SlideShare ist ein Scribd-Unternehmen logo
1 von 23
What is Hacking?What is Hacking?
• Hacking is the act of breaking in to a computerHacking is the act of breaking in to a computer
system and is a criminal offence under the computersystem and is a criminal offence under the computer
misusemisuse
OrOr
• The really simple definition of hacking: is gaining an
unauthorized access to a computer system
Who is Hacker ?Who is Hacker ?
The person who is consistently engaging in
hacking activities, and has accepted
hacking as a lifestyle and philosophy of
their choice, is called a Hacker
HACKER CATEGORIESHACKER CATEGORIES
1. Semi-Professional Hacking. Performed part-time and does not
provide an income. They fit the classical hacker characteristics..
they work and play on the edge of society, have a gang mentality,
strong negative responses to threats against his/her self-esteem,
can have narcissistic personality disorders.
2. Inter-City Hacking. Inner-city residence (any race, color, religion,
creed, etc,), exhibits anger at social condition, exhibits no social
conscience, jail is not a deterrent. Hacking gives them a sense of
power and allows them to make their own rules.
3. Euro hacking. More worldly , enlightened then US hackers and are
generally motivated by philosophical or political concerns.
Generally thought of as a way of life and not a crime, thinks hacking
is treating technology without respect; thinks its great sport to spin
up intelligence communities.
4. Professional Hacking. This encompasses any for profit activity
such as spies, industrial espionage, Narco terrorist, White Collar
criminals, etc.
• White hat
• Black hat
• Grey hat
• Elite hacker
• Script kiddie
• Neophyte
• Blue hat
Type of hackerType of hacker
White-hat HackersWhite-hat Hackers
• The good guys
who identify the
security
weakness of
the system or
network and
inform the
owner about
them
Black Hat HackersBlack Hat Hackers
A black hat is the villain or
bad guy, who crash into
victim’s security to steal
information and destroy
the victims security
network.
Also known as ‘cracker’.
Grey hat HackersGrey hat Hackers
• A grey hat, in the
hacking community,
refers to a skilled
hacker who is
somewhere in
between white and
black hat hackers
Why do Hackers Attack?Why do Hackers Attack?
• Because they can
• A large fraction of
hacker attacks have
been pranks
• Financial Gain
• Espionage
• Venting anger at a
company or
organization
• Terrorism
• To make security stronger
( Ethical Hacking )
• Just for fun
• Show off
• Hack other systems secretly
• Notify many people their
thought
• Steal important information
• Destroy enemy’s computer
network
Hacking started because people realized
that there were flaws with security. For
example, this month people realized there
was a major security flaw with internet
explorer 7. Save PC user knew they could
access others information without them
knowing. Hacking also started because
user were concerned about vulnerabilities.
Why did hacking start?Why did hacking start?
Type of hackingType of hacking
• Ethical hacking
Ethical hacking or a ethical hacker are terms that
describe hacking performed to help a company or
individual identify potential threats on the computer or
network. An ethical hacker attempts to hack their way
past the system security, finding any weak points in the
security that could be exploited by other hackers. The
organization uses what the ethical hacker finds to
improve the system security, in an effort to minimize, if
not eliminate, any potential hacker attacks.
Who are Ethical Hackers?Who are Ethical Hackers?
• “One of the best ways to evaluate the intruder threat is to have
an independent computer security professionals attempt to
break their computer systems”
• Successful ethical hackers possess a variety of skills. First and
foremost, they must be completely trustworthy.
• Ethical hackers typically have very strong programming and
computer networking skills.
• They are also adept at installing and maintaining systems that use
the more popular operating systems (e.g., Linux or Windows 2000)
used on target systems.
• These base skills are augmented with detailed knowledge of the
hardware and software provided by the more popular computer and
networking hardware vendors.
What is Ethical Hacking?What is Ethical Hacking?
• Ethical hacking – defined “methodology adopted by
ethical hackers to discover the vulnerabilities existing in
information systems’ operating environments.”
• With the growth of the Internet, computer security has
become a major concern for businesses and
governments.
• In their search for a way to approach the problem,
organizations came to realize that one of the best ways
to evaluate the intruder threat to their interests would be
to have independent computer security professionals
attempt to break into their computer systems.
