SlideShare a Scribd company logo
1 of 36
HACKING
GROUP MEMBERS
 Dianna Marie B. Manalo
 Apol Magbuhos
Lenie Aniel
 Deborah Anna Perez
 Kim Ralph Perez
 Glenn Perez
 Marco Paolo Aclan
 Neil Ian Bagsic
Christian Recto
Overview
Is hacking a crime?
What is Hacking?
History of Hacking
Types of Hacking
Types of Hacker
Skill levels of Hacking
Common Hacking Approach
Why do people hack?
Ethical Hacking
Some Famous Hacker
Is Hacking a crime?
Is hacking a crime??
NO NO NO..
NOT AT ALL…….
Hacking is NOT a
CRIME
What is Hacking?
Process of attempting to gain or
sucessfully gaining,unauthorized
acess to computer resources for the
purpose of help to a secure system.
A technique in which any one can
access any one's computer without
his permission.
History of Hacking
The first hacker appeared
in 1960's at the
Massachusetts Institute Of
Technology(MIT)
During the 1970's, a
different kind of hacker
appeared: Phone Phreaker
or Phone Hacker
 In the 1980’s, phreaks started to migrate to computers,
and the first Bulletin Board System (BBS) appeared
 During the 1990’s, when the use of internet
widespread around the world, hackers multiplied
Types of Hacking
Website Hacking
Email Hacking
Network Hacking
Password Hacking
Online Banking Hacking
Computer Hacking
Website Hacking
hacking a website means taking control
from the website owner to a person who
hacks the website
The hacker will get the username and
password and the hacker will use that
website for any purpose which may
sometimes to destroy some valuable
information or even reputation.
Email Hacking
Email Hacking is taking access to an
email account or email correspondence
Email may be protected by methods such
as a strong password, encryption of the
contents or a digital signatture. An email
disclaimer may be used to warn an
authorized readers but these are thought
to be ineffective
Network Hacking
generally means gathering information
about domain by using tools like Telnet,
NslookUp,Ping,Tracent,etc... over the
network
3 common methods of hacking a wireless
network
Sniffing
Spoofing
Encryption Cracking
Password Hacking
the process of recovering secret password
from data that has been stored in or
transmitted by a computer system.
Techniques
Rat and Keyloggers
Guessing
Social Engineering
Brute Force
Phishing
Rainbow Table
Password Hacking(cont.)
 Rat and Keyloggers
 In keylogging or RATing the
hacker sends keylogger or
rat to the victim. This allows
hacker to monitor every
thing victim do on his
computer. Every keystroke
is logged including
passwords. Moreever
hacker can even control the
victims computer.
Password Hacking(cont.)
 Guessing
This seems silly but this
can easily help you to get
someones password
within seconds. If hacker
knows you, he can use
information he knows
about you to guess your
password. Hacker can
also use combination of
Social Engineering and
Guessing to acquire your
password
Password Hacking(cont.)
Social Engineering
Social engineering is process of manipulating
someone to trust you and get information from
them. For example, if the hacker was trying to
get the password of a co-workers or friends
computer, he could call him pretending to be
from the IT department and simply ask for his
login details. Sometime hackers call the victim
pretending to be from bank and ask for their
credit cards details. Social Engineering can
be used to get someone password, to get
bank credentials or any personal information.
Password Hacking(cont.)
 Brute Force
Any password can be
cracked using Brute-force
attack. Brute-force attacks
try every possible
combinations of numbers,
letters and special
characters until the right
password is match. Brute-
force attacks can take very
long time depending upon
the complexity of the
password. The cracking
time is determined by the
speed of computer and
complexity of the
password.
Password Hacking(cont.)
 Phishing
Phishing is the most
easiest and popular
hacking method used
by hackers to get
someone account
details. In Phishing
attack hacker send
fake page of real
website like facebook,
gmail to victim. When
someone login through
that fake page his
details is send to the
hacker. This fake
pages can be easily
created and hosted on
free web-hosting sites.
Password Hacking(cont.)
 Rainbow Table
A Rainbow table is a huge pre-computed list of
hashes for every possible combination of characters.
A password hash is a password that has gone
through a mathematical algorithm such as md5 and is
transformed into something which is not recognizable.
A hash is a one way encryption so once a password
is hashed there is no way to get the original string
from the hashed string. A very commonly used
hashing algorithm to store passwords in website
databases is MD5. It is almost similar to dictionary
attack, the only difference is, in rainbow tables attack
hashed characters are used as passwords whereas in
dictionary attack normal characters are used as
passwords.
Online Banking Hacking
Unauthorized accessing bank accounts
