SlideShare ist ein Scribd-Unternehmen logo
1 von 28
HACKING
CONTENT
• Hacking
• History of Hacking
• Types of Hacking
• Hackers
• Types of Hackers
• Famous Hacker
• Service of Ethical Hacking
• Disadvantages of Hacking
• Need of Hacking
• Cyber law for Hacking
• Scope of Ethical Hacking
WHAT IS HACKING?
• Hacking is an attempt to exploit a computer system or
a private network inside a computer. Simply put, it is
the unauthorised access to or control over computer
network security systems for some illicit purpose. To
better describe hacking, one needs to first understand
hackers. One can easily assume them to be intelligent
and highly skilled in computers.
HISTORY OF HACKING
• When hacking first started it was not thought of as that serious. The
hackers were not even known as hackers but as practical jokers. The
very first hack came in 1878 when the phone company, Bell Telephone,
was started. A group of teenage boys, hired to run the switchboards,
would disconnect or misdirect calls.
The first authentic computer hackers came in the 1960s. During those
times, computers were mainframes, locked away in temperature
controlled, glassed in areas. It cost a lot of money to run these
machines, so programmers had limited access to them.
HISTORY OF HACKING
• The smarter students, usually MIT students, had an insatiable
curiosity about how things worked. So, the smartest ones created
what they called "hacks", programming shortcuts, to complete
computing tasks more quickly. In some cases the shortcuts were better
than the original program. One of the hacks that was created in the
60s, 1969 to be exact, was created to act as an open set of rules to run
machines on the computer frontier. It was created by two employees
from the Bell Lab's think tank. The two employees were Dennis
Ritchie and Ken Thompson and the "hack" was called UNIX.
TYPES OF HACKING
• Ethical Hacking
• Back Door Hacking
• Website Hacking
• Network Hacking
• Password Hacking
ETHICAL HACKING
• Ethical hacking, also known as penetration testing or pen testing, is legally
breaking into computers and devices to test an organization's defenses. It's
among the most exciting IT jobs any person can be involved in. You are
literally getting paid to keep up with the latest technology and get to break
into computers without the threat of being arrested.
• Companies engage ethical hackers to identify vulnerabilities in their
systems. From the penetration tester's point of view, there is no downside: If
you hack in past the current defenses, you’ve given the client a chance to
close the hole before an attacker discovers it. If you don’t find anything, your
client is even happier because they now get to declare their systems “secure
enough that even paid hackers couldn’t break into it.”
BACKDOOR HACKING
• In the world of cybersecurity, a backdoor refers to any method by
which authorized and unauthorized users are able to get around
normal security measures and gain high level user access (aka root
access) on a computer system, network, or software application. Once
they're in, cybercriminals can use a backdoor to steal personal and
financial data, install additional malware, and hijack devices.
• A well-known backdoor example is called FinSpy. When installed on a
system, it enables the attacker to download and execute files remotely
on the system the moment it connects to the internet, irrespective of
the system's physical location. It compromises overall system security.
WEBSITE HACKING
• Hacking a website is nothing but getting the password to add, edit,
delete data stored in that website. After the attack done by a hacker, if
he has changed the password of that website software, then it will be
tough for the Webmaster to get it back. Hacker will insert harmful
programs by inserting malicious codes into the website. It will also
cause to the website server to be slow.
• In the past years, even Amazon and Yahoo had been attacked by the
hacker experts, but it would not affect much to them. In the last year
we had seen that, the world wide hackers are tried their level best to
make fear on the famous companies like PayPal and Facebook.
NETWORK HACKING
• Networking Hacking is an offensive branch of computer security
related to networks hacking and the penetration of a target via the
networking services or equipment.
• Network Hacking is generally means gathering information about
domain by using tools like Telnet , Nslookup , Ping, Tracert , Netstat ,
etc.
• It also includes OS Fingerprinting, Port Scanning and Port Surfing