Types of Hacker AttackTypes of Hacker Attack
Active AttacksActive Attacks Passive AttacksPassive Attacks
Active Attacks
Denial of Service
Breaking into a site
Intelligence Gathering
Resource Usage
Deception
Passive Attacks
Sniffing
Passwords
Network Traffic
Sensitive Information
Information Gathering
• Routers:Routers: knowledge of routers, routing protocols, and access control listsknowledge of routers, routing protocols, and access control lists
• Microsoft:Microsoft: skills in operation, configuration and management.skills in operation, configuration and management.
• Linux:Linux: knowledge of Linux/Unix; security setting, configuration, and services.knowledge of Linux/Unix; security setting, configuration, and services.
• Firewalls:Firewalls: configurations, and operation of intrusion detection systems.configurations, and operation of intrusion detection systems.
• MainframesMainframes
• Network Protocols:Network Protocols: TCP/IP; how they function and can be manipulated.TCP/IP; how they function and can be manipulated.
• Project Management:Project Management: knowledge of leading, planning, organizing, andknowledge of leading, planning, organizing, and
controlling a penetration testing team.controlling a penetration testing team.
Skill of a hackerSkill of a hacker
1 Gary McKinnon
• top 10 hackers gary in world Gary
McKinnon, 40, accused of mounting the
largest ever hack of United States.
government computer networks —
including Army, Air Force, Navy and
NASA systems The court has
recommended
that McKinnon be extradited to the United
States to face charges of illegally
accessing 97 computers,
causing US$700,000 (400,000 pounds;
euro 588,000) in damage.
World’s best hackerWorld’s best hacker
2. Jonathan James
Jonathan james world top 10 hackersThe
youth, known as “comrade” on the
Internet, pleaded guilty to intercepting
3,300 email messages at one of the
Defense Department’s most sensitive
operations and
stealing data from 13 nasa computer
including some devote to the new
international space station.
Onel de Guzman, whose father was aOnel de Guzman, whose father was a
fisherman, was able to create afisherman, was able to create a
computer program that went from onecomputer program that went from one
American coast to the other in onlyAmerican coast to the other in only
twenty-fours hours. His program hadtwenty-fours hours. His program had
the capability o damage computers inthe capability o damage computers in
government offices from all over thegovernment offices from all over the
world and even the Pentagon and theworld and even the Pentagon and the
CIA suffered from his attack. PeopleCIA suffered from his attack. People
got an email with the subject “I LOVEgot an email with the subject “I LOVE
YOU: A love letter for you” thatYOU: A love letter for you” that
included an attached document calledincluded an attached document called
LOVE-FOR-YOU.txt.vbs. When peopleLOVE-FOR-YOU.txt.vbs. When people
clicked on it, a virus entered theirclicked on it, a virus entered their
computers and that was the end of it.computers and that was the end of it.
• 3 . KEVIN DAVID MITNICK IS THE BEST
HACKER IN THE WORLD. HE STARTED WITH
HIS MINOR CYBER CRIMES WHEN HE WAS
TWELVE YEARS OLD. THE FIRST THING HE
DID WAS HACK THE LOS ANGELES BUS
SYSTEM IN ORDER TO GET FREE BUS
TICKETS. AFTER THAT HE CONTINUED HIS
HACKING CAREER BY DAMAGING THE FBI,
DEC, IBM, MOTOROLA, NOKIA, SUN
MICROSYSTEMS AND SIEMENS. HE WAS
SENT TO PRISON FOR FIVE YEARS AND
EIGHT MONTHS AND WHEN HE WAS FREED
HE DECIDED TO SET UP MITNICK SECURITY,
WHICH IS A SAFETY CONSULTANCY
COMPANY THAT OFFERS ITS SERVICES FOR
MULTINATIONAL FIRMS.
•
Ian Murphy Kevin Mitnick Johan Helsinguis
Linus Torvalds Mark Abene Robert Morris
Ian Murphy Kevin Mitnick Johan HelsinguisIan Murphy Kevin Mitnick
Linus Torvalds
Johan HelsinguisIan Murphy Kevin Mitnick
Mark AbeneLinus Torvalds
Johan HelsinguisIan Murphy Kevin Mitnick
Robert MorrisMark AbeneLinus Torvalds
Johan HelsinguisIan Murphy Kevin Mitnick
Robert MorrisMark AbeneLinus Torvalds
Johan HelsinguisIan Murphy Kevin MitnickIan Murphy Kevin Mitnick Johan HelsinguisIan Murphy Kevin Mitnick
Linus Torvalds
Johan HelsinguisIan Murphy Kevin Mitnick
Mark AbeneLinus Torvalds
Johan HelsinguisIan Murphy Kevin Mitnick
Robert MorrisMark AbeneLinus Torvalds
Johan HelsinguisIan Murphy Kevin Mitnick
How to save computerHow to save computer fromfrom hackershackers
• Protect Your Computer: Avoid Computer
Holes/Vulnerabilities
• Install only trusted software and delete unknown emails .
• If you have any doubt about a piece of software's
function, do not install it.
• Avoid adult web sites, a hacker's paradise.
• Whether in your e-mail or online, do not click on ads. If
the ad is of interest, find the site. Be careful with what
you physically put into your computer. This is especially
true for shared R/W CDs, USB hard disks, or flash
drives. This is an easy path for a virus to follow from
computer to computer.
Anti-virus software searches for evidence of the presence of viralAnti-virus software searches for evidence of the presence of viral
programs, worm, bombs, and Trojan horses by checking for theprograms, worm, bombs, and Trojan horses by checking for the
characteristic appearances or behaviors that is typical of thesecharacteristic appearances or behaviors that is typical of these
programs. When found the program logs its discovery, its type, often itsprograms. When found the program logs its discovery, its type, often its
name or an identifier, and it potential for damage.name or an identifier, and it potential for damage.
our wireless network with a router that has a built in firewall. Almost allour wireless network with a router that has a built in firewall. Almost all
wireless routers are set to no security when first installed. Log into thewireless routers are set to no security when first installed. Log into the
router and at least set it to basic security with a strong password torouter and at least set it to basic security with a strong password to
replace the factory setting that any hacker knows.replace the factory setting that any hacker knows.
Avoid disclosing personal details like phone number, credit card details
to strangers.
ADVANTAGES OF HACKINGADVANTAGES OF HACKING
• CAN BE USED TO RECOVER LOST INFORMATION WHERE
THE COMPUTER PASSWORD HAS BEEN LOST.
• -TEACHES U THAT NO TECHNOLOGY IS 100% SECURE
• -TO TEST HOW GOOD SECURITY IS ON YOUR OWN
NETWORK. ;)
• THEY CALL IT WHITE HAT COMPUTER HACKING.
• -HACKING IS GOOD WITH GAMES ESPECIALLY WHEN YOU
ARE ONLINE BUT THE ONLY PROBLEM IS
IF THE GAMING SERVER FINDS OUT THAT YOU HAVE BEEN
HACKING THEN YOU COULD GET CHUCKED OFF THE
GAMING SERVER SO WATCH OUT
hacking

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
HACKING
HACKINGHACKING
HACKING
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Ähnlich wie hacking (20)

Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Hacking
HackingHacking
Hacking
 

Kürzlich hochgeladen

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 

Kürzlich hochgeladen (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

hacking

  • 1. What is Hacking?What is Hacking? • Hacking is the act of breaking in to a computerHacking is the act of breaking in to a computer system and is a criminal offence under the computersystem and is a criminal offence under the computer misusemisuse OrOr • The really simple definition of hacking: is gaining an unauthorized access to a computer system
  • 2. Who is Hacker ?Who is Hacker ? The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a Hacker
  • 3. HACKER CATEGORIESHACKER CATEGORIES 1. Semi-Professional Hacking. Performed part-time and does not provide an income. They fit the classical hacker characteristics.. they work and play on the edge of society, have a gang mentality, strong negative responses to threats against his/her self-esteem, can have narcissistic personality disorders. 2. Inter-City Hacking. Inner-city residence (any race, color, religion, creed, etc,), exhibits anger at social condition, exhibits no social conscience, jail is not a deterrent. Hacking gives them a sense of power and allows them to make their own rules. 3. Euro hacking. More worldly , enlightened then US hackers and are generally motivated by philosophical or political concerns. Generally thought of as a way of life and not a crime, thinks hacking is treating technology without respect; thinks its great sport to spin up intelligence communities. 4. Professional Hacking. This encompasses any for profit activity such as spies, industrial espionage, Narco terrorist, White Collar criminals, etc.
  • 4. • White hat • Black hat • Grey hat • Elite hacker • Script kiddie • Neophyte • Blue hat Type of hackerType of hacker
  • 5. White-hat HackersWhite-hat Hackers • The good guys who identify the security weakness of the system or network and inform the owner about them
  • 6. Black Hat HackersBlack Hat Hackers A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network. Also known as ‘cracker’.
