Hacking

A
Hacking
Contents
 Introduction
 History of hacking
 Hackers
 Types of hacking
 Steps of Hacking
 Purpose of hacking
 What should do after hacked
 How to secure our data
 Advantages
 Disadvantages
 Conclusions
Introduction
 Hacking is the act of a person abusing
computer access, breaking into computers,
or using computers without authorization.
 The process of attempting to gain or
successfully gaining unauthorized access to
computer resources is called hacking.
History of Hacking
 Hacking has been a part of computing for
almost five decades. The first known event
of hacking had taken place in 1961 at MIT
and at the same time, the term "Hacker" was
originated.
History
 1970s : Phreakers or phone hackers
 1980s : creating viruses and
breaking into systems
 1990s : Kevin Mitnick, Kevin Poulsen
makes millions of dollars
 2000s : Microsoft, eBay, etc are
affected with Dos
 2010s : Wi-Fi attacks, exposing
government secrets
Hackers
 A “clever programmer" who tries to break into
computer systems.
 A hacker is someone who seeks and exploits
weakness in computer system or computer network.
 Types of hackers-
White Hat hackers are also
known as Ethical Hackers
Black Hat hackers, also known
as Crackers
Types of Hacking
 Website Hacking
 Network Hacking
 Email Hacking
 Ethical Hacking
 Password Hacking
 Computer Hacking
Website Hacking
 Hacking a website means taking control from the
website owner to a person who hacks the website.
 The hacker will get the username and password and the
hacker will use that website for any purpose which may
sometimes to destroy the valuable database information.
Network Hacking
 Network hacking generally means gathering
information about domain by using tools like Ping,
Tracert, Netstat, etc….over the network.
 There are three common ways of hacking a wireless
network:
○ Sniffing
○ Spoofing
○ Encryption cracking
Email Hacking
 Email hacking is an illicit access to an email account.
 Ways of email hacking:
o Personal information
o Social hacking
o Phishing
o Trojan virus
Password Hacking
 Password hacking is the process of recovering secret
passwords from data that has been stored in or
transmitted by a computer system.
 Password can be cracked or hacked by the following
ways:
○ Hashing
○ Guessing
○ Default passwords
○ Phishing
Computer Hacking
 Computer hacking is when files on your computer are
viewed, created or deleted without your authorization.
 People can get complete access to your computer from
anywhere in the world if your computer is turned on,
unprotected and has internet connection.
 Remote desktop connection is the technique.
Steps of hacking
Reconnaissance
Scanning
Gaining access
Maintaining access
Clearing Tracks
Purpose of Hacking
 Just for fun
 Show-off
 Steal important information
 Damaging the system
 Hampering privacy
 Money extortion
 System security testing
 To break policy compliance
Determinations
 Files disappear or are modified unexpectedly.
 Strange files appear or grow in size unexpectedly.
 Hard disk space shrinks without reason.
 Computer slows.
 Strange messages or dialog boxes appear on the
screen.
 The computer starts crashing frequently.
 Programs stop working as expected.
What should do after hacked??
 Shut down the system.
 Separate the system from network.
 Restore the system with the backup.
 It can be good to inform the Police or IT
security department.
How to secure our data??
 1->ior l ||->n
 3->e |/|->m
 4->a s->z
 +->t c->[
 9->g f->p
 x->ck s->$
Example:
 I transferred Rs. 4000 to your account.
 1 +r$||$ph3rr3d R$ aooo +o y0ur 4[[ou||+
Advantages of Hacking
 To recover lost information,
especially in case you lost your password.
 To perform penetration testing to strengthen
computer and network security.
 To put adequate preventative measures in
place to prevent security breaches.
 To have a computer system that prevents
malicious hackers from gaining access.
Disadvantages of Hacking
 Massive security breach.
 Unauthorized system access on private
information.
 Privacy violation.
 Hampering system operation.
 Denial of service attacks.
 Malicious attack on the system.
Conclusion
 Proper ethical hackers should be employed.
 Do not expose your passwords to untrusted
sites.
 Practice using exact web address.
 Close your internet while not in use.
Hacking
Hacking
1 von 23

Recomendados

Ethical hacking von
Ethical hackingEthical hacking
Ethical hackingVipinYadav257
429 views25 Folien
Hacking von
Hacking Hacking
Hacking Farkhanda Kiran
1.3K views29 Folien
Ethical hacking von
Ethical hackingEthical hacking
Ethical hackingAlapan Banerjee
802 views39 Folien
Ethical hacking presentation von
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentationGeorgekutty Francis
3.8K views15 Folien
Hacking & its types von
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
296.7K views32 Folien
Information Security and Ethical Hacking von
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
3.8K views16 Folien

Más contenido relacionado

Was ist angesagt?

Ethical hacking a licence to hack von
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
3.2K views26 Folien
Hacking von
HackingHacking
HackingSharique Masood
8.2K views33 Folien
Introduction to ethical hacking von
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
1K views9 Folien
Cyber Security von
Cyber SecurityCyber Security
Cyber SecurityBhandari Hìmáñßhü
12.9K views22 Folien
ETHICAL HACKING PRESENTATION von
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
443 views14 Folien

Was ist angesagt?(20)

Introduction to ethical hacking von Vikram Khanna
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
Vikram Khanna1K views
ETHICAL HACKING PRESENTATION von Yash Shukla
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
Yash Shukla443 views
Cyber Security A Challenges For Mankind von Saurabh Kheni
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni1.6K views
Ethical hacking von arohan6
Ethical hackingEthical hacking
Ethical hacking
arohan6689 views
Ethical Hacking Powerpoint von Ren Tuazon
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon3.9K views
It act and cyber crime von Dheeraj Dani
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani4.6K views
Introduction to cyber security amos von Amos Oyoo
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo3.1K views

