SlideShare una empresa de Scribd logo
1 de 31
 Meaning  of Hacking.
 Why do people Hack??
 Types of Hacking.
 Types of Hackers.
 Conclusion.
The Process of attempting to gain
          or successfully
  gaining, unauthorized access to
computer resources for the purpose
 of help or secure system is called
              Hacking.

    Hacking is technique in
  which, any one can access any
   one’s computer without his
           permission.
   To make security stronger ( Ethical Hacking ).
   Just for fun.
   Show off.
   Hack other systems secretly.
   Notify many people their thought.
   Steal important information.
   Destroy enemy’s computer network.
 Website Hacking.
 Email Hacking.
 Network Hacking.
 Password Hacking.
 Online Banking Hacking.
 Computer Hacking.
 Hacking a website means taking control from the
  website owner to a person who hacks the website.
 The hacker will get the username and password and
  the hacker will use that website for any purpose
  which may sometimes to destroy some valuable
  information database.
   Email hacking is illicit access to an email account or email
    correspondence.
   Ways of Email Hacking:
   Personal Information.
   Social Hacking.
   Phishing/ Hacking Software.
   Trojan Virus etc.

   Email may be protected by methods such as a strong
    password, encryption of the contents or a digital signature.
    An email disclaimer may be used to warn unauthorized
    readers but these are thought to be ineffective.
   Network Hacking is generally means gathering information
    about domain by using tools like
    Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the
    network.
   It also include OS Fingerprinting, Port Scanning, Port Surfing
    using various Tools.
   These are the three most common methods of hacking
    a wireless network:
•   Sniffing
•   Spoofing
•   Encryption Cracking
   Password cracking is the process of recovering secret
    passwords from data that has been stored in or transmitted by
    a computer system. A common approach is to repeatedly try
    guesses for the password.
   Most passwords can be cracked by using following
    techniques:
     •   Hashing
     •   Guessing
     •   Default Passwords
     •   Brute Force
     •   Phishing
   Unauthorized accessing bank accounts without knowing the
        password or without permission of account holder is known as
        Online banking hacking.
       A bank account can be accessed in many ways. When
        someone gets access to your account, that person can take all
        your funds without your knowledge.
Here are five simple tips that will help Protect Your Online Accounts:
•   Use Strong Password
•   Protect your Computer
•   Keep an eye on running processes
•   Download with care
•   Be careful when using unprotected public networks
   Computer Hacking is when files on your computer are
    viewed, created, or edited without your authorization.

   People can gain complete access to your computer
    from any where in the world if your computer is
    turned on, unprotected, and has an internet
    connection. What they do, is up to them.

   Remote desktop connection technique.
 The good guys who identify the security
 weakness of the system or network and inform
 the owner about them.
A black hat is the villain or bad
 guy, who crash into victim’s security to
 steal information and destroy the victims
 security network.
Also known as ‘cracker’.
A Grey hat, in the hacking
 community, refers to a skilled hacker who is
 somewhere in between white and black hat
 hackers.
1 -> i or l   || -> n
3 -> e        |/| -> m
4 -> a        s -> z
7 -> t
              z -> s
9 -> g
              f -> ph
0 -> o
$ -> s        ph -> f
| -> i or l   x -> ck
              ck -> x
Example:

1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3|| 1 h4ck3d 1n



I did not hack this page, it was like this
when I hacked in.
   Stephen Wozniac




   Tsutomu Shimomura
 Kevin   Mitnick




 Kevin   Poulsen
 Theaverage age group of hackers are
 aged between 14-24 yrs.…
Social networking sites like
 ‘FACEBOOK’,’GMAIL’,’YAHOO”
 comprised of 60% of direct or
 indirect hacking incidents.
Links involving private pictures of
 celebrities.
Links showing pictures of famous
 personalities like Gaddafi’s dead
 body or videos of Osama Bin
 Laden’s killing.
Facebook lottery scam.
   www.jntu.ac.in was hacked on 7 Nov 2010.
   www.songs.pk was hacked on 15 July 2011.

     Songs.pk




                                     JNTU homepage after it
                                         was hacked
 Installa strong anti-virus
 Always run a anti-virus check before you
  download a program or a file from the
  internet.
 Avoid disclosing personal details like phone
  number, credit card details to strangers.
   Proper ethical hackers should be employed.

   Do not expose your passwords to untrusted sites.

   Practice using exact web address.

   Close your internet while not in use.
Hacking

Más contenido relacionado

La actualidad más candente (20)

Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
HACKING
HACKINGHACKING
HACKING
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Hacking
HackingHacking
Hacking
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
 
Web defacement
Web defacementWeb defacement
Web defacement
 

Destacado

hacking and its types
hacking and its typeshacking and its types
hacking and its typesBharath Reddy
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Michael Asres
 
Evaporation New Template
Evaporation New TemplateEvaporation New Template
Evaporation New Templatedloschiavo
 
What is hacking | Types of Hacking
What is hacking | Types of HackingWhat is hacking | Types of Hacking
What is hacking | Types of HackingGOPCSOFT
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hackingSainath Volam
 
Soil Steady-State Evaporation
Soil Steady-State EvaporationSoil Steady-State Evaporation
Soil Steady-State EvaporationMorteza Sadeghi
 
AMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKSAMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKSMarc Jones
 
CFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation ApproachCFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation ApproachAli Abbasi
 
Water evaporation reduction from lakes
Water evaporation reduction from lakesWater evaporation reduction from lakes
Water evaporation reduction from lakesguestb311d8
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profitDavid Stockton
 

Destacado (20)

hacking and its types
hacking and its typeshacking and its types
hacking and its types
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hacking Movable Type
Hacking Movable TypeHacking Movable Type
Hacking Movable Type
 
Evaporation
EvaporationEvaporation
Evaporation
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Evaporation New Template
Evaporation New TemplateEvaporation New Template
Evaporation New Template
 
What is hacking | Types of Hacking
What is hacking | Types of HackingWhat is hacking | Types of Hacking
What is hacking | Types of Hacking
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Hacking
HackingHacking
Hacking
 
Soil Steady-State Evaporation
Soil Steady-State EvaporationSoil Steady-State Evaporation
Soil Steady-State Evaporation
 
AMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKSAMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKS
 
Group 4 (evaporation)
Group 4 (evaporation)Group 4 (evaporation)
Group 4 (evaporation)
 
Science - Evaporation
Science - EvaporationScience - Evaporation
Science - Evaporation
 
CFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation ApproachCFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation Approach
 
Water evaporation reduction from lakes
Water evaporation reduction from lakesWater evaporation reduction from lakes
Water evaporation reduction from lakes
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profit
 
Evaporation 4 slides
Evaporation 4 slidesEvaporation 4 slides
Evaporation 4 slides
 

Similar a Hacking

Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vectorSmit Shah
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingdjkhatri
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingdjkhatri
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online SecurityJeanie Arnoco
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 

Similar a Hacking (20)

Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
cyber crime
cyber crimecyber crime
cyber crime
 
Hacking
HackingHacking
Hacking
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 2
Unit 2Unit 2
Unit 2
 

Hacking

  • 1.
  • 2.  Meaning of Hacking.  Why do people Hack??  Types of Hacking.  Types of Hackers.  Conclusion.
  • 3. The Process of attempting to gain or successfully gaining, unauthorized access to computer resources for the purpose of help or secure system is called Hacking. Hacking is technique in which, any one can access any one’s computer without his permission.
  • 4. To make security stronger ( Ethical Hacking ).  Just for fun.  Show off.  Hack other systems secretly.  Notify many people their thought.  Steal important information.  Destroy enemy’s computer network.
  • 5.  Website Hacking.  Email Hacking.  Network Hacking.  Password Hacking.  Online Banking Hacking.  Computer Hacking.
  • 6.  Hacking a website means taking control from the website owner to a person who hacks the website.  The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information database.
  • 7. Email hacking is illicit access to an email account or email correspondence.  Ways of Email Hacking:  Personal Information.  Social Hacking.  Phishing/ Hacking Software.  Trojan Virus etc.  Email may be protected by methods such as a strong password, encryption of the contents or a digital signature. An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective.
  • 8. Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network.  It also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools.  These are the three most common methods of hacking a wireless network: • Sniffing • Spoofing • Encryption Cracking
  • 9. Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.  Most passwords can be cracked by using following techniques: • Hashing • Guessing • Default Passwords • Brute Force • Phishing
  • 10. Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.  A bank account can be accessed in many ways. When someone gets access to your account, that person can take all your funds without your knowledge. Here are five simple tips that will help Protect Your Online Accounts: • Use Strong Password • Protect your Computer • Keep an eye on running processes • Download with care • Be careful when using unprotected public networks
  • 11. Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.  People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them.  Remote desktop connection technique.
  • 12.
  • 13.  The good guys who identify the security weakness of the system or network and inform the owner about them.
  • 14. A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network. Also known as ‘cracker’.
  • 15. A Grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.
  • 16. 1 -> i or l || -> n 3 -> e |/| -> m 4 -> a s -> z 7 -> t z -> s 9 -> g f -> ph 0 -> o $ -> s ph -> f | -> i or l x -> ck ck -> x
  • 17. Example: 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|| 1 h4ck3d 1n I did not hack this page, it was like this when I hacked in.
  • 18.
  • 19.
  • 20. Stephen Wozniac  Tsutomu Shimomura
  • 21.  Kevin Mitnick  Kevin Poulsen
  • 22.  Theaverage age group of hackers are aged between 14-24 yrs.…
  • 23. Social networking sites like ‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 60% of direct or indirect hacking incidents.
  • 24. Links involving private pictures of celebrities. Links showing pictures of famous personalities like Gaddafi’s dead body or videos of Osama Bin Laden’s killing.
  • 25.
  • 27. www.jntu.ac.in was hacked on 7 Nov 2010.  www.songs.pk was hacked on 15 July 2011. Songs.pk JNTU homepage after it was hacked
  • 28.
  • 29.  Installa strong anti-virus  Always run a anti-virus check before you download a program or a file from the internet.  Avoid disclosing personal details like phone number, credit card details to strangers.
  • 30. Proper ethical hackers should be employed.  Do not expose your passwords to untrusted sites.  Practice using exact web address.  Close your internet while not in use.