  • 7. Grey hat HackersGrey hat Hackers • A grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers
  • 8. Why do Hackers Attack?Why do Hackers Attack? • Because they can • A large fraction of hacker attacks have been pranks • Financial Gain • Espionage • Venting anger at a company or organization • Terrorism • To make security stronger ( Ethical Hacking ) • Just for fun • Show off • Hack other systems secretly • Notify many people their thought • Steal important information • Destroy enemy’s computer network
  • 9. Hacking started because people realized that there were flaws with security. For example, this month people realized there was a major security flaw with internet explorer 7. Save PC user knew they could access others information without them knowing. Hacking also started because user were concerned about vulnerabilities. Why did hacking start?Why did hacking start?
  • 10. Type of hackingType of hacking • Ethical hacking Ethical hacking or a ethical hacker are terms that describe hacking performed to help a company or individual identify potential threats on the computer or network. An ethical hacker attempts to hack their way past the system security, finding any weak points in the security that could be exploited by other hackers. The organization uses what the ethical hacker finds to improve the system security, in an effort to minimize, if not eliminate, any potential hacker attacks.
  • 11. Who are Ethical Hackers?Who are Ethical Hackers? • “One of the best ways to evaluate the intruder threat is to have an independent computer security professionals attempt to break their computer systems” • Successful ethical hackers possess a variety of skills. First and foremost, they must be completely trustworthy. • Ethical hackers typically have very strong programming and computer networking skills. • They are also adept at installing and maintaining systems that use the more popular operating systems (e.g., Linux or Windows 2000) used on target systems. • These base skills are augmented with detailed knowledge of the hardware and software provided by the more popular computer and networking hardware vendors.
  • 12. What is Ethical Hacking?What is Ethical Hacking? • Ethical hacking – defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.” • With the growth of the Internet, computer security has become a major concern for businesses and governments. • In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
  • 13. Types of Hacker AttackTypes of Hacker Attack Active AttacksActive Attacks Passive AttacksPassive Attacks
  • 14. Active Attacks Denial of Service Breaking into a site Intelligence Gathering Resource Usage Deception Passive Attacks Sniffing Passwords Network Traffic Sensitive Information Information Gathering
  • 15.
  • 16. • Routers:Routers: knowledge of routers, routing protocols, and access control listsknowledge of routers, routing protocols, and access control lists • Microsoft:Microsoft: skills in operation, configuration and management.skills in operation, configuration and management. • Linux:Linux: knowledge of Linux/Unix; security setting, configuration, and services.knowledge of Linux/Unix; security setting, configuration, and services. • Firewalls:Firewalls: configurations, and operation of intrusion detection systems.configurations, and operation of intrusion detection systems. • MainframesMainframes • Network Protocols:Network Protocols: TCP/IP; how they function and can be manipulated.TCP/IP; how they function and can be manipulated. • Project Management:Project Management: knowledge of leading, planning, organizing, andknowledge of leading, planning, organizing, and controlling a penetration testing team.controlling a penetration testing team. Skill of a hackerSkill of a hacker
  • 17. 1 Gary McKinnon • top 10 hackers gary in world Gary McKinnon, 40, accused of mounting the largest ever hack of United States. government computer networks — including Army, Air Force, Navy and NASA systems The court has recommended that McKinnon be extradited to the United States to face charges of illegally accessing 97 computers, causing US$700,000 (400,000 pounds; euro 588,000) in damage. World’s best hackerWorld’s best hacker 2. Jonathan James Jonathan james world top 10 hackersThe youth, known as “comrade” on the Internet, pleaded guilty to intercepting 3,300 email messages at one of the Defense Department’s most sensitive operations and stealing data from 13 nasa computer including some devote to the new international space station.
