3. WHAT IS HACKING ?
Hacking is the act of breaking in to a
computersystem and is a criminal offence under
the computer misuse.unauthorized access to
computer resources is called Hacking.
Computer hacking is the most popular form of
hacking now a days, especially in the field of
computer security, but hacking exists in many other
forms, such as phone hacking, brain hacking, etc.
and it's not limited to either of them.
4.
5. In 1878, just two years after the telephone was invented by
Alexander Graham Bell, a group of teenage boys hired to run
the switchboards were kicked off of a telephone system in
NewYork.The reason? The boys were more interested in
knowing how the phone system worked than in making
proper connections and directing calls to the correct place. In
essence, they were trying to "hack" the system to see how it
worked.
Hacking has been a part of computing for 40 years.
The first computer hacker emerged at MIT.
Hacking is began in the 1960s at MIT , origin of the
term “hacker”.
MIT=Massachusetts Institute of Technology
9. EXPLAINATION ON TYPES OF HACKING
WEBSITEHACKING = Hacking A Website Means Taking Control Form The Website Owner
To A Person Who Hacks The Website.
NETWORKHACKING =Generally Means Gathering Information About Domain By Using
Tools Like Telnet,nslookup,ping,tracert,netstat Etc.
ETHICALHACKING--An ethical hacker is a computer and networking expert who
systematically attempts to penetrate a computer system or network on behalf of its
owners for the purpose of finding security vulnerabilities that a malicious hacker could
potentially exploit..
10. E-MAIL HACKING = Email hacker is a free Email hacking tool capable of hacking email
accounts of the most popular service provider. Email hacking is a illicit access to an
email account or email correspondence. PASSWORDHACKING= A password can be secret word,pharase or
string of character used to gain access to secured data.password hacking is sometimes
password sometimes referred to as a password cracking is a method of recovering passwords
from data transmitted by or stored on a computer.
COMPUTERHACKING--is the practice of modifying computer hardware and software
to accomplish a goal outside of the creator’s original purpose. People who engage
in computer hacking activities are often called hackers.
11.
12. Ian Murphy Kevin Mitnick
Johan HelsinguisLinusTorvalds Mark Abene
Robert Morris
13. ADVANTAGES DISADVANTAGES
1) Teaches you that no technology is
100% secure.
Criminals can use it to their
advantage.
2) To test how good security is on
your own network.
It can harm someone's privacy
3) Can be used to recover lost
information where the computer
password has been lost.
It destroys other people work.
4) It provides security to banking
and financial establishments.
It's Illegal.
5) They call it white hat computer
hacking.
Hiring professional is expensive.
14. TYPES OF HACKER
WHITE HAT HACKERS = Who Specializes In Penetration
Testing And In Other Testing Methodologies To Ensure The
Sequrity Of An Organization’s Information Systems.
BLACK HAT HACKERS = A Black Hat Is The Villan Or Bad
Guy, Especially In A Western Movie In Which Such A Character
Would Stereotypically Wear A Black Hat In Contrast To The Hero’s
White Hat.
GREY HAT HACKERS = A Grey, Hat Is The Hacking
Community, Refers To A Skilled Hacker Whose Activities Fall
Somewhere Between White And Black Hat Hackers On A Variety
Of Spectra.
16. WHY DO HACKERS HACK ?
Just for fun.
Show off.
Hack other system
secretly.
Notice many people
their thought.
Steal important
information.
Destroy’s enemy’s
computer network
during the war.
17. 92%
7% 1%
HACKERS
1st Qtr 2nd Qtr 3th Qtr
Amateurs (cyber
joy riders).
■ Potential
professional
hackers for hire
(corporate spies).
■ World-class cyber
criminals.
BASE=ABOUT 100,000 HACKERS
WORLDWIDE.
18.
19. Watch Dogs is an open world vigilante action-adventure stealth video game developed by
Ubisoft Montreal and published by Ubisoft.
A third-person open-world game from Ubisoft, set in a dark alternate version of the US
where corporations track and catalog all online behavior over a vast data network. A
vigilante group called the Watch_Dogs hacks into this data, using it to hunt criminals.
20. WHAT TO DO AFTERYOU'VE BEENHACKED
1) SHUT DOWN THE
SYSTEM.
OR Turn off the system.
2) SEPRATE THE SYSTEM FROM NETWORK.
3) RESTORE THE SYSTEM WITH
THE BACKUP.
OR Shutdown the system .
4) IT CAN BE GOOD TO CALL THE CYBER CRIME POLICE.
5) RESET YOUR PASSWORDS.
6) LET YOUR OTHER CONTACTS KNOW ABOUT THE HACK.
7) MAKE SURE YOU WERE HACKED.
8) FORENSIC RECOVERY.
24. Anonymous Originated In 2003 On The Imageboard 4chan, Representing The
Concept Of Many Online And Offline Community Users Simultaneously Existing
As An Anarchic, Digitized Global Brain.
Anonymous Is A Lossely Associated Hacking Organization. It Was Formed On
“4chan” To Represent The Idea Of Many Online And Offline Community Users.
Anonymous Strongly Opposes Internet Censorship And Surveillance, And Have
Shutdown Multiple Government Website.
Their Member Can Be Recognized Ny Their “Guy Fawkes“ Mask In Public.
Anonymous is the first internet-based super-consciousness. Anonymous is a
group, in the sense that a flock of birds is a group.
Dozens of people have been arrested for involvement in Anonymous cyber
attacks, in countries including the US, UK, Australia, the Netherlands, Spain,
and Turkey.
Supporters have called the group "freedom fighters” and digital Robin Hoods
while critics have described them as "a cyber lynch-mob "or “ cyber terrorists".
In 2012, Time called Anonymous one of the "100 most influential people" in
the world.
25. THIS HACKING PROJECT IS DONE BY = MUBEEN MOMIN,SWAPNIL
LAVAHARE,PRATAMESH KHEDEKAR,PRIYANKA MALI,SUYASH BHADEKAR.