using various tools.
PASSWORD HACKING
• Password hacking, sometimes referred to as password cracking, is a
method of recovering passwords from data transmitted by or stored on
a computer.
• A password can be a secret word, phrase or string of characters used
to gain access to secured data. An individual with no knowledge of a
password may still determine it through password hacking.
• Conversely, a dictionary attack allows hackers to employ a program
which cycles through common words. A brute force attack goes letter
by letter, whereas a dictionary attack only tries possibilities most
likely to succeed. ... For example, users tend to pick
short passwords and base their passwords off common words.
HACKER
• A computer hacker is a computer expert who uses their technical
knowledge to achieve a goal or overcome an obstacle, within a
computerized system by non-standard means.
• Though the term "hacker" has become associated in popular
culture with a "security hacker" – someone who utilizes their technical
know-how of bugs or exploits to break into computer systems and
access data which would otherwise be unavailable to them – hacking
can also be utilized by legitimate figures in legal situations. For
example, law enforcement agencies sometimes use hacking techniques
in order to collect evidence on criminals and other malicious actors.
TYPES OF HACKERS
 Black Hat Hackers
 White Hat Hackers
 Grey Hat Hackers
BLACK HAT HACKER
• The term “black hat” originated from Western movies, where the bad
guys wore black hats and the good guys wore white hats.
• A black-hat hacker is an individual who attempts to gain
unauthorized entry into a system or network to exploit them for
malicious reasons. The black-hat hacker does not have any permission
or authority to compromise their targets. They try to inflict damage by
compromising security systems, altering functions of websites and
networks, or shutting down systems. They often do so to steal or gain
access to passwords, financial information, and other personal data.
WHITE HAT HACKER
• White-hat hackers, on the other hand, are deemed to be the good guys,
working with organizations to strengthen the security of a system. A
white hat has permission to engage the targets and to compromise
them within the prescribed rules of engagement.
• White-hat hackers are often referred to as ethical hackers. This
individual specializes in ethical hacking tools, techniques, and
methodologies to secure an organization’s information systems.
• Unlike black-hat hackers, ethical hackers exploit security networks
and look for backdoors when they are legally permitted to do so.
White-hat hackers always disclose every vulnerability they find in the
company’s security system so that it can be fixed before they are being
exploited by malicious actors.Some Fortune 50 companies like
Facebook, Microsoft, and Google also use white-hat hackers.
GREY HAT HACKER
• Grey hats exploit networks and computer systems in the way that
black hats do, but do so without any malicious intent, disclosing all
loopholes and vulnerabilities to law enforcement agencies or
intelligence agencies.
• Usually, grey-hat hackers surf the net and hack into computer
systems to notify the administrator or the owner that their
system/network contains one or more vulnerabilities that must be
fixed immediately. Grey hats may also extort the hacked, offering to
correct the defect for a nominal fee.
WORLD BEST HACKER
• Kevin Mitnick is the world's authority on hacking, social engineering,
and security awareness training. In fact, the world's most used
computer-based end-user security awareness training suite bears his
name. Kevin's keynote presentations are one part magic show, one
part education, and all parts entertaining.
• Hacked into 40 major corporations, landing him on the FBI’s Most
Wanted list
• CEO and chief "white hat" hacker at one of the most advanced
boutique security firms in the world
• His Global Ghost Team has a 100 percent success rate hacking into
security systems.
SERVICE OF ETHICAL HACKING
• Wireless Security
• Application Security
• Network Security
WIRELESS SECURITY
These services provide and assess the level of security in the existing
infrastructure and network to provide instructions promising system
accessibility and uphold its integrity at the same time. Wireless security
works in three steps, which are:
• Identify vulnerabilities
• Adopt security measures
• Deploy the threats
APPLICATION SECURITY
• Application security is the process of making apps more secure by
