SlideShare una empresa de Scribd logo
1 de 20
Hackers!
 Hacker (Cracker) word that describe person who
have special skills in the field of computer and
information security.
 Hacking means that a set of clever programmers
who challenge the different systems and try to
storm it and not necessarily to commit a crime ,
but their success in penetration is considered a
success for their abilities and skills.
 Many companies like Microsoft needs to protect
their systems so they found the best method to
protect their system is to hire hackers with high
salaries their mission is attempt to penetrate
their different systems and find the points of
weakness and try to fix these problems
The law considered outsiders who enter the default
place should not be in it. And to do this optional
process in which the programmer tested his
abilities without knowing his real name or declare
himself. But some of them are exploited by
criminal who clear information and others are
commercially exploited for the purposes of spying
and to steal some money.
the classification of hackers
morally
 1: White hat hacker :a computer hackers intending
to improve computer security
 2: Black hat hacker: a computer hackers intending
to storm the computer or Internet security for
illegal personal gain
 3: Grey hat hacker: a computer hackers lies
between a black hat and a white hat hacker
Hacker attack techniques
 Hacker have many attack techniques but the most
common technique: is by using Trojan horses and
this technique mostly used when hackers need to
storm a personal computer
 example shows you how Trojan technique works :
 if you will download a program but this program
have virus
 this virus will open a hidden secret hole through
your computer firewall when the virus reached to
your computer it will delete any information or it
will harm the host computer systems their is a
ratio 50% if you will scan your computer by using
antivirus and you have many viruses in your
computer you will find Trojan horse virus at your
computer
Sony attacked by North Korea
 Five months ago, hackers sneaked to the
computer network of Sony Pictures
entertainment
 The attackers stole a large number of secret
documents, which is currently being loaded (in the
first place by journalists) from file-sharing
networks
 It is believed widely hackers to be supported by
the government of North Korea
 which is angry at Sony to produce the interview, a
film which describe the assassination
of North Korean leader Kim jong-un. the threat of
terrorism against the movie theaters offer caused
Sony to cancel the planned release of her
Christmas Day holiday.
 on Monday, November 24th Sony discovered that
their own company's network has been hacked.
 The attackers took terabytes of data, delete the
original copies of Sony computers, leaving the
threat to release the information messages if Sony
did not respond to the demands of the strikers
 . this image, shows the message that appeared on
the computer screens at Sony companies
Lizard squad
 lizard squad is a black hat hacking group !
 They attacked facebook before but facebook
denied it was hacked and said that the access issues
earlier were "not the result of a third party attack“.
so Lizard Squad stated that it was responsible for
the site, and Instagram going down.
Security breach in Microsoft and
Sony system
 Lizard Squad also claimed to be behind a series
hacks of Microsoft and Sony gaming networks over
Christmas as well.
 lizard squad made their own channel in Sony and
Microsoft servers
 A hacker claiming to be from Lizard Squad - a 22-
year-old calling himself Member Two - said the
group had hacked the sites "because we can“.
 He also suggested the motive was to demonstrate
weaknesses in the Microsoft and Sony systems.
"It's just such a huge company Microsoft... Do you
not think they should be able to prevent such an
attack?"
 he told BBC Radio !
 "Is Christmas really about children playing with
their new consoles, or playing with their new toys,
or is it about them spending time with their
families and celebrating Christmas?" he added. "I
think everyone's just taking it all out of the
ordinary and Microsoft will receive a wonderful
Christmas present from us
 The name Lizard Squad is generally used as a
signature on a site that the group has taken
responsibility for hacking and they left their
signature after hacking the websites or software
Lizard squad pictureLizard squad signature

Más contenido relacionado

La actualidad más candente

Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
msolis0710
 

La actualidad más candente (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Hacking
HackingHacking
Hacking
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Malware
MalwareMalware
Malware
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Social engineering
Social engineering Social engineering
Social engineering
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 

Destacado

Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
Bala Ganesh
 

Destacado (14)

Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
EVALUACIÓN
EVALUACIÓNEVALUACIÓN
EVALUACIÓN
 
Cookies and Session
Cookies and SessionCookies and Session
Cookies and Session
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Hackers ESP
Hackers ESPHackers ESP
Hackers ESP
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 

Similar a Hackers

Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
Mahmoud Saeed
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
ravikanthh
 

Similar a Hackers (20)

Hacker !
Hacker !Hacker !
Hacker !
 