without knowing the password or without
permission of account holder
A bank account can be access in many
ways. When someone gts access to your
account that person can take all your
funds without your knowledge
Online Banking Hacking(cont.)
Here are 5 siple tips that will help to protect
your Online Account
Use Strong Account
Protect your Computer
 Keep an eye on running process
 Download with care
 Be careful whenusing unprotected public
networks
Computer Hacking
Computer Hacking is when files on your
computer are viewed, created or edited
without you authorization
 People can gain complete access to your
computer from anywhere in the world if
your computer is turned on,unprotected
and has an internet connection. What they
do, is up to them.
Hacker is a word that has two
meanings:
 Traditionally, a Hacker is
the very inteligent person who is using
his knowledge in constructive
manner to secure system and
never damage data
....Recently,
 Hacker has taken on a new
meaning — someone who
maliciously breaks into systems for
personal gain. Technically, these
criminals & are known as Crackers.
Types of Hacker
White Hat Hackers
• Good guys
• Don’t use their skill for
illegal purpose
• Computer security
experts and help to
protect from Black Hats.
Black Hat Hackers
Bad Guys
Use their skill
maliciously for personal
gain
Hack banks, steal credit
cards and defaces
websites
Types of Hacker (cont.)
Types of Hacker (cont.)
 Grey Hat
Hackers
It is a
combination a
of white hat
hackers and
Black Hat
Hackers
Types of Hackers (cont.)
NEOPHYTE (NEWBIE, NOOB)
Someone who's new in hacking/ phreaking
 HACKTIVIST
 uses technology to publicize a social
ideological message
EX:Cyber Terrorist, Freedom of Information
COMMON HACKING APPROACH
SYSTEM ENUMERATION
DISCOVERING INFORMATION ABOUT THE
TARGET
VULNERABILITY ANALYSIS
IDENTIFYING POTENTIAL WAYS TO
ATTACK
EXPLOITATION- COMPROMISING THE
SYSTEM BY EMPLOYING THE
VULNERABILITIES FOUND
SKILL LEVELS OF HACKING
• ELLITE HACKERS- HIGHEST LEVEL
• TECHNICIAN CLASS - "TOOL
DEPENDENT"
• SCRYPT SKIDDIES- LOWEST LEVEL
HACKERS
WHY DO PEOPLE HACK?
• TO ACQUIRE DATA
• TO IMPERSONATE
• TO DESTROY DATA
• JUST FOR FUN ^_^
What is Ethical Hacking??
Ethical Hacking is
testing the resources for
a good cause and for the
betterment of technology.
Technically Ethical Hacking
means penetration
testing which is focused on
Securing and Protecting IT
Systems.
Some Famous Hacker
 Kevin Mitnick
At age 15, he used social
engineering and dumpster
diving to bypass the punch
card system used in the
Los Angeles bus system.
Social engineering
became his primary
method of obtaining
information, including user-
names and passwords and
modem phone numbers
he was the most-wanted
computer criminal in the
United States.
Some Famous Hacker(cont.)
 Johan Helsinguis
 born in 1961 in Helsinki, Finland,
started and ran the Anon.penet.fi
internet remailer.
 Anon.penet.fi was one of the most
popular Internet remailers,
handling 10,000 messages a day.
The server was the first of its kind
to use a password-protected PO
box system for sending and
receiving e-mails. In the 1980s, he
was the system administrator for
the central Finnish news node as
well as one of the founding
members of the Finnish UNIX User
Group.
Some Famous Hacker(cont.)
 Linus Torvalds
 a Finnish American software
engineer, he was the principal force
behind the development of the
Linux kernel that became the most
popular kernel for operating
systems.
 He later became the chief architect
of the Linux kernel and now acts as
the project's coordinator.
 He also created the revision
control system Git as well as the
diving log software Subsurface. He
was honored, along with Shinya
Yamanaka, with the 2012
Millennium Technology Prize by the
Technology Academy Finland "in
recognition of his creation of a new
open source operating system for
computers leading to the widely
used Linux kernel".
Some Famous Hacker(cont.)
 Mark Abene
 Mark Abene was one of the
most notorious phone hackers.
His hacker handle was Phiber
Optik. His preferred hacking
activity was breaking into
telephone systems using a
normal phone receiver.
 Mark was a member of the
Legion of Doom hacker group,
and then founded the hacker
group Masters of Deception
(MOD). When the AT&T
telephone system crashed in
1990, he was blamed and raided
by the Secret Service, but the
crash later turned out be caused
by a computer bug.
Some Famous Hacker(cont.)
 Robbert Morris
 He is best known for creating the
Morris Worm in 1988, considered
the first computer worm on the
Internet, and for companies he has
founded.
 Morris was prosecuted for
releasing the worm, and became
the first person convicted under
the new Computer Fraud and
Abuse Act.
 He went on to co-found the online
store Viaweb, one of the first web-
based applications
 He later joined the faculty in the
department of Electrical
Engineering and Computer
Science at the Massachusetts
Institute of Technology, where he
received tenure in 2006.

