SlideShare ist ein Scribd-Unternehmen logo
1 von 25
WHAT IS HACKING ?
 Hacking is the act of breaking in to a
computersystem and is a criminal offence under
the computer misuse.unauthorized access to
computer resources is called Hacking.
 Computer hacking is the most popular form of
hacking now a days, especially in the field of
computer security, but hacking exists in many other
forms, such as phone hacking, brain hacking, etc.
and it's not limited to either of them.
 In 1878, just two years after the telephone was invented by
Alexander Graham Bell, a group of teenage boys hired to run
the switchboards were kicked off of a telephone system in
NewYork.The reason? The boys were more interested in
knowing how the phone system worked than in making
proper connections and directing calls to the correct place. In
essence, they were trying to "hack" the system to see how it
worked.
 Hacking has been a part of computing for 40 years.
 The first computer hacker emerged at MIT.
 Hacking is began in the 1960s at MIT , origin of the
term “hacker”.
MIT=Massachusetts Institute of Technology
WHO IS A HACKER?
There Are 7 Types Of Hacking
1)  WEBSITE HACKING
2)  NETWORK HACKING
3)  ETHICAL HACKING
4)  EMAIL HACKING
5)  PASSWORD HACKING
6)  ONLINE BANKING HACKING
7)  COMPUTER HACKING
EXPLAINATION ON TYPES OF HACKING
 WEBSITEHACKING = Hacking A Website Means Taking Control Form The Website Owner
To A Person Who Hacks The Website.
 NETWORKHACKING =Generally Means Gathering Information About Domain By Using
Tools Like Telnet,nslookup,ping,tracert,netstat Etc.
 ETHICALHACKING--An ethical hacker is a computer and networking expert who
systematically attempts to penetrate a computer system or network on behalf of its
owners for the purpose of finding security vulnerabilities that a malicious hacker could
potentially exploit..
E-MAIL HACKING = Email hacker is a free Email hacking tool capable of hacking email
accounts of the most popular service provider. Email hacking is a illicit access to an
email account or email correspondence. PASSWORDHACKING= A password can be secret word,pharase or
string of character used to gain access to secured data.password hacking is sometimes
password sometimes referred to as a password cracking is a method of recovering passwords
from data transmitted by or stored on a computer.
 COMPUTERHACKING--is the practice of modifying computer hardware and software
to accomplish a goal outside of the creator’s original purpose. People who engage
in computer hacking activities are often called hackers.
Ian Murphy Kevin Mitnick
Johan HelsinguisLinusTorvalds Mark Abene
Robert Morris
ADVANTAGES DISADVANTAGES
1) Teaches you that no technology is
100% secure.
Criminals can use it to their
advantage.
2) To test how good security is on
your own network.
It can harm someone's privacy
3) Can be used to recover lost
information where the computer
password has been lost.
It destroys other people work.
4) It provides security to banking
and financial establishments.