finding, fixing, and enhancing the security of apps. Much of this
happens during the development phase, but it includes tools and
methods to protect apps once they are deployed.
• This is used for digging deep into and processing the cruciality and
range of challenges faces by the thick client (Java) and the thin client
(web browsers). Application security comprises of services like client-
side testing and web application testing.
NETWORK SECURITY
• Network security is a broad term that covers a multitude of
technologies, devices and processes. In its simplest term, it is a set of
rules and configurations designed to protect the integrity,
confidentiality and accessibility of computer networks and data using
both software and hardware technologies.
It lends information on the networks, services, system devices, and
their agreements. It also examines and surveys the applications of the
voice over Internet convention within the organization
environment. Network security’s main objective is to facilitate the
presentation of the political repercussions on its own development.
WHY DO WE NEED ETHICAL HACKING?
• Ethical Hacking comes handy in corporate sectors and organizations,
to fight against unlawful practices of breaching systems and to take
precautionary actions on hackers.
• Dangerous software like Trojan horses, viruses and spam email causes
disruption and disturbance in the system and storage space. Ethical
hacking provides useful here as it helps to uncover these virus attacks
against systems and in addition, lends high-level security.
• The main objective of ethical hacking is to promise safety in wireless
infrastructure which constitutes most of the current business
companies’ aims.
DISADVANTAGES OF HACKING
• Massive security breach.
• Unauthorized system access on private information.
• Privacy violation.
• Hampering system operation.
• Denial of service attacks.
• Malicious attack on the system.
NEED OF ETHICAL HACKING?
• Ethical hacking follows the guidelines of safe hacking for the efficient
working of the system. This is a complex procedure hence an ethical
hacker requires great skills in comparison to penetration testing.
• Ethical hacking has the privilege of gathering access to a company’s
network and information system. This automatically provides security
to intellectual attacks and threats like viruses. Ethical hacking, as a
result, ends up also testing the security levels of the programs and
software.
CYBER LAW IN INDIA FOR HACKING
• Chapter XI Section 66 of IT Act, 2000 particularly deals with the act
of hacking. Section 66(1) defines a hack as, any person, dishonestly or
fraudulently, does any act referred to in Section 43 is called
hacking, and Section 66(2) prescribes the punishment for it. Hacking
is a punishable offense in India with imprisonment up to 3 years, or
with fine up to two lakh rupees, or with both.
• Chapter IX Section 43 of IT act, 2000 prescribes a penalty for the
damage to computer or computer system. It is a common thing which
happens whenever a computer system is hacked. Black hats damage
the system that they hack and steal the information. This
enumerative provision includes a lot of activities.
CYBER LAW IN INDIA FOR HACKING
• Chapter XI Section 65 of the said act makes tampering with computer
source documents an offense. Section 72 of the same chapter makes
the breach of confidentiality and privacy, a punishable offense. This is
the most common aftermath of hacking.
• The Information and Technology Act, 2000 (IT Act) covers all types
of cyber crime committed in the country
including hacking. Hacking earlier used to refer to a crime under
section 43 of the IT Act but at the same time, ethical hacking or better
known as white collar hacking was considered legal.
SCOPE FOR ETHICAL HACKING
• Ethical hacking is generally used as penetration testing to detect
vulnerabilities, risk and identify the loopholes in a security system
and to take corrective measures against those attacks.
• Ethical hacking is a key component of risk evaluation, auditing, and
counter-frauds. The scope for the Ethical Hackers is high and it is one
of the rapidly growing careers at present as many malicious attackers
cause a threat to the business and its networks. Industries like
Information Technology and Banking Sectors hire several Ethical
hackers to protect their data and infrastructure. Also, in the upcoming
days, the demand for this profile is going to be high compared to other
profiles due to an increased threat of vulnerabilities.

