Hacking is the process of attempting to gain or successfully gaining unauthorized access to computer resources.
In this presentation types of hacking, types of hackers, process of hacking, advantages of hacking and disvantages are illustrated.
2. Contents
Introduction
History of hacking
Hackers
Types of hacking
Steps of Hacking
Purpose of hacking
What should do after hacked
How to secure our data
Advantages
Disadvantages
Conclusions
3. Introduction
Hacking is the act of a person abusing
computer access, breaking into computers,
or using computers without authorization.
The process of attempting to gain or
successfully gaining unauthorized access to
computer resources is called hacking.
4. History of Hacking
Hacking has been a part of computing for
almost five decades. The first known event
of hacking had taken place in 1961 at MIT
and at the same time, the term "Hacker" was
originated.
5. History
1970s : Phreakers or phone hackers
1980s : creating viruses and
breaking into systems
1990s : Kevin Mitnick, Kevin Poulsen
makes millions of dollars
2000s : Microsoft, eBay, etc are
affected with Dos
2010s : Wi-Fi attacks, exposing
government secrets
6. Hackers
A “clever programmer" who tries to break into
computer systems.
A hacker is someone who seeks and exploits
weakness in computer system or computer network.
Types of hackers-
White Hat hackers are also
known as Ethical Hackers
Black Hat hackers, also known
as Crackers
8. Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the website.
The hacker will get the username and password and the
hacker will use that website for any purpose which may
sometimes to destroy the valuable database information.
9. Network Hacking
Network hacking generally means gathering
information about domain by using tools like Ping,
Tracert, Netstat, etc….over the network.
There are three common ways of hacking a wireless
network:
○ Sniffing
○ Spoofing
○ Encryption cracking
10. Email Hacking
Email hacking is an illicit access to an email account.
Ways of email hacking:
o Personal information
o Social hacking
o Phishing
o Trojan virus
11. Password Hacking
Password hacking is the process of recovering secret
passwords from data that has been stored in or
transmitted by a computer system.
Password can be cracked or hacked by the following
ways:
○ Hashing
○ Guessing
○ Default passwords
○ Phishing
12. Computer Hacking
Computer hacking is when files on your computer are
viewed, created or deleted without your authorization.
People can get complete access to your computer from
anywhere in the world if your computer is turned on,
unprotected and has internet connection.
Remote desktop connection is the technique.
14. Purpose of Hacking
Just for fun
Show-off
Steal important information
Damaging the system
Hampering privacy
Money extortion
System security testing
To break policy compliance
15. Determinations
Files disappear or are modified unexpectedly.
Strange files appear or grow in size unexpectedly.
Hard disk space shrinks without reason.
Computer slows.
Strange messages or dialog boxes appear on the
screen.
The computer starts crashing frequently.
Programs stop working as expected.
16. What should do after hacked??
Shut down the system.
Separate the system from network.
Restore the system with the backup.
It can be good to inform the Police or IT
security department.
17. How to secure our data??
1->ior l ||->n
3->e |/|->m
4->a s->z
+->t c->[
9->g f->p
x->ck s->$
19. Advantages of Hacking
To recover lost information,
especially in case you lost your password.
To perform penetration testing to strengthen
computer and network security.
To put adequate preventative measures in
place to prevent security breaches.
To have a computer system that prevents
malicious hackers from gaining access.
20. Disadvantages of Hacking
Massive security breach.
Unauthorized system access on private
information.
Privacy violation.
Hampering system operation.
Denial of service attacks.
Malicious attack on the system.
21. Conclusion
Proper ethical hackers should be employed.
Do not expose your passwords to untrusted
sites.
Practice using exact web address.
Close your internet while not in use.