Hacking refers to attempting to gain unauthorized access to computer systems or networks. There are different types of hackers, including white hat hackers who test security systems to help organizations, black hat hackers who access systems maliciously, and gray hat hackers whose activities fall between white and black. Common types of hacking include website, email, network, password, and computer hacking through techniques like sniffing passwords, spoofing addresses, cracking encryption, brute force guessing, and exploiting poor web application coding. Organizations can help prevent hacking by employing ethical hackers to test security, not exposing passwords to untrusted sites, closing internet access when not in use, and having basic internet knowledge.
2. Meaning of Hacking.
Why do people Hack??
Types of Hacking.
Types of Hackers.
Conclusion.
3. The Process of attempting to gain
or successfully gaining,
unauthorized access to computer
resources for the purpose of help
or secure system is called Hacking.
Hacking is technique in which,
any one can access any one’s
computer without his permission.
4. 1980s
- Cyberspace coined
-414 arrested
-Two hacker groups formed
-2600 published
1990s
-National Crackdown on hackers
-Kevin Mitnick arrested
-Microsoft’s NT operating system pierced
5. 2001
In one of the biggest denial-of-service attack,
hackers launched attacks against eBay, Yahoo!,
CNN.com., Amazon and others.
2007
Bank hit by “biggest ever” hack. Swedish Bank,
Nordea recorded nearly $1 Million has been
stolen in three months from 250 customer
account
6. To make security stronger ( Ethical Hacking ).
Just for fun.
Show off.
Hack other systems secretly.
Notify many people their thought.
Steal important information.
Destroy enemy’s computer network.
7. White Hat Hackers:
A White Hat who specializes in penetration testing and in
other testing methodologies to ensure the security of an
organization's information systems.
Black Hat Hackers:
A Black Hat is the villain or bad guy , especially in a
western movie in which such a character would
stereotypically wear a black hat in contrast to the hero's
white hat.
Gray Hat Hackers:
A Grey Hat, in the hacking community, refers to a skilled
hacker whose activities fall somewhere between white and
black hat hackers on a variety of spectra
9. Hacking a website means taking control from the
website owner to a person who hacks the website.
The hacker will get the username and password and
the hacker will use that website for any purpose
which may sometimes to destroy some valuable
information database.
10. Email hacking is illicit access to an email account or email
correspondence.
Ways of Email Hacking:
Personal Information.
Social Hacking.
Phishing/ Hacking Software.
Trojan Virus etc.
Email may be protected by methods such as a strong
password, encryption of the contents or a digital signature.
An email disclaimer may be used to warn unauthorized
readers but these are thought to be ineffective.
11. Network Hacking is generally means gathering
information about domain by using tools like Telnet,
NslookUP, Ping, Tracert, Netstat, etc… over the
network.
It also include OS Fingerprinting, Port Scanning,
Port Surfing using various Tools.
These are the three most common methods of
hacking a wireless network :
• Sniffing
• Spoofing
• Encryption Cracking
12. Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted
by a computer system. A common approach is to repeatedly
try guesses for the password.
Most passwords can be cracked by using following
techniques:
• Hashing
• Guessing
• Default Passwords
• Brute Force
• Phishing
13. Computer Hacking is when files on your computer
are viewed, created, or edited without your
authorization.
People can gain complete access to your computer
from any where in the world if your computer is
turned on, unprotected, and has an internet
connection. What they do, is up to them.
Remote desktop connection technique.
14. Poor Web Application coding
Insecure deployment of web
application
Insufficient input validation
No web traffic filtering
Web application attributes are not
guarded well. For example Query
String.
15. Proper Ethical Hacker Should Be
Employed
Do Not Exposed Your Passwords to
Untrusted Sites
Close Your Internet While Not in
Use
Having Basic Knowledge of Internet