SlideShare una empresa de Scribd logo
1 de 17
HACKING
Meaning of Hacking. 
Why do people Hack?? 
Types of Hacking. 
Types of Hackers. 
Conclusion.
The Process of attempting to gain 
or successfully gaining, 
unauthorized access to computer 
resources for the purpose of help 
or secure system is called Hacking. 
Hacking is technique in which, 
any one can access any one’s 
computer without his permission.
 1980s 
- Cyberspace coined 
-414 arrested 
-Two hacker groups formed 
-2600 published 
 1990s 
-National Crackdown on hackers 
-Kevin Mitnick arrested 
-Microsoft’s NT operating system pierced
 2001 
 In one of the biggest denial-of-service attack, 
hackers launched attacks against eBay, Yahoo!, 
CNN.com., Amazon and others. 
 2007 
 Bank hit by “biggest ever” hack. Swedish Bank, 
Nordea recorded nearly $1 Million has been 
stolen in three months from 250 customer 
account
 To make security stronger ( Ethical Hacking ). 
 Just for fun. 
 Show off. 
 Hack other systems secretly. 
 Notify many people their thought. 
 Steal important information. 
 Destroy enemy’s computer network.
 White Hat Hackers: 
 A White Hat who specializes in penetration testing and in 
other testing methodologies to ensure the security of an 
organization's information systems. 
 Black Hat Hackers: 
 A Black Hat is the villain or bad guy , especially in a 
western movie in which such a character would 
stereotypically wear a black hat in contrast to the hero's 
white hat. 
 Gray Hat Hackers: 
 A Grey Hat, in the hacking community, refers to a skilled 
hacker whose activities fall somewhere between white and 
black hat hackers on a variety of spectra
Website Hacking. 
Email Hacking. 
Network Hacking. 
Password Hacking. 
Computer Hacking.
 Hacking a website means taking control from the 
website owner to a person who hacks the website. 
 The hacker will get the username and password and 
the hacker will use that website for any purpose 
which may sometimes to destroy some valuable 
information database.
 Email hacking is illicit access to an email account or email 
correspondence. 
 Ways of Email Hacking: 
 Personal Information. 
 Social Hacking. 
 Phishing/ Hacking Software. 
 Trojan Virus etc. 
 Email may be protected by methods such as a strong 
password, encryption of the contents or a digital signature. 
An email disclaimer may be used to warn unauthorized 
readers but these are thought to be ineffective.
 Network Hacking is generally means gathering 
information about domain by using tools like Telnet, 
NslookUP, Ping, Tracert, Netstat, etc… over the 
network. 
 It also include OS Fingerprinting, Port Scanning, 
Port Surfing using various Tools. 
 These are the three most common methods of 
hacking a wireless network : 
• Sniffing 
• Spoofing 
• Encryption Cracking
 Password cracking is the process of recovering secret 
passwords from data that has been stored in or transmitted 
by a computer system. A common approach is to repeatedly 
try guesses for the password. 
 Most passwords can be cracked by using following 
techniques: 
• Hashing 
• Guessing 
• Default Passwords 
• Brute Force 
• Phishing
 Computer Hacking is when files on your computer 
are viewed, created, or edited without your 
authorization. 
 People can gain complete access to your computer 
from any where in the world if your computer is 
turned on, unprotected, and has an internet 
connection. What they do, is up to them. 
 Remote desktop connection technique.
 Poor Web Application coding 
 Insecure deployment of web 
application 
 Insufficient input validation 
 No web traffic filtering 
 Web application attributes are not 
guarded well. For example Query 
String.
 Proper Ethical Hacker Should Be 
Employed 
 Do Not Exposed Your Passwords to 
Untrusted Sites 
 Close Your Internet While Not in 
Use 
 Having Basic Knowledge of Internet
HACKING
HACKING

Más contenido relacionado

La actualidad más candente

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 

La actualidad más candente (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar a HACKING

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 

Similar a HACKING (20)

Hacking
HackingHacking
Hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 

Último

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 

Último (15)

The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 

HACKING

  • 2. Meaning of Hacking. Why do people Hack?? Types of Hacking. Types of Hackers. Conclusion.
  • 3. The Process of attempting to gain or successfully gaining, unauthorized access to computer resources for the purpose of help or secure system is called Hacking. Hacking is technique in which, any one can access any one’s computer without his permission.
  • 4.  1980s - Cyberspace coined -414 arrested -Two hacker groups formed -2600 published  1990s -National Crackdown on hackers -Kevin Mitnick arrested -Microsoft’s NT operating system pierced
  • 5.  2001  In one of the biggest denial-of-service attack, hackers launched attacks against eBay, Yahoo!, CNN.com., Amazon and others.  2007  Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded nearly $1 Million has been stolen in three months from 250 customer account
  • 6.  To make security stronger ( Ethical Hacking ).  Just for fun.  Show off.  Hack other systems secretly.  Notify many people their thought.  Steal important information.  Destroy enemy’s computer network.
  • 7.  White Hat Hackers:  A White Hat who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.  Black Hat Hackers:  A Black Hat is the villain or bad guy , especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat.  Gray Hat Hackers:  A Grey Hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra
  • 8. Website Hacking. Email Hacking. Network Hacking. Password Hacking. Computer Hacking.
  • 9.  Hacking a website means taking control from the website owner to a person who hacks the website.  The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information database.
  • 10.  Email hacking is illicit access to an email account or email correspondence.  Ways of Email Hacking:  Personal Information.  Social Hacking.  Phishing/ Hacking Software.  Trojan Virus etc.  Email may be protected by methods such as a strong password, encryption of the contents or a digital signature. An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective.
  • 11.  Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network.  It also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools.  These are the three most common methods of hacking a wireless network : • Sniffing • Spoofing • Encryption Cracking
  • 12.  Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.  Most passwords can be cracked by using following techniques: • Hashing • Guessing • Default Passwords • Brute Force • Phishing
  • 13.  Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.  People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them.  Remote desktop connection technique.
  • 14.  Poor Web Application coding  Insecure deployment of web application  Insufficient input validation  No web traffic filtering  Web application attributes are not guarded well. For example Query String.
  • 15.  Proper Ethical Hacker Should Be Employed  Do Not Exposed Your Passwords to Untrusted Sites  Close Your Internet While Not in Use  Having Basic Knowledge of Internet