  • 18. Onel de Guzman, whose father was aOnel de Guzman, whose father was a fisherman, was able to create afisherman, was able to create a computer program that went from onecomputer program that went from one American coast to the other in onlyAmerican coast to the other in only twenty-fours hours. His program hadtwenty-fours hours. His program had the capability o damage computers inthe capability o damage computers in government offices from all over thegovernment offices from all over the world and even the Pentagon and theworld and even the Pentagon and the CIA suffered from his attack. PeopleCIA suffered from his attack. People got an email with the subject “I LOVEgot an email with the subject “I LOVE YOU: A love letter for you” thatYOU: A love letter for you” that included an attached document calledincluded an attached document called LOVE-FOR-YOU.txt.vbs. When peopleLOVE-FOR-YOU.txt.vbs. When people clicked on it, a virus entered theirclicked on it, a virus entered their computers and that was the end of it.computers and that was the end of it. • 3 . KEVIN DAVID MITNICK IS THE BEST HACKER IN THE WORLD. HE STARTED WITH HIS MINOR CYBER CRIMES WHEN HE WAS TWELVE YEARS OLD. THE FIRST THING HE DID WAS HACK THE LOS ANGELES BUS SYSTEM IN ORDER TO GET FREE BUS TICKETS. AFTER THAT HE CONTINUED HIS HACKING CAREER BY DAMAGING THE FBI, DEC, IBM, MOTOROLA, NOKIA, SUN MICROSYSTEMS AND SIEMENS. HE WAS SENT TO PRISON FOR FIVE YEARS AND EIGHT MONTHS AND WHEN HE WAS FREED HE DECIDED TO SET UP MITNICK SECURITY, WHICH IS A SAFETY CONSULTANCY COMPANY THAT OFFERS ITS SERVICES FOR MULTINATIONAL FIRMS.
  • 19. • Ian Murphy Kevin Mitnick Johan Helsinguis Linus Torvalds Mark Abene Robert Morris Ian Murphy Kevin Mitnick Johan HelsinguisIan Murphy Kevin Mitnick Linus Torvalds Johan HelsinguisIan Murphy Kevin Mitnick Mark AbeneLinus Torvalds Johan HelsinguisIan Murphy Kevin Mitnick Robert MorrisMark AbeneLinus Torvalds Johan HelsinguisIan Murphy Kevin Mitnick Robert MorrisMark AbeneLinus Torvalds Johan HelsinguisIan Murphy Kevin MitnickIan Murphy Kevin Mitnick Johan HelsinguisIan Murphy Kevin Mitnick Linus Torvalds Johan HelsinguisIan Murphy Kevin Mitnick Mark AbeneLinus Torvalds Johan HelsinguisIan Murphy Kevin Mitnick Robert MorrisMark AbeneLinus Torvalds Johan HelsinguisIan Murphy Kevin Mitnick
  • 20. How to save computerHow to save computer fromfrom hackershackers • Protect Your Computer: Avoid Computer Holes/Vulnerabilities • Install only trusted software and delete unknown emails . • If you have any doubt about a piece of software's function, do not install it. • Avoid adult web sites, a hacker's paradise. • Whether in your e-mail or online, do not click on ads. If the ad is of interest, find the site. Be careful with what you physically put into your computer. This is especially true for shared R/W CDs, USB hard disks, or flash drives. This is an easy path for a virus to follow from computer to computer.
  • 21. Anti-virus software searches for evidence of the presence of viralAnti-virus software searches for evidence of the presence of viral programs, worm, bombs, and Trojan horses by checking for theprograms, worm, bombs, and Trojan horses by checking for the characteristic appearances or behaviors that is typical of thesecharacteristic appearances or behaviors that is typical of these programs. When found the program logs its discovery, its type, often itsprograms. When found the program logs its discovery, its type, often its name or an identifier, and it potential for damage.name or an identifier, and it potential for damage. our wireless network with a router that has a built in firewall. Almost allour wireless network with a router that has a built in firewall. Almost all wireless routers are set to no security when first installed. Log into thewireless routers are set to no security when first installed. Log into the router and at least set it to basic security with a strong password torouter and at least set it to basic security with a strong password to replace the factory setting that any hacker knows.replace the factory setting that any hacker knows. Avoid disclosing personal details like phone number, credit card details to strangers.
  • 22. ADVANTAGES OF HACKINGADVANTAGES OF HACKING • CAN BE USED TO RECOVER LOST INFORMATION WHERE THE COMPUTER PASSWORD HAS BEEN LOST. • -TEACHES U THAT NO TECHNOLOGY IS 100% SECURE • -TO TEST HOW GOOD SECURITY IS ON YOUR OWN NETWORK. ;) • THEY CALL IT WHITE HAT COMPUTER HACKING. • -HACKING IS GOOD WITH GAMES ESPECIALLY WHEN YOU ARE ONLINE BUT THE ONLY PROBLEM IS IF THE GAMING SERVER FINDS OUT THAT YOU HAVE BEEN HACKING THEN YOU COULD GET CHUCKED OFF THE GAMING SERVER SO WATCH OUT