SlideShare una empresa de Scribd logo
1 de 14
Hacking refers to an array of activities which are
done to intrude some one else’s personal
information space so as to use it for
malicious, unwanted purposes.
Hacking is a term used to refer to activities aimed at
exploiting security flaws to obtain critical
information for gaining access to secured networks.
•Denial of Service.
•Trojans.
•Worms.
•Virus.
•Social Engineering.
•Password cracking.
•System Failure.
•Hacking Wireless
Networks.
•Hacking Mobile
Phones.
•Spam.
•Phishing.
•Identity Theft.
•System Hacking.
•Sniffing.
•E-mail Account Hacking.
• …etc.
1. Reconnaissance : The hacker seeks to gather as much
the information as possible about a target system prior
to lunching an attack.
2. Scanning: The hacker scans the network for specific
information gathered during reconnaissance.
3. Gaining Access: Refers to the penetration phase. The
hacker exploits the vulnerability in the system.
4. Maintaining Access: The hacker tries to retain his/her
ownership of the system.
5. Covering Tracks: Refers to the activities that the
hacker does to hide his misdeeds.
Robert Morris
• Graduated at Cornell University.
• He makes the worm as an attempt to measure the
size of the internet today.
• Following its release on November 2, 1988, the
Morris worm successfully infected 6000 systems
(approximately 10 percent of computers
connected to the internet at this time).
• The worm is designed to do no harm, but due to
an error in replication algorithm, the worm can
copy itself quickly, causing excessive load.
• In 1989, he became the first person charged with
the Act of Computer Fraud and Abuse in 1986.
Kevin Mitnick
•Kevin Mitnick is probably the most famous hacker in
the history of computers.
•As a master of social engineering, Mitnick was not just
computer hacking, he also did a hack on minds of
people.
•In 1979, when he was 16 years old, he made his way to
hack into computer systems and copying paid software.
•He involves himself with the personnel
administrator, such as through a phone call or an email
message and deceive them to provide passwords and
other security information.
•After two and a half years away, Mitnick was finally
caught and jailed for five years.
•He now runs a computer security consultant, Mitnick
Linus Torvalds
•Linus Torvalds is the other white hat hacker.
•On his QL machine he made his own Text Editor
program, even he made Pac-Man clone called Cool
man.
•In 1991, he has Intel 80836 PCs and began to create
Linux, the first has a limited license in its own
name, and then joined the GNU Project under the
GNU GPL.
•Torvalds did not originally intend to continue working
to build the kernel, because he considered it as a
hobby, but then said another history, and now Linux
operating system became the most familiar with
hackers and also the most secure ever available in the
• Perform required software updates for your operating system and
web browser.
• Install a firewall on your computer.
• Change your passwords every month.
• Purchase or download anti-virus software.
• Install anti-spyware/adware programs onto your system.
• Delete emails from unknown sources.
Hacking

Más contenido relacionado

La actualidad más candente

Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
Chandra Prakash
 

La actualidad más candente (20)

Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
N.vinodh
N.vinodhN.vinodh
N.vinodh
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
hacking
hackinghacking
hacking
 
Hacking
HackingHacking
Hacking
 

Similar a Hacking

Ulfah
UlfahUlfah
Ulfah
ulfah
 

Similar a Hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ulfah
UlfahUlfah
Ulfah
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking
HackingHacking
Hacking
 

Más de thabetabdulla (7)

School’s atmosphere in yemen
School’s atmosphere in yemenSchool’s atmosphere in yemen
School’s atmosphere in yemen
 
Processed food in america
Processed food in america Processed food in america
Processed food in america
 
My role model
My role modelMy role model
My role model
 
Fishing industry pros and cons
Fishing industry pros and consFishing industry pros and cons
Fishing industry pros and cons
 
Perceived obsolescence
Perceived obsolescencePerceived obsolescence
Perceived obsolescence
 
Color psychology
Color psychologyColor psychology
Color psychology
 
Science education importance
Science education importanceScience education importance
Science education importance
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Hacking

  • 1.
  • 2. Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes. Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
  • 3.
  • 4. •Denial of Service. •Trojans. •Worms. •Virus. •Social Engineering. •Password cracking. •System Failure. •Hacking Wireless Networks. •Hacking Mobile Phones. •Spam. •Phishing. •Identity Theft. •System Hacking. •Sniffing. •E-mail Account Hacking. • …etc.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. 1. Reconnaissance : The hacker seeks to gather as much the information as possible about a target system prior to lunching an attack. 2. Scanning: The hacker scans the network for specific information gathered during reconnaissance. 3. Gaining Access: Refers to the penetration phase. The hacker exploits the vulnerability in the system. 4. Maintaining Access: The hacker tries to retain his/her ownership of the system. 5. Covering Tracks: Refers to the activities that the hacker does to hide his misdeeds.
  • 10. Robert Morris • Graduated at Cornell University. • He makes the worm as an attempt to measure the size of the internet today. • Following its release on November 2, 1988, the Morris worm successfully infected 6000 systems (approximately 10 percent of computers connected to the internet at this time). • The worm is designed to do no harm, but due to an error in replication algorithm, the worm can copy itself quickly, causing excessive load. • In 1989, he became the first person charged with the Act of Computer Fraud and Abuse in 1986.
  • 11. Kevin Mitnick •Kevin Mitnick is probably the most famous hacker in the history of computers. •As a master of social engineering, Mitnick was not just computer hacking, he also did a hack on minds of people. •In 1979, when he was 16 years old, he made his way to hack into computer systems and copying paid software. •He involves himself with the personnel administrator, such as through a phone call or an email message and deceive them to provide passwords and other security information. •After two and a half years away, Mitnick was finally caught and jailed for five years. •He now runs a computer security consultant, Mitnick
  • 12. Linus Torvalds •Linus Torvalds is the other white hat hacker. •On his QL machine he made his own Text Editor program, even he made Pac-Man clone called Cool man. •In 1991, he has Intel 80836 PCs and began to create Linux, the first has a limited license in its own name, and then joined the GNU Project under the GNU GPL. •Torvalds did not originally intend to continue working to build the kernel, because he considered it as a hobby, but then said another history, and now Linux operating system became the most familiar with hackers and also the most secure ever available in the
  • 13. • Perform required software updates for your operating system and web browser. • Install a firewall on your computer. • Change your passwords every month. • Purchase or download anti-virus software. • Install anti-spyware/adware programs onto your system. • Delete emails from unknown sources.