It's Illegal.
5) They call it white hat computer
hacking.
Hiring professional is expensive.
TYPES OF HACKER
 WHITE HAT HACKERS = Who Specializes In Penetration
Testing And In Other Testing Methodologies To Ensure The
Sequrity Of An Organization’s Information Systems.
 BLACK HAT HACKERS = A Black Hat Is The Villan Or Bad
Guy, Especially In A Western Movie In Which Such A Character
Would Stereotypically Wear A Black Hat In Contrast To The Hero’s
White Hat.
 GREY HAT HACKERS = A Grey, Hat Is The Hacking
Community, Refers To A Skilled Hacker Whose Activities Fall
Somewhere Between White And Black Hat Hackers On A Variety
Of Spectra.
5 HACKERS
WHY DO HACKERS HACK ?
Just for fun.
Show off.
Hack other system
secretly.
Notice many people
their thought.
Steal important
information.
Destroy’s enemy’s
computer network
during the war.
92%
7% 1%
HACKERS
1st Qtr 2nd Qtr 3th Qtr
 Amateurs (cyber
joy riders).
■ Potential
professional
hackers for hire
(corporate spies).
■ World-class cyber
criminals.
BASE=ABOUT 100,000 HACKERS
WORLDWIDE.
 Watch Dogs is an open world vigilante action-adventure stealth video game developed by
Ubisoft Montreal and published by Ubisoft.
 A third-person open-world game from Ubisoft, set in a dark alternate version of the US
where corporations track and catalog all online behavior over a vast data network. A
vigilante group called the Watch_Dogs hacks into this data, using it to hunt criminals.
WHAT TO DO AFTERYOU'VE BEENHACKED
1) SHUT DOWN THE
SYSTEM.
OR Turn off the system.
2) SEPRATE THE SYSTEM FROM NETWORK.
3) RESTORE THE SYSTEM WITH
THE BACKUP.
OR Shutdown the system .
4) IT CAN BE GOOD TO CALL THE CYBER CRIME POLICE.
5) RESET YOUR PASSWORDS.
6) LET YOUR OTHER CONTACTS KNOW ABOUT THE HACK.
7) MAKE SURE YOU WERE HACKED.
8) FORENSIC RECOVERY.
MOBILE PHONE COMMAND PROMPT EMULATOR
WORLDWIDE HACKING ATTACKS
 Anonymous Originated In 2003 On The Imageboard 4chan, Representing The
Concept Of Many Online And Offline Community Users Simultaneously Existing
As An Anarchic, Digitized Global Brain.
 Anonymous Is A Lossely Associated Hacking Organization. It Was Formed On
“4chan” To Represent The Idea Of Many Online And Offline Community Users.
 Anonymous Strongly Opposes Internet Censorship And Surveillance, And Have
Shutdown Multiple Government Website.
 Their Member Can Be Recognized Ny Their “Guy Fawkes“ Mask In Public.
 Anonymous is the first internet-based super-consciousness. Anonymous is a
group, in the sense that a flock of birds is a group.
 Dozens of people have been arrested for involvement in Anonymous cyber
attacks, in countries including the US, UK, Australia, the Netherlands, Spain,
and Turkey.
 Supporters have called the group "freedom fighters” and digital Robin Hoods
while critics have described them as "a cyber lynch-mob "or “ cyber terrorists".
 In 2012, Time called Anonymous one of the "100 most influential people" in
the world.
THIS HACKING PROJECT IS DONE BY = MUBEEN MOMIN,SWAPNIL
LAVAHARE,PRATAMESH KHEDEKAR,PRIYANKA MALI,SUYASH BHADEKAR.