Hacker !
Hacker !Hacker !
Hacker !
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
File000145
File000145File000145
File000145
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Presentation
PresentationPresentation
Presentation
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Unit 1
Unit 1Unit 1
Unit 1
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Hackers

  • 2.  Hacker (Cracker) word that describe person who have special skills in the field of computer and information security.  Hacking means that a set of clever programmers who challenge the different systems and try to storm it and not necessarily to commit a crime , but their success in penetration is considered a success for their abilities and skills.
  • 3.  Many companies like Microsoft needs to protect their systems so they found the best method to protect their system is to hire hackers with high salaries their mission is attempt to penetrate their different systems and find the points of weakness and try to fix these problems
  • 4. The law considered outsiders who enter the default place should not be in it. And to do this optional process in which the programmer tested his abilities without knowing his real name or declare himself. But some of them are exploited by criminal who clear information and others are commercially exploited for the purposes of spying and to steal some money.
  • 5. the classification of hackers morally  1: White hat hacker :a computer hackers intending to improve computer security  2: Black hat hacker: a computer hackers intending to storm the computer or Internet security for illegal personal gain  3: Grey hat hacker: a computer hackers lies between a black hat and a white hat hacker
  • 6. Hacker attack techniques  Hacker have many attack techniques but the most common technique: is by using Trojan horses and this technique mostly used when hackers need to storm a personal computer  example shows you how Trojan technique works :  if you will download a program but this program have virus
  • 7.  this virus will open a hidden secret hole through your computer firewall when the virus reached to your computer it will delete any information or it will harm the host computer systems their is a ratio 50% if you will scan your computer by using antivirus and you have many viruses in your computer you will find Trojan horse virus at your computer
  • 8. Sony attacked by North Korea  Five months ago, hackers sneaked to the computer network of Sony Pictures entertainment  The attackers stole a large number of secret documents, which is currently being loaded (in the first place by journalists) from file-sharing networks  It is believed widely hackers to be supported by the government of North Korea
  • 9.  which is angry at Sony to produce the interview, a film which describe the assassination of North Korean leader Kim jong-un. the threat of terrorism against the movie theaters offer caused Sony to cancel the planned release of her Christmas Day holiday.
  • 10.
  • 11.  on Monday, November 24th Sony discovered that their own company's network has been hacked.  The attackers took terabytes of data, delete the original copies of Sony computers, leaving the threat to release the information messages if Sony did not respond to the demands of the strikers  . this image, shows the message that appeared on the computer screens at Sony companies
  • 12.
  • 13. Lizard squad  lizard squad is a black hat hacking group !  They attacked facebook before but facebook denied it was hacked and said that the access issues earlier were "not the result of a third party attack“. so Lizard Squad stated that it was responsible for the site, and Instagram going down.
  • 14.
  • 15. Security breach in Microsoft and Sony system  Lizard Squad also claimed to be behind a series hacks of Microsoft and Sony gaming networks over Christmas as well.  lizard squad made their own channel in Sony and Microsoft servers
  • 16.
  • 17.  A hacker claiming to be from Lizard Squad - a 22- year-old calling himself Member Two - said the group had hacked the sites "because we can“.  He also suggested the motive was to demonstrate weaknesses in the Microsoft and Sony systems. "It's just such a huge company Microsoft... Do you not think they should be able to prevent such an attack?"  he told BBC Radio !
  • 18.  "Is Christmas really about children playing with their new consoles, or playing with their new toys, or is it about them spending time with their families and celebrating Christmas?" he added. "I think everyone's just taking it all out of the ordinary and Microsoft will receive a wonderful Christmas present from us
  • 19.  The name Lizard Squad is generally used as a signature on a site that the group has taken responsibility for hacking and they left their signature after hacking the websites or software
  • 20. Lizard squad pictureLizard squad signature