Hacking is an attempt to exploit a computer system or a private network inside a computer. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system.
Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.
This presentation will help you to learn more about hacking.
Hope, This will help you.
Thank you
2. Hacking
• Evolution of hacking
• What is called “Hacking”?
Hacker
• What is called a “Hacker”?
• Types of Hackers
Hacking types
• Types of Hacking
Hacking Tools
• Tools in Hacking
How to secure devices from hacks?
• 18 ways to secure devices from hackers
For Extra Knowledge
2
3. Evolution of Hacking
The very first hack came in 1878 when the phone company, Bell Telephone, was started.
A group of teenage boys, hired to run the switch boards, would disconnect or misdirect calls.
The first authentic computer hackers came in the 1960s……….In the 1970s, the world was
pinned and ready for hackers.
During those times, computers were mainframes, locked away in temperature controlled,
glassed in areas. It cost a lot of money to run these machines, so programmers had limited
access to them. The smarter students, usually MIT students, had an insatiable curiosity about
how things worked.
So, the smartest ones created what they called “Hacks”, programming shortcuts, to complete
computing tasks more quickly.
3
5. What is called a “Hacker”?
A person/user who uses computers to gain unauthorized access to data.
A Hacker is just a person who uses computer programming of technical
skills to overcome a challenge or problem.
A hacker is someone able to break into a banking computer system.
A computer user who attempts to gain unauthorized access to files in
various systems.
5
6. • White Hat Hacker
• Black Hat Hacker
• Grey Hat Hacker
• Red Hat Hacker
• Hacktivist
• Script Kiddie
6
(Hacker)
(Cracker)
8. A hacking tool is a program or utility designed to assist a hacker with hacking. It
also can be proactively utilized to protect a network or computer from Hackers.
• Netsparker
• Metasploit Framework
• Nmap
• OpenSSH
• Wireshark
• Nessus
• Aircrack-ng
• Snort
• John the ripper
• Ettercap
8
9. 9
• The Hacker News.
• WeLiveSecurity.
• HackerOne.
• Latest Hacking News.
• KitPloit.
• KnowBe4.
• (ISC)² Blog.
• GBHackers On Security.
• Google Gruyere. Google Gruyere is a hackable website
developed by the internet giant itself.
• HackThis. Not many websites actively invite you to hack them
in their title, but HackThis is one exception. bWAPP. ...
• OverTheWire.
• Hack This Site.
10. • Turn off Bluetooth.
• Don’t use unsecured public Wi-Fi.
• Get a security app.
• Use a better passcode.
• Switch off autocomplete.
• Clean your browsing history.
1
0
11. The Different Hacking Groups Hacking are a staple of cybersecurity culture.
Anonymous – Anonymous is perhaps the most iconic and popular hacking group in this list.
• Chaos Computer Club
• Homebrew Computer Club
• Legion of Doom
• Masters of Deception
• Lizard Squad
Kevin Mitnick
• Kevin Mitnick likely holds the little as the world’s best hacker ever. Kevin Metnick started hacking at
an early age. He brock in to the realm of public attention in the 1980 after he hacked into the North
American Defense Command (NORAD). 11