More Related Content

What's hot (19)

Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hacking
HackingHacking
Hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Hacking
Hacking Hacking
Hacking
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
H A C K I N Gjk,K
H A C K I N Gjk,KH A C K I N Gjk,K
H A C K I N Gjk,K
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 

Viewers also liked

Perfomance Appraisal
Perfomance AppraisalPerfomance Appraisal
Perfomance AppraisalThelma Dhlovu
 
Personal Personification Project
Personal Personification ProjectPersonal Personification Project
Personal Personification ProjectHolly Ogg
 
Mantri energia
Mantri energiaMantri energia
Mantri energiatcpro
 
Politicalparties 150305105626-conversion-gate01
Politicalparties 150305105626-conversion-gate01Politicalparties 150305105626-conversion-gate01
Politicalparties 150305105626-conversion-gate01Laura Firmani
 
Early Civilizations in the East
Early Civilizations in the EastEarly Civilizations in the East
Early Civilizations in the EastLaura Firmani
 
THE RESUME OF MD.KHAIRUL
THE RESUME OF MD.KHAIRULTHE RESUME OF MD.KHAIRUL
THE RESUME OF MD.KHAIRULkhairul alam
 
Bourdon tube and manometer
Bourdon tube and manometerBourdon tube and manometer
Bourdon tube and manometerbuttex
 

Viewers also liked (10)

Peintures sur mains-4
Peintures sur mains-4Peintures sur mains-4
Peintures sur mains-4
 
Perfomance Appraisal
Perfomance AppraisalPerfomance Appraisal
Perfomance Appraisal
 
Soal programing
Soal programingSoal programing
Soal programing
 
Personal Personification Project
Personal Personification ProjectPersonal Personification Project
Personal Personification Project
 
Mantri energia
Mantri energiaMantri energia
Mantri energia
 
Politicalparties 150305105626-conversion-gate01
Politicalparties 150305105626-conversion-gate01Politicalparties 150305105626-conversion-gate01
Politicalparties 150305105626-conversion-gate01
 
Early Civilizations in the East
Early Civilizations in the EastEarly Civilizations in the East
Early Civilizations in the East
 
THE RESUME OF MD.KHAIRUL
THE RESUME OF MD.KHAIRULTHE RESUME OF MD.KHAIRUL
THE RESUME OF MD.KHAIRUL
 
Renaissance 3
Renaissance 3Renaissance 3
Renaissance 3
 
Bourdon tube and manometer
Bourdon tube and manometerBourdon tube and manometer
Bourdon tube and manometer
 

Similar to Hacking (20)

Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
hacking
hackinghacking
hacking
 

Recently uploaded

Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 

Recently uploaded (20)

Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 

Hacking

  • 2. GROUP MEMBERS  Dianna Marie B. Manalo  Apol Magbuhos Lenie Aniel  Deborah Anna Perez  Kim Ralph Perez  Glenn Perez  Marco Paolo Aclan  Neil Ian Bagsic Christian Recto
  • 3. Overview Is hacking a crime? What is Hacking? History of Hacking Types of Hacking Types of Hacker Skill levels of Hacking Common Hacking Approach Why do people hack? Ethical Hacking Some Famous Hacker
  • 4. Is Hacking a crime?
  • 5. Is hacking a crime?? NO NO NO.. NOT AT ALL……. Hacking is NOT a CRIME
  • 6. What is Hacking? Process of attempting to gain or sucessfully gaining,unauthorized acess to computer resources for the purpose of help to a secure system. A technique in which any one can access any one's computer without his permission.
  • 7. History of Hacking The first hacker appeared in 1960's at the Massachusetts Institute Of Technology(MIT) During the 1970's, a different kind of hacker appeared: Phone Phreaker or Phone Hacker
  • 8.  In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared  During the 1990’s, when the use of internet widespread around the world, hackers multiplied
  • 9. Types of Hacking Website Hacking Email Hacking Network Hacking Password Hacking Online Banking Hacking Computer Hacking
  • 10. Website Hacking hacking a website means taking control from the website owner to a person who hacks the website The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information or even reputation.
  • 11. Email Hacking Email Hacking is taking access to an email account or email correspondence Email may be protected by methods such as a strong password, encryption of the contents or a digital signatture. An email disclaimer may be used to warn an authorized readers but these are thought to be ineffective
  • 12. Network Hacking generally means gathering information about domain by using tools like Telnet, NslookUp,Ping,Tracent,etc... over the network 3 common methods of hacking a wireless network Sniffing Spoofing Encryption Cracking
  • 13. Password Hacking the process of recovering secret password from data that has been stored in or transmitted by a computer system. Techniques Rat and Keyloggers Guessing Social Engineering Brute Force Phishing Rainbow Table
  • 14. Password Hacking(cont.)  Rat and Keyloggers  In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.
  • 15. Password Hacking(cont.)  Guessing This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess your password. Hacker can also use combination of Social Engineering and Guessing to acquire your password
  • 16. Password Hacking(cont.) Social Engineering Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.
  • 17. Password Hacking(cont.)  Brute Force Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute- force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.
  • 18. Password Hacking(cont.)  Phishing Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.
  • 19. Password Hacking(cont.)  Rainbow Table A Rainbow table is a huge pre-computed list of hashes for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm such as md5 and is transformed into something which is not recognizable. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. A very commonly used hashing algorithm to store passwords in website databases is MD5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords.
  • 20. Online Banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder A bank account can be access in many ways. When someone gts access to your account that person can take all your funds without your knowledge
  • 21. Online Banking Hacking(cont.) Here are 5 siple tips that will help to protect your Online Account Use Strong Account Protect your Computer  Keep an eye on running process  Download with care  Be careful whenusing unprotected public networks
  • 22. Computer Hacking Computer Hacking is when files on your computer are viewed, created or edited without you authorization  People can gain complete access to your computer from anywhere in the world if your computer is turned on,unprotected and has an internet connection. What they do, is up to them.
  • 23. Hacker is a word that has two meanings:  Traditionally, a Hacker is the very inteligent person who is using his knowledge in constructive manner to secure system and never damage data ....Recently,  Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals & are known as Crackers.
  • 24. Types of Hacker White Hat Hackers • Good guys • Don’t use their skill for illegal purpose • Computer security experts and help to protect from Black Hats.
  • 25. Black Hat Hackers Bad Guys Use their skill maliciously for personal gain Hack banks, steal credit cards and defaces websites Types of Hacker (cont.)
  • 26. Types of Hacker (cont.)  Grey Hat Hackers It is a combination a of white hat hackers and Black Hat Hackers
  • 27. Types of Hackers (cont.) NEOPHYTE (NEWBIE, NOOB) Someone who's new in hacking/ phreaking  HACKTIVIST  uses technology to publicize a social ideological message EX:Cyber Terrorist, Freedom of Information
  • 28. COMMON HACKING APPROACH SYSTEM ENUMERATION DISCOVERING INFORMATION ABOUT THE TARGET VULNERABILITY ANALYSIS IDENTIFYING POTENTIAL WAYS TO ATTACK EXPLOITATION- COMPROMISING THE SYSTEM BY EMPLOYING THE VULNERABILITIES FOUND
  • 29. SKILL LEVELS OF HACKING • ELLITE HACKERS- HIGHEST LEVEL • TECHNICIAN CLASS - "TOOL DEPENDENT" • SCRYPT SKIDDIