SlideShare una empresa de Scribd logo
1 de 16
Hacker !
Made by : Perfect idea
Hacker
 Programmer who have special skills in the field of
computer and information security.
Hacking
 Hacking means that a set of clever programmers who
challenge the different systems and try to storm it , and not
necessarily to commit a crime , but their success in
penetration is considered a success for their abilities and
skills. However, the law considered outsiders who enter the
default place should not be in it. And to do this optional
process in which the programmer tested his abilities without
knowing his real name or declare himself. But some of them
are exploited by criminal who clear information and others
are commercially exploited for the purposes of spying and to
steal some money.
 Many companies like Microsoft need to protect their
systems so they found the best method to protect their
system is to hire hacker with high salaries their mission
is attempt to penetrate their different systems and find
the points of weakness..
The classification of hackers morally
White hat hacker
Black hat hacker
Grey hat hacker
Trojan horse
 Hacker have many attack techniques but the most
common technique is by using Trojan horses and this
technique mostly used when hacker need to storm a
personal computer .
If you will download a program but this program has virus
the virus will open a hidden secret hole through your
computer firewall when the virus reached to your computer
the virus will delete any information or it will harm the host
computer system there is a rate 50% if you will scan your
computer by using antivirus when you have many viruses in
your computer you will find Trojan horse virus at your
computer .
Sony attacked by North Korea
 Few months ago, hacker sneaked to the computer network of
Sony Pictures Entertainment ,the attackers stole a large
number of secret documents, which is currently being loaded
(in the first place by journalists) from file-sharing networks
It is believed widely hacker to
be supported by the
government of North Korea,
which is angry at Sony to
produce the interview, a film
which describe the
assassination of North Korean
leader Kim Jong-un. the threat
of terrorism against the movie
theaters offer caused Sony to
cancel the planned release of
her Christmas Day holiday
On Monday, November 24th
Sony discovered that their
own company's network
has been hacked. The
attackers took terabytes of
data, delete the original
copies of Sony computers,
leaving the threat to release
the information messages if
Sony did not respond to the
demands of the attackers.
Lizard squad
 Lizard squad is a black hat hacking group
They attacked facebook before
but facebook denied it was
hacked and said that the
access issues earlier were "not
the result of a third party
attack". so Lizard Squad stated
that it was responsible for the
site, and Instagram going
down
Lizard Squad also claimed to be behind a series hacks of
Microsoft and Sony gaming networks over Christmas as
well. lizard squad made their own channel in Sony and
Microsoft servers
A hacker claiming to be from Lizard Squad - a 22-year-old
calling himself Member Two - said the group had hacked
the sites "because we can".
He also suggested the motive was to demonstrate
weaknesses in the Microsoft and Sony systems.
"It's just such a huge company Microsoft... Do you not
think they should be able to prevent such an attack?
he told BBC:
 "Is Christmas really about children playing with their
new consoles, or playing with their new toys, or is it
about them spending time with their families and
celebrating Christmas?" he added. "I think everyone's
just taking it all out of the ordinary and Microsoft will
receive a wonderful Christmas present from us
The name Lizard Squad
is generally used as a
signature on a site that
the group has taken
responsibility for hacking
and they left their
signature after hacking
the websites or software

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computer
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email Hacking
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hacking
HackingHacking
Hacking
 
Security threats
Security threatsSecurity threats
Security threats
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarika
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similar a Understanding Hackers: Types of Hackers and Common Hacking Techniques

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Debabrata Singh
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crimeAman Kumar
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesSouman Guha
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15haney888
 

Similar a Understanding Hackers: Types of Hackers and Common Hacking Techniques (20)

File000145
File000145File000145
File000145
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Presentation
PresentationPresentation
Presentation
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking
HackingHacking
Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Wannacry Virus
Wannacry VirusWannacry Virus
Wannacry Virus
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
C 7
C 7C 7
C 7
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15
 

Último

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Understanding Hackers: Types of Hackers and Common Hacking Techniques

  • 1. Hacker ! Made by : Perfect idea
  • 2. Hacker  Programmer who have special skills in the field of computer and information security.
  • 3. Hacking  Hacking means that a set of clever programmers who challenge the different systems and try to storm it , and not necessarily to commit a crime , but their success in penetration is considered a success for their abilities and skills. However, the law considered outsiders who enter the default place should not be in it. And to do this optional process in which the programmer tested his abilities without knowing his real name or declare himself. But some of them are exploited by criminal who clear information and others are commercially exploited for the purposes of spying and to steal some money.
  • 4.  Many companies like Microsoft need to protect their systems so they found the best method to protect their system is to hire hacker with high salaries their mission is attempt to penetrate their different systems and find the points of weakness..
  • 5. The classification of hackers morally White hat hacker Black hat hacker Grey hat hacker
  • 6. Trojan horse  Hacker have many attack techniques but the most common technique is by using Trojan horses and this technique mostly used when hacker need to storm a personal computer .
  • 7. If you will download a program but this program has virus the virus will open a hidden secret hole through your computer firewall when the virus reached to your computer the virus will delete any information or it will harm the host computer system there is a rate 50% if you will scan your computer by using antivirus when you have many viruses in your computer you will find Trojan horse virus at your computer .
  • 8. Sony attacked by North Korea  Few months ago, hacker sneaked to the computer network of Sony Pictures Entertainment ,the attackers stole a large number of secret documents, which is currently being loaded (in the first place by journalists) from file-sharing networks
  • 9. It is believed widely hacker to be supported by the government of North Korea, which is angry at Sony to produce the interview, a film which describe the assassination of North Korean leader Kim Jong-un. the threat of terrorism against the movie theaters offer caused Sony to cancel the planned release of her Christmas Day holiday
  • 10. On Monday, November 24th Sony discovered that their own company's network has been hacked. The attackers took terabytes of data, delete the original copies of Sony computers, leaving the threat to release the information messages if Sony did not respond to the demands of the attackers.
  • 11. Lizard squad  Lizard squad is a black hat hacking group
  • 12. They attacked facebook before but facebook denied it was hacked and said that the access issues earlier were "not the result of a third party attack". so Lizard Squad stated that it was responsible for the site, and Instagram going down
  • 13. Lizard Squad also claimed to be behind a series hacks of Microsoft and Sony gaming networks over Christmas as well. lizard squad made their own channel in Sony and Microsoft servers
  • 14. A hacker claiming to be from Lizard Squad - a 22-year-old calling himself Member Two - said the group had hacked the sites "because we can". He also suggested the motive was to demonstrate weaknesses in the Microsoft and Sony systems. "It's just such a huge company Microsoft... Do you not think they should be able to prevent such an attack? he told BBC:
  • 15.  "Is Christmas really about children playing with their new consoles, or playing with their new toys, or is it about them spending time with their families and celebrating Christmas?" he added. "I think everyone's just taking it all out of the ordinary and Microsoft will receive a wonderful Christmas present from us
  • 16. The name Lizard Squad is generally used as a signature on a site that the group has taken responsibility for hacking and they left their signature after hacking the websites or software