Similar a Hacking

Hacking von
Hacking Hacking
Hacking Nafeesa Naeem
380 views32 Folien
HACKING von
HACKINGHACKING
HACKINGD's Surti
1.1K views33 Folien
Hacking and its types von
Hacking and its typesHacking and its types
Hacking and its typeshamza javed
739 views33 Folien
Hacking von
HackingHacking
Hackingakam bajalan
580 views8 Folien
Hacking and its types V2 von
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
277 views24 Folien
Hacking & Attack vector von
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vectorSmit Shah
705 views23 Folien

Similar a Hacking(20)

Último

information von
informationinformation
informationkhelgishekhar
8 views4 Folien
PORTFOLIO 1 (Bret Michael Pepito).pdf von
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdfbrejess0410
8 views6 Folien
Building trust in our information ecosystem: who do we trust in an emergency von
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergencyTina Purnat
98 views18 Folien
UiPath Document Understanding_Day 3.pptx von
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptxUiPathCommunity
103 views25 Folien
How to think like a threat actor for Kubernetes.pptx von
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
5 views33 Folien
Marketing and Community Building in Web3 von
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
12 views64 Folien

Último(10)

PORTFOLIO 1 (Bret Michael Pepito).pdf von brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04108 views
Building trust in our information ecosystem: who do we trust in an emergency von Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat98 views
UiPath Document Understanding_Day 3.pptx von UiPathCommunity
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity103 views
How to think like a threat actor for Kubernetes.pptx von LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 views
Marketing and Community Building in Web3 von Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast12 views
IETF 118: Starlink Protocol Performance von APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC244 views

Hacking

  • 2. Contents  Introduction  History of hacking  Hackers  Types of hacking  Steps of Hacking  Purpose of hacking  What should do after hacked  How to secure our data  Advantages  Disadvantages  Conclusions
  • 3. Introduction  Hacking is the act of a person abusing computer access, breaking into computers, or using computers without authorization.  The process of attempting to gain or successfully gaining unauthorized access to computer resources is called hacking.
  • 4. History of Hacking  Hacking has been a part of computing for almost five decades. The first known event of hacking had taken place in 1961 at MIT and at the same time, the term "Hacker" was originated.
  • 5. History  1970s : Phreakers or phone hackers  1980s : creating viruses and breaking into systems  1990s : Kevin Mitnick, Kevin Poulsen makes millions of dollars  2000s : Microsoft, eBay, etc are affected with Dos  2010s : Wi-Fi attacks, exposing government secrets
  • 6. Hackers  A “clever programmer" who tries to break into computer systems.  A hacker is someone who seeks and exploits weakness in computer system or computer network.  Types of hackers- White Hat hackers are also known as Ethical Hackers Black Hat hackers, also known as Crackers
  • 7. Types of Hacking  Website Hacking  Network Hacking  Email Hacking  Ethical Hacking  Password Hacking  Computer Hacking
  • 8. Website Hacking  Hacking a website means taking control from the website owner to a person who hacks the website.  The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy the valuable database information.
  • 9. Network Hacking  Network hacking generally means gathering information about domain by using tools like Ping, Tracert, Netstat, etc….over the network.  There are three common ways of hacking a wireless network: ○ Sniffing ○ Spoofing ○ Encryption cracking
  • 10. Email Hacking  Email hacking is an illicit access to an email account.  Ways of email hacking: o Personal information o Social hacking o Phishing o Trojan virus
  • 11. Password Hacking  Password hacking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.  Password can be cracked or hacked by the following ways: ○ Hashing ○ Guessing ○ Default passwords ○ Phishing
  • 12. Computer Hacking  Computer hacking is when files on your computer are viewed, created or deleted without your authorization.  People can get complete access to your computer from anywhere in the world if your computer is turned on, unprotected and has internet connection.  Remote desktop connection is the technique.
  • 13. Steps of hacking Reconnaissance Scanning Gaining access Maintaining access Clearing Tracks
  • 14. Purpose of Hacking  Just for fun  Show-off  Steal important information  Damaging the system  Hampering privacy  Money extortion  System security testing  To break policy compliance
  • 15. Determinations  Files disappear or are modified unexpectedly.  Strange files appear or grow in size unexpectedly.  Hard disk space shrinks without reason.  Computer slows.  Strange messages or dialog boxes appear on the screen.  The computer starts crashing frequently.  Programs stop working as expected.
  • 16. What should do after hacked??  Shut down the system.  Separate the system from network.  Restore the system with the backup.  It can be good to inform the Police or IT security department.
  • 17. How to secure our data??  1->ior l ||->n  3->e |/|->m  4->a s->z  +->t c->[  9->g f->p  x->ck s->$
  • 18. Example:  I transferred Rs. 4000 to your account.  1 +r$||$ph3rr3d R$ aooo +o y0ur 4[[ou||+
  • 19. Advantages of Hacking  To recover lost information, especially in case you lost your password.  To perform penetration testing to strengthen computer and network security.  To put adequate preventative measures in place to prevent security breaches.  To have a computer system that prevents malicious hackers from gaining access.
  • 20. Disadvantages of Hacking  Massive security breach.  Unauthorized system access on private information.  Privacy violation.  Hampering system operation.  Denial of service attacks.  Malicious attack on the system.
  • 21. Conclusion  Proper ethical hackers should be employed.  Do not expose your passwords to untrusted sites.  Practice using exact web address.  Close your internet while not in use.