SlideShare una empresa de Scribd logo
1 de 23
A Presentation on
Hacking

Group Name:- G3
Group Members :-

Ravikant Verma
Rahul Sisodiya
Sanjay Kumar
Jugendra Singh
Hacking
Authorized or unauthorized
attempts to bypass the security
mechanisms of an information
system or network.
Types of Hacking
•Website Hacking.
•E-mail Hacking.
•Network Hacking.
•Password Hacking.
•Online Banking Hacking.
•Computer Hacking.
Website Hacking..
E-mail Hacking…
Network Hacking...
Password Hacking..
Online Banking Hacking..
Computer Hacking..
Who is a “HACKER” ?
Someone who bypasses the
system‟s access controls by taking
advantage of security weaknesses
left in the system by developers.
Types of Hackers
White-Hat Hackers
The good guys who identify the
security weakness of the system or
network and inform the owner about
them.
Black Hat Hackers
A black hat is the villain or bad guy,
who crash into victim‟s security to
steal information and destroy the
victims security network.
Also known as „cracker‟.
Grey Hat Hackers
A grey hat, in the hacking
community, refers to a skilled
hacker who is somewhere in
between white and black hat
hackers.
Why do people hack ?
•To make security stronger ( Ethical
Hacking ).
•Just for fun.
•Show off.
•Hack other systems secretly.
•Notify many people their thought.
•For money purpose.
Random Fact !!!!
The average age group of hackers
are aged between 14-24 yrs. …
Did you know ?
Social networking sites like
„FACEBOOK‟,‟GMAIL‟,‟YAHOO”
comprised of 60% of direct or
indirect hacking incidents.
Popular Hacked sites
www.jntu.ac.in was hacked on 7 Nov
2010.
www.songs.pk was hacked on 15 July
2011.

Songs.pk

JNTUhomepage after it was hcked
Preventive measures
•Install a strong anti-virus.
•Always run a anti-virus check before
you download a program or a file
from the internet.
•Avoid disclosing personal details like
phone number, credit card details
to strangers.
Any Queries ??

Más contenido relacionado

La actualidad más candente

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
djkhatri
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
Aitezaz Mohsin
 

La actualidad más candente (19)

Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 
Hackers final
Hackers finalHackers final
Hackers final
 
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And Hackers
 
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threats
 
Hackers
HackersHackers
Hackers
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
Final ethical hacking
Final ethical hackingFinal ethical hacking
Final ethical hacking
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Hacking
HackingHacking
Hacking
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Destacado (6)

Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
 
Datateknik
DatateknikDatateknik
Datateknik
 
Hacking the Public Presentation
Hacking the Public PresentationHacking the Public Presentation
Hacking the Public Presentation
 
Martie star wars birthday
Martie star wars birthdayMartie star wars birthday
Martie star wars birthday
 
Outlook configuration in Microsoft Office
Outlook configuration in Microsoft OfficeOutlook configuration in Microsoft Office
Outlook configuration in Microsoft Office
 
Dhtic expo
Dhtic expoDhtic expo
Dhtic expo
 

Similar a Hacking

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
djkhatri
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
Alefya1
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
talhaabid
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
Cikgu Syam
 

Similar a Hacking (20)

hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Hacking
HackingHacking
Hacking
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
HACKING
HACKINGHACKING
HACKING
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Hacking-coffee and latte
Hacking-coffee and latteHacking-coffee and latte
Hacking-coffee and latte
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking
HackingHacking
Hacking
 

Más de Rahul Baghla (10)

Holography
HolographyHolography
Holography
 
Sensor technology
Sensor technologySensor technology
Sensor technology
 
Lifi technology
Lifi technologyLifi technology
Lifi technology
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Computer virus
Computer virusComputer virus
Computer virus
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Hacking