SlideShare ist ein Scribd-Unternehmen logo
1 von 29
1. Hacking
2. History Of Hacking
3. Types of Hacking
4. the Most World’s famous Hackers
5. Types Of Hackers
6. Scope Of Ethical Hackers
7. Cyber Laws for Hacking and their Punishments in Pakistan
8. How to Prevent Hacking
In 1878, just two years after the telephone was
invented by Alexander Graham Bell, a group of
teenage boys hired to run the switchboards.
The boys were more interested in knowing how the
phone system worked than in making proper
connections and directing calls to the correct place.
In essence, they were trying to "hack" the system to
see how it worked.
In the late 1950s and early 1960s, computers were
much different than the desktop or laptop systems
most people are familiar with Hacking.
1. 1960 The term “hacker” is used by MIT train
enthusiasts who hacked their train sets to change
how they work.
2. 1968 Dennis Ritchie and Keith Thompson develop
the UNIX operating system.
3. 1970s John Draper makes a long-distance call for
free by blowing a precise tone into a telephone that
tells the phone system to open a line.
4. Early 1980s the term carding has been used to
describe the practices surrounding credit card fraud.
5. ARPANET adopted TCP/IP on January 1, 1983,
and from there researchers began to assemble the
“network of networks” that became the modern
Internet.
6. 1987: Herbert Zinn, a 17-year-old high-school
student. He breaking into AT&T's computer network
after bragging about it on an electronic bulletin board.
7. 1988: Robert Morris, a 22-year-old graduate student
from Cornell University releases a self-replicating
virus on the Internet designed to exploit security holes
in UNIX systems. The virus eventually infects more
than 6,000 systems.
8. 1990: Four members of a band of hackers from the
Southeastern United States stealing the technical
specifications for BellSouth's 911 emergency telephone
network. they hack of lifting login accounts,
passwords and connect addresses for its computer
networks.
Definition:
Hacking is an attempt to exploit a
computer system or a private network
inside a computer. Simply put, it is
the unauthorized access to or control
over computer network security
systems for some illicit purpose.
A vulnerability scanner is a computer program designed to
assess computers, computer systems, networks or
applications for known weaknesses. In plain words, these
scanners are used to discover the weak points or poorly
constructed parts.
This allows the vulnerability scanner to access details of the
host operating system. It’s then able to provide detailed and
accurate information about the operating system and installed
software.
This allows the vulnerability scanner to access low-level data,
such as specific services and configuration details.
It is unable to provide detailed information about the assets
operating system and installed software.
1.Vulnerability
scanner:
i. Authenticated
Scans
ii. Unauthenticated
Scans
Password cracking is the process of recovering passwords
from data that have been stored in or transmitted by a
computer system.
A hacker uses a computer program or script to try to log in with
possible password combinations, usually starting with the
easiest-to-guess passwords.
A hacker uses a program or script to try to login by cycling
through combinations of common words. Generally, dictionary
attacks succeed because many people have a tendency to choose
passwords which are short.
2.Password
cracking:
i. Brute-force
cracking
ii. Dictionary
attacks
Definition:
A set of software tools that enable an unauthorized user to
gain control of a computer system without being detected.
I. Rootkit installation can be automated, or an attacker can
install it once they've obtained root or Administrator access.
II. Full control over a system means that existing software can
be Modified, Deleted, Copied and Blocked.
III. Rootkit detection is difficult.
IV. Removal can be complicated or practically impossible.