Weitere ähnliche Inhalte

Was ist angesagt?

Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pagesleoimpact
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptRohit Yadav
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 

Was ist angesagt? (20)

Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking
HackingHacking
Hacking
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 

Ähnlich wie Hacking (20)

Hacking
HackingHacking
Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 

Kürzlich hochgeladen

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Kürzlich hochgeladen (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Hacking

  • 1.
  • 2.
  • 3. WHAT IS HACKING ?  Hacking is the act of breaking in to a computersystem and is a criminal offence under the computer misuse.unauthorized access to computer resources is called Hacking.  Computer hacking is the most popular form of hacking now a days, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
  • 4.
  • 5.  In 1878, just two years after the telephone was invented by Alexander Graham Bell, a group of teenage boys hired to run the switchboards were kicked off of a telephone system in NewYork.The reason? The boys were more interested in knowing how the phone system worked than in making proper connections and directing calls to the correct place. In essence, they were trying to "hack" the system to see how it worked.  Hacking has been a part of computing for 40 years.  The first computer hacker emerged at MIT.  Hacking is began in the 1960s at MIT , origin of the term “hacker”. MIT=Massachusetts Institute of Technology
  • 6. WHO IS A HACKER?
  • 7.
  • 8. There Are 7 Types Of Hacking 1)  WEBSITE HACKING 2)  NETWORK HACKING 3)  ETHICAL HACKING 4)  EMAIL HACKING 5)  PASSWORD HACKING 6)  ONLINE BANKING HACKING 7)  COMPUTER HACKING
  • 9. EXPLAINATION ON TYPES OF HACKING  WEBSITEHACKING = Hacking A Website Means Taking Control Form The Website Owner To A Person Who Hacks The Website.  NETWORKHACKING =Generally Means Gathering Information About Domain By Using Tools Like Telnet,nslookup,ping,tracert,netstat Etc.  ETHICALHACKING--An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit..
  • 10. E-MAIL HACKING = Email hacker is a free Email hacking tool capable of hacking email accounts of the most popular service provider. Email hacking is a illicit access to an email account or email correspondence. PASSWORDHACKING= A password can be secret word,pharase or string of character used to gain access to secured data.password hacking is sometimes password sometimes referred to as a password cracking is a method of recovering passwords from data transmitted by or stored on a computer.  COMPUTERHACKING--is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers.
  • 11.
  • 12. Ian Murphy Kevin Mitnick Johan HelsinguisLinusTorvalds Mark Abene Robert Morris
  • 13. ADVANTAGES DISADVANTAGES 1) Teaches you that no technology is 100% secure. Criminals can use it to their advantage. 2) To test how good security is on your own network. It can harm someone's privacy 3) Can be used to recover lost information where the computer password has been lost. It destroys other people work. 4) It provides security to banking and financial establishments. It's Illegal. 5) They call it white hat computer hacking. Hiring professional is expensive.
  • 14. TYPES OF HACKER  WHITE HAT HACKERS = Who Specializes In Penetration Testing And In Other Testing Methodologies To Ensure The Sequrity Of An Organization’s Information Systems.  BLACK HAT HACKERS = A Black Hat Is The Villan Or Bad Guy, Especially In A Western Movie In Which Such A Character Would Stereotypically Wear A Black Hat In Contrast To The Hero’s White Hat.  GREY HAT HACKERS = A Grey, Hat Is The Hacking Community, Refers To A Skilled Hacker Whose Activities Fall Somewhere Between White And Black Hat Hackers On A Variety Of Spectra.
  • 16. WHY DO HACKERS HACK ? Just for fun. Show off. Hack other system secretly. Notice many people their thought. Steal important information. Destroy’s enemy’s computer network during the war.
  • 17. 92% 7% 1% HACKERS 1st Qtr 2nd Qtr 3th Qtr  Amateurs (cyber joy riders). ■ Potential professional hackers for hire (corporate spies). ■ World-class cyber criminals. BASE=ABOUT 100,000 HACKERS WORLDWIDE.
  • 18.
  • 19.  Watch Dogs is an open world vigilante action-adventure stealth video game developed by Ubisoft Montreal and published by Ubisoft.  A third-person open-world game from Ubisoft, set in a dark alternate version of the US where corporations track and catalog all online behavior over a vast data network. A vigilante group called the Watch_Dogs hacks into this data, using it to hunt criminals.
  • 20. WHAT TO DO AFTERYOU'VE BEENHACKED 1) SHUT DOWN THE SYSTEM. OR Turn off the system. 2) SEPRATE THE SYSTEM FROM NETWORK. 3) RESTORE THE SYSTEM WITH THE BACKUP. OR Shutdown the system . 4) IT CAN BE GOOD TO CALL THE CYBER CRIME POLICE. 5) RESET YOUR PASSWORDS. 6) LET YOUR OTHER CONTACTS KNOW ABOUT THE HACK. 7) MAKE SURE YOU WERE HACKED. 8) FORENSIC RECOVERY.
  • 21. MOBILE PHONE COMMAND PROMPT EMULATOR
  • 23.
  • 24.  Anonymous Originated In 2003 On The Imageboard 4chan, Representing The Concept Of Many Online And Offline Community Users Simultaneously Existing As An Anarchic, Digitized Global Brain.  Anonymous Is A Lossely Associated Hacking Organization. It Was Formed On “4chan” To Represent The Idea Of Many Online And Offline Community Users.  Anonymous Strongly Opposes Internet Censorship And Surveillance, And Have Shutdown Multiple Government Website.  Their Member Can Be Recognized Ny Their “Guy Fawkes“ Mask In Public.  Anonymous is the first internet-based super-consciousness. Anonymous is a group, in the sense that a flock of birds is a group.  Dozens of people have been arrested for involvement in Anonymous cyber attacks, in countries including the US, UK, Australia, the Netherlands, Spain, and Turkey.  Supporters have called the group "freedom fighters” and digital Robin Hoods while critics have described them as "a cyber lynch-mob "or “ cyber terrorists".  In 2012, Time called Anonymous one of the "100 most influential people" in the world.
  • 25. THIS HACKING PROJECT IS DONE BY = MUBEEN MOMIN,SWAPNIL LAVAHARE,PRATAMESH KHEDEKAR,PRIYANKA MALI,SUYASH BHADEKAR.