Weitere ähnliche Inhalte

Was ist angesagt?

Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportRaghav Bisht
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...Quinnipiac University
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 

Was ist angesagt? (20)

Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Ähnlich wie Hacking

Ähnlich wie Hacking (20)

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
HACKING
HACKINGHACKING
HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 

Kürzlich hochgeladen

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 

Kürzlich hochgeladen (20)

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 

Hacking

  • 2. CONTENT • Hacking • History of Hacking • Types of Hacking • Hackers • Types of Hackers • Famous Hacker • Service of Ethical Hacking • Disadvantages of Hacking • Need of Hacking • Cyber law for Hacking • Scope of Ethical Hacking
  • 3. WHAT IS HACKING? • Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose. To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers.
  • 4. HISTORY OF HACKING • When hacking first started it was not thought of as that serious. The hackers were not even known as hackers but as practical jokers. The very first hack came in 1878 when the phone company, Bell Telephone, was started. A group of teenage boys, hired to run the switchboards, would disconnect or misdirect calls. The first authentic computer hackers came in the 1960s. During those times, computers were mainframes, locked away in temperature controlled, glassed in areas. It cost a lot of money to run these machines, so programmers had limited access to them.
  • 5. HISTORY OF HACKING • The smarter students, usually MIT students, had an insatiable curiosity about how things worked. So, the smartest ones created what they called "hacks", programming shortcuts, to complete computing tasks more quickly. In some cases the shortcuts were better than the original program. One of the hacks that was created in the 60s, 1969 to be exact, was created to act as an open set of rules to run machines on the computer frontier. It was created by two employees from the Bell Lab's think tank. The two employees were Dennis Ritchie and Ken Thompson and the "hack" was called UNIX.
  • 6. TYPES OF HACKING • Ethical Hacking • Back Door Hacking • Website Hacking • Network Hacking • Password Hacking
  • 7. ETHICAL HACKING • Ethical hacking, also known as penetration testing or pen testing, is legally breaking into computers and devices to test an organization's defenses. It's among the most exciting IT jobs any person can be involved in. You are literally getting paid to keep up with the latest technology and get to break into computers without the threat of being arrested. • Companies engage ethical hackers to identify vulnerabilities in their systems. From the penetration tester's point of view, there is no downside: If you hack in past the current defenses, you’ve given the client a chance to close the hole before an attacker discovers it. If you don’t find anything, your client is even happier because they now get to declare their systems “secure enough that even paid hackers couldn’t break into it.”
  • 8. BACKDOOR HACKING • In the world of cybersecurity, a backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application. Once they're in, cybercriminals can use a backdoor to steal personal and financial data, install additional malware, and hijack devices. • A well-known backdoor example is called FinSpy. When installed on a system, it enables the attacker to download and execute files remotely on the system the moment it connects to the internet, irrespective of the system's physical location. It compromises overall system security.
  • 9. WEBSITE HACKING • Hacking a website is nothing but getting the password to add, edit, delete data stored in that website. After the attack done by a hacker, if he has changed the password of that website software, then it will be tough for the Webmaster to get it back. Hacker will insert harmful programs by inserting malicious codes into the website. It will also cause to the website server to be slow. • In the past years, even Amazon and Yahoo had been attacked by the hacker experts, but it would not affect much to them. In the last year we had seen that, the world wide hackers are tried their level best to make fear on the famous companies like PayPal and Facebook.
  • 10. NETWORK HACKING • Networking Hacking is an offensive branch of computer security related to networks hacking and the penetration of a target via the networking services or equipment. • Network Hacking is generally means gathering information about domain by using tools like Telnet , Nslookup , Ping, Tracert , Netstat , etc. • It also includes OS Fingerprinting, Port Scanning and Port Surfing using various tools.
  • 11. PASSWORD HACKING • Password hacking, sometimes referred to as password cracking, is a method of recovering passwords from data transmitted by or stored on a computer. • A password can be a secret word, phrase or string of characters used to gain access to secured data. An individual with no knowledge of a password may still determine it through password hacking. • Conversely, a dictionary attack allows hackers to employ a program which cycles through common words. A brute force attack goes letter by letter, whereas a dictionary attack only tries possibilities most likely to succeed. ... For example, users tend to pick short passwords and base their passwords off common words.
  • 12. HACKER • A computer hacker is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. • Though the term "hacker" has become associated in popular culture with a "security hacker" – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be unavailable to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors.
  • 13.
  • 14. TYPES OF HACKERS  Black Hat Hackers  White Hat Hackers  Grey Hat Hackers
  • 15. BLACK HAT HACKER • The term “black hat” originated from Western movies, where the bad guys wore black hats and the good guys wore white hats. • A black-hat hacker is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. The black-hat hacker does not have any permission or authority to compromise their targets. They try to inflict damage by compromising security systems, altering functions of websites and networks, or shutting down systems. They often do so to steal or gain access to passwords, financial information, and other personal data.