V. When dealing with firmware rootkits, removal may require
hardware replacement, or specialized equipment.
4.Root kit:
Definition:
A program designed to breach the security of a computer
system while performing any pre defined function.
It is a virus which is inserted into a Computer or Network to take
effect after a particular time or certain number of operations.
Trojan Horse can:
I. Delete Data
II. Block Data
III. Modify Data
5.Trojan Horse
Edward Joseph Snowden
is an American computer
professional, former Central
Intelligence Agency
employee, and former
contractor for the United
States government who
copied and leaked classified
information.
Julian Paul Assange is
an Australian computer
programmer and the
founder of WikiLeaks
an organization which
he founded in 2006. He
has won accolades
including the Sam
Adams Award.
Kevin David Mitnick is
an American computer
security consultant,
author and hacker, best
known for his high-profile
and for various computer
and communications-
related crimes
Albert Gonzalez
is an American computer
hacker and computer
criminal who is accused of
masterminding the combined
credit card theft and
subsequent reselling of more
than 170 million card and
ATM numbers.
1. Black Hat Hacker
2. Grey Hat Hacker
3. White Hat Hacker
Whenever we hear a word “Hacker”, by default we get a negative impact in our minds.
Today there will be a great Demand of ethical Hackers For internet Security purpose.
Criminal hacking is a great problem in the world.
Only Ethical hackers engage criminal hackers and fight against them to protect a internet
world.
If you are Interested in Ethical hacking for success in this field you must become a IT Security
Expert through formal or informal method.
Ethical Hacking is a complex, technical and difficult field .But
in Pakistan different Organization have need of Ethical
Hackers.
Macro IT companies.
Banks.
Financial Institutions etc.
Law enforcement Agencies also hire IT experts.
Last Five years Internet world spend 50 billions dollars for
improvement of security.
Salary
Noor Aziz Uddin
1. UPDATE OS FREQUENTLY:
Update your OS and other software frequently, if not automatically.
This keeps hackers from accessing your computer through
vulnerabilities in outdated programs.
2. DO NOT USE OPEN WIFI
Do not use open wifi; it makes it too easy for hackers to steal your
connection and download illegal files. Protect your wifi with an
encrypted password.
3. CHANGE PASSWORD FREQUENTLY:
Sensing a pattern here? Create difficult passwords and change them
frequently. In addition, never use the same passwords across multiple
services.
4. Check before you download:
Before downloading apps onto your phone or software on your
computer do some research - check what it's asking for access to (look
for apps permissions in Settings).
5. Use anti-virus software:
If you use a Windows computer you should protect it using anti-virus
software, such as AVG or Sophos.
6. Keep it private
Check the privacy settings on all of your social media accounts so that
only the people you want to share your information with can see it.
7. Beware of public mobile charging points:
It's possible to hack into a smartphone that is charging via
USB in a public place, such as an airport, cafe or on public
transport. To avoid being a victim, only plug your phone into
trusted computers when using a USB cable.
8. Be suspicious of your messages:
Never open or forward a suspicious looking email or respond
to a social media message from someone you don't know.
9. Log off, log out:
Always make sure you log out of your accounts when you’ve
finished with them and log off a computer when you’ve
finished using it.
10. Use encrypted messaging apps:
End-to-end encrypted messaging apps such as WhatsApp, iMessage
and Telegram protect your privacy by masking the contents of your
messages from would-be eavesdroppers.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Hacking
HackingHacking
Hacking
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 

