Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

Hacking Presentation

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Nächste SlideShare
my new HACKING
my new HACKING
Wird geladen in …3
×

Hier ansehen

1 von 10 Anzeige

Hacking Presentation

Herunterladen, um offline zu lesen

Hi , This is the simple presentation about Hacking! with cool stylish pictures and quotes Hope u like it! Please support me. Thank you.

Hi , This is the simple presentation about Hacking! with cool stylish pictures and quotes Hope u like it! Please support me. Thank you.

Anzeige
Anzeige

Weitere Verwandte Inhalte

Ähnlich wie Hacking Presentation (20)

Aktuellste (20)

Anzeige

Hacking Presentation

  1. 1. ->HACK<- By MIDHUN
  2. 2. HACKING! Hacking is the gaining of access(wanted or unwanted) to a computer and viewing, copying, or creating data without the intention of destroying data or maliciously harming the computer.
  3. 3. METHODS OF HACKING hackers intention to stole critical information of users like account passwords, MasterCard detail, etc PHISHING Hackers will get your credentials through a follow known as key-logging. CRACK PASSWORD Code injection is the exploitation of a computer bug that is caused by processing invalid data MALWARE INJECTING Distributed Denial-of-Service is aimed toward taking down a website or wifi so that it cannot accesed by user. DDoS ATTACK Hackers access the website exploitation malicious codes and steal cookies that contain tips, login passwords, etc. COOKIE THEFT Social engineering is an attempt to share personal info, sometimes by impersonating a trustworthy supply. SOCIAL ENGINEERING AND MORE…
  4. 4. HACKER 💻  A hacker is any person engaged in hacking.  A hacker is someone who seeks and exploits weakness in a computer system or computer network.
  5. 5. TYPES OF HACKERS fun hacker, cybersecurity expert who hack into network & systems, but without malicious intent. GREY HAT Criminal hackers, who breaks into computer systems malicious or criminal intent. BLACK HAT Government Heired hacker, with specific focus on finding and disarming black hat hackers. RED HAT Authorized hackers, cybersecurity experts who use their skills to find vulnerabilities in networks,system. WHITE HAT AND MORE…
  6. 6. ETHICAL HACKING  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration testing which is focused on securing and protecting IT systems.  Perform all the same activities done by black hat hacker but with the owner’s permission.
  7. 7. CRACKING  Hacking with Malicious intention is CRACKING  Cracking is Crime.  Cyber crime are the result of cracking, not hacking
  8. 8. PREVENT HACKING IMPLEMENT FIREWALL BE AWARE OF PHISHING KEEP OS UP TO DATE INSTALL ANTI-VIRUS VULNERABILITY TEST DON’T RUN UNNESSERY NETWORK SERVICES DON’T ACCESS PRESONAL DATA IN PUBLIC WIFI TURN OFF ANYTHING YOU DON’T NEED
  9. 9. LEARN Best Operating System: Kali Linux, Parrot OS, Backbox, Fedora etc. Learn Hacking, not to hack others, To secure yourselffrom Hackers…! Tools: Nmap, Metaspoit, Ngrok, Social Engineering Tool-kit(SET) etc.
  10. 10. THANKS!

×