked at
Let's consider some examples
Did you ever break into your fridge?
And connected it from the internet?
that's an unconventional way of hacking!
Computer Hacking
The way hacking is looked at
Did you ever break into a computer system?
And took control on it?
That's computer hacking!
Basics of Ethical Hacking
What is security?
- Resistance or Protection from harm.
- Being free from threat/danger.
Security v/s Protection
- Extremely similar concept but not the same.
- Measures adopted to increase protection is security.
- Type of protection against threats is security.
Hackers v/s Crackers
Hacker
The person who hacks.
Cracker
The person who destroys the system.
Hackers v/s Ethical Hackers
Hackers
- Breaks laws
- Gain access without authorization
Ethical Hackers
-
Does the same stuff with permission/authorization
-
Employed by companies/agencies to perform tests.
Types of Hackers
White Hat Hackers
- Experts who fight against black-hats.
- Use their skills/talent for legal purposes only

Black Hat Hackers
- Use their skills for malicious/harmful intents.
- Threaten people with their confidential data like credit card details, etc.

Grey Hat Hackers
- A combo of white-hats & black-hats.
- They use their skills/talents for national security but through illegal ways.

Some hackers you should know about...
Pranav Mistry
Pranav Mistry is a research assistant at MIT Media Labs and the famous developer of 6th Sense Technology.

Koushik Dutta
Koushit Dutta is the man behind Clockworkmod & ROM Manager for Android.

Hari Prasad
A renowned security researcher, and winner of EFF Pioneer Award.
Found significant vulnerabilities in EVMs (Electronic Voting Machines)

Jayant Krishnamurthy
He is one of the researchers who are behind designing MD6 algorithm (yeah you heard it right, the evolution of MD5). He is a top level computer theorist and researcher.

That's it.
Visit slides.com/rishabhsinha for more.
Follow me on twitter:
@risiofficial
Basics of Hacking
By Rishabh Sinha
Basics of Hacking
Rishabh Sinha introduces the basics of Hacking, Cyber Security/Ethical Hacking, & Types of Hackers.
- 512