Ähnlich wie Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for Hacking

Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 

Ähnlich wie Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for Hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Hacking
HackingHacking
Hacking
 
455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hamza
HamzaHamza
Hamza
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Internet security
Internet securityInternet security
Internet security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 

Kürzlich hochgeladen

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for Hacking

  • 1. 1. Hacking 2. History Of Hacking 3. Types of Hacking 4. the Most World’s famous Hackers 5. Types Of Hackers 6. Scope Of Ethical Hackers 7. Cyber Laws for Hacking and their Punishments in Pakistan 8. How to Prevent Hacking
  • 2. In 1878, just two years after the telephone was invented by Alexander Graham Bell, a group of teenage boys hired to run the switchboards. The boys were more interested in knowing how the phone system worked than in making proper connections and directing calls to the correct place. In essence, they were trying to "hack" the system to see how it worked. In the late 1950s and early 1960s, computers were much different than the desktop or laptop systems most people are familiar with Hacking.
  • 3. 1. 1960 The term “hacker” is used by MIT train enthusiasts who hacked their train sets to change how they work. 2. 1968 Dennis Ritchie and Keith Thompson develop the UNIX operating system. 3. 1970s John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line.
  • 4. 4. Early 1980s the term carding has been used to describe the practices surrounding credit card fraud. 5. ARPANET adopted TCP/IP on January 1, 1983, and from there researchers began to assemble the “network of networks” that became the modern Internet. 6. 1987: Herbert Zinn, a 17-year-old high-school student. He breaking into AT&T's computer network after bragging about it on an electronic bulletin board.
  • 5. 7. 1988: Robert Morris, a 22-year-old graduate student from Cornell University releases a self-replicating virus on the Internet designed to exploit security holes in UNIX systems. The virus eventually infects more than 6,000 systems. 8. 1990: Four members of a band of hackers from the Southeastern United States stealing the technical specifications for BellSouth's 911 emergency telephone network. they hack of lifting login accounts, passwords and connect addresses for its computer networks.
  • 6.
  • 7. Definition: Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorized access to or control over computer network security systems for some illicit purpose.
  • 8.
  • 9. A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for known weaknesses. In plain words, these scanners are used to discover the weak points or poorly constructed parts. This allows the vulnerability scanner to access details of the host operating system. It’s then able to provide detailed and accurate information about the operating system and installed software. This allows the vulnerability scanner to access low-level data, such as specific services and configuration details. It is unable to provide detailed information about the assets operating system and installed software. 1.Vulnerability scanner: i. Authenticated Scans ii. Unauthenticated Scans
  • 10. Password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A hacker uses a computer program or script to try to log in with possible password combinations, usually starting with the easiest-to-guess passwords. A hacker uses a program or script to try to login by cycling through combinations of common words. Generally, dictionary attacks succeed because many people have a tendency to choose passwords which are short. 2.Password cracking: i. Brute-force cracking ii. Dictionary attacks
  • 11. Definition: A set of software tools that enable an unauthorized user to gain control of a computer system without being detected. I. Rootkit installation can be automated, or an attacker can install it once they've obtained root or Administrator access. II. Full control over a system means that existing software can be Modified, Deleted, Copied and Blocked. III. Rootkit detection is difficult. IV. Removal can be complicated or practically impossible. V. When dealing with firmware rootkits, removal may require hardware replacement, or specialized equipment. 4.Root kit:
  • 12. Definition: A program designed to breach the security of a computer system while performing any pre defined function. It is a virus which is inserted into a Computer or Network to take effect after a particular time or certain number of operations. Trojan Horse can: I. Delete Data II. Block Data III. Modify Data 5.Trojan Horse
  • 13. Edward Joseph Snowden is an American computer professional, former Central Intelligence Agency employee, and former contractor for the United States government who copied and leaked classified information. Julian Paul Assange is an Australian computer programmer and the founder of WikiLeaks an organization which he founded in 2006. He has won accolades including the Sam Adams Award. Kevin David Mitnick is an American computer security consultant, author and hacker, best known for his high-profile and for various computer and communications- related crimes Albert Gonzalez is an American computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers.
  • 14. 1. Black Hat Hacker 2. Grey Hat Hacker 3. White Hat Hacker
  • 15.
  • 16.
  • 17.
  • 18. Whenever we hear a word “Hacker”, by default we get a negative impact in our minds. Today there will be a great Demand of ethical Hackers For internet Security purpose. Criminal hacking is a great problem in the world. Only Ethical hackers engage criminal hackers and fight against them to protect a internet world. If you are Interested in Ethical hacking for success in this field you must become a IT Security Expert through formal or informal method.
  • 19. Ethical Hacking is a complex, technical and difficult field .But in Pakistan different Organization have need of Ethical Hackers. Macro IT companies. Banks. Financial Institutions etc. Law enforcement Agencies also hire IT experts. Last Five years Internet world spend 50 billions dollars for improvement of security.
  • 21.
  • 22.
  • 23.
  • 25.
  • 26. 1. UPDATE OS FREQUENTLY: Update your OS and other software frequently, if not automatically. This keeps hackers from accessing your computer through vulnerabilities in outdated programs. 2. DO NOT USE OPEN WIFI Do not use open wifi; it makes it too easy for hackers to steal your connection and download illegal files. Protect your wifi with an encrypted password. 3. CHANGE PASSWORD FREQUENTLY: Sensing a pattern here? Create difficult passwords and change them frequently. In addition, never use the same passwords across multiple services.
  • 27. 4. Check before you download: Before downloading apps onto your phone or software on your computer do some research - check what it's asking for access to (look for apps permissions in Settings). 5. Use anti-virus software: If you use a Windows computer you should protect it using anti-virus software, such as AVG or Sophos. 6. Keep it private Check the privacy settings on all of your social media accounts so that only the people you want to share your information with can see it.
  • 28. 7. Beware of public mobile charging points: It's possible to hack into a smartphone that is charging via USB in a public place, such as an airport, cafe or on public transport. To avoid being a victim, only plug your phone into trusted computers when using a USB cable. 8. Be suspicious of your messages: Never open or forward a suspicious looking email or respond to a social media message from someone you don't know.
  • 29. 9. Log off, log out: Always make sure you log out of your accounts when you’ve finished with them and log off a computer when you’ve finished using it. 10. Use encrypted messaging apps: End-to-end encrypted messaging apps such as WhatsApp, iMessage and Telegram protect your privacy by masking the contents of your messages from would-be eavesdroppers.