2. CONTENT
OVERVIEW
HACKING
HISTORY
HACKING PROCESS
TECHNIQUES AND
TOOLS
ADVANTAGES AND
DISADVANTAGES
REFERENCE
TYPES OF HACKER
PRECAUTIONS
SOME FAMOUS
HACKER
3. Overview
Hacker
• The person who hacks. A hacker is a person intensely
interested in the arcane and recondite workings of any
computer operating system. Hackers are most often
programmers.
Cracker
• System intruder/ destroyer
4. History Of Hacking
The first hacker was appeared in 1960’s at the
Massachusetts Institute Of Technology(MIT)
During the 1970’s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
5. In the 1980’s, phreaks started to migrate to
computers, and the first Bulletin Board System (BBS)
appeared
During the 1990’s, when the use of internet
widespread around the world, hackers multiplied.
6. Hacking
Hacker
• Access computer system or network without
authorization
• Breaks the law
Ethical Hacker
• Performs most of the same activities but with owner’s
permission
• Employed by companies to perform Penetration Tests
9. A black hat hacker is a hacker who "violates computer
security for little reason beyond maliciousness or for
personal gain.
They Work for black money(Like:- Bank Websites ,
credit card websites)
They use their knowledge for illegal purposes.
10.
11. White hat hackers are like Ethical Hackers .
They use their skills for good purposes.
They work for organizations for stop the illegal
activities through black hat hackers.
12.
13. Grey Hat hackers have both qualities like
black hat hackers and white hat hackers .
They use their knowledge for bad purposes
and good purposes too.
14.
15. Script kiddies hacks into computer or
websites using the tools available on
the internet .
They don’t have knowledge of
programming .
16.
17.
18.
19.
20.
21. Advantages
Provides security to banking and financial
establishments
To catch a thief you have to think like a thief.
Disadvantages
All depends upon the trustworthiness of the
ethical hacker
Hiring professionals is expensive.
22. Encrypt important data
Ex:- pgp, ssh
Remove unused program
Backup the system often
Setup firewall
Setup IDS
Ex) snort
23. Shutdown the system
Or turn off the system
Restore the system with the backup
Or reinstall all programs
Disconnect the system to the network
24. Some Famous Hacker
Ian Murphy Kevin Mitnick Johan Helsinguis
Linus Torvald Mark Abene Robert Morris