  • 16. WHITE HAT HACKER • White-hat hackers, on the other hand, are deemed to be the good guys, working with organizations to strengthen the security of a system. A white hat has permission to engage the targets and to compromise them within the prescribed rules of engagement. • White-hat hackers are often referred to as ethical hackers. This individual specializes in ethical hacking tools, techniques, and methodologies to secure an organization’s information systems. • Unlike black-hat hackers, ethical hackers exploit security networks and look for backdoors when they are legally permitted to do so. White-hat hackers always disclose every vulnerability they find in the company’s security system so that it can be fixed before they are being exploited by malicious actors.Some Fortune 50 companies like Facebook, Microsoft, and Google also use white-hat hackers.
  • 17. GREY HAT HACKER • Grey hats exploit networks and computer systems in the way that black hats do, but do so without any malicious intent, disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies. • Usually, grey-hat hackers surf the net and hack into computer systems to notify the administrator or the owner that their system/network contains one or more vulnerabilities that must be fixed immediately. Grey hats may also extort the hacked, offering to correct the defect for a nominal fee.
  • 18. WORLD BEST HACKER • Kevin Mitnick is the world's authority on hacking, social engineering, and security awareness training. In fact, the world's most used computer-based end-user security awareness training suite bears his name. Kevin's keynote presentations are one part magic show, one part education, and all parts entertaining. • Hacked into 40 major corporations, landing him on the FBI’s Most Wanted list • CEO and chief "white hat" hacker at one of the most advanced boutique security firms in the world • His Global Ghost Team has a 100 percent success rate hacking into security systems.
  • 19. SERVICE OF ETHICAL HACKING • Wireless Security • Application Security • Network Security
  • 20. WIRELESS SECURITY These services provide and assess the level of security in the existing infrastructure and network to provide instructions promising system accessibility and uphold its integrity at the same time. Wireless security works in three steps, which are: • Identify vulnerabilities • Adopt security measures • Deploy the threats
  • 21. APPLICATION SECURITY • Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed. • This is used for digging deep into and processing the cruciality and range of challenges faces by the thick client (Java) and the thin client (web browsers). Application security comprises of services like client- side testing and web application testing.
  • 22. NETWORK SECURITY • Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. It lends information on the networks, services, system devices, and their agreements. It also examines and surveys the applications of the voice over Internet convention within the organization environment. Network security’s main objective is to facilitate the presentation of the political repercussions on its own development.
  • 23. WHY DO WE NEED ETHICAL HACKING? • Ethical Hacking comes handy in corporate sectors and organizations, to fight against unlawful practices of breaching systems and to take precautionary actions on hackers. • Dangerous software like Trojan horses, viruses and spam email causes disruption and disturbance in the system and storage space. Ethical hacking provides useful here as it helps to uncover these virus attacks against systems and in addition, lends high-level security. • The main objective of ethical hacking is to promise safety in wireless infrastructure which constitutes most of the current business companies’ aims.
  • 24. DISADVANTAGES OF HACKING • Massive security breach. • Unauthorized system access on private information. • Privacy violation. • Hampering system operation. • Denial of service attacks. • Malicious attack on the system.
  • 25. NEED OF ETHICAL HACKING? • Ethical hacking follows the guidelines of safe hacking for the efficient working of the system. This is a complex procedure hence an ethical hacker requires great skills in comparison to penetration testing. • Ethical hacking has the privilege of gathering access to a company’s network and information system. This automatically provides security to intellectual attacks and threats like viruses. Ethical hacking, as a result, ends up also testing the security levels of the programs and software.
  • 26. CYBER LAW IN INDIA FOR HACKING • Chapter XI Section 66 of IT Act, 2000 particularly deals with the act of hacking. Section 66(1) defines a hack as, any person, dishonestly or fraudulently, does any act referred to in Section 43 is called hacking, and Section 66(2) prescribes the punishment for it. Hacking is a punishable offense in India with imprisonment up to 3 years, or with fine up to two lakh rupees, or with both. • Chapter IX Section 43 of IT act, 2000 prescribes a penalty for the damage to computer or computer system. It is a common thing which happens whenever a computer system is hacked. Black hats damage the system that they hack and steal the information. This enumerative provision includes a lot of activities.
  • 27. CYBER LAW IN INDIA FOR HACKING • Chapter XI Section 65 of the said act makes tampering with computer source documents an offense. Section 72 of the same chapter makes the breach of confidentiality and privacy, a punishable offense. This is the most common aftermath of hacking. • The Information and Technology Act, 2000 (IT Act) covers all types of cyber crime committed in the country including hacking. Hacking earlier used to refer to a crime under section 43 of the IT Act but at the same time, ethical hacking or better known as white collar hacking was considered legal.
  • 28. SCOPE FOR ETHICAL HACKING • Ethical hacking is generally used as penetration testing to detect vulnerabilities, risk and identify the loopholes in a security system and to take corrective measures against those attacks. • Ethical hacking is a key component of risk evaluation, auditing, and counter-frauds. The scope for the Ethical Hackers is high and it is one of the rapidly growing careers at present as many malicious attackers cause a threat to the business and its networks. Industries like Information Technology and Banking Sectors hire several Ethical hackers to protect their data and infrastructure. Also, in the upcoming days, the demand for this profile is going to be high compared to other profiles due to an increased threat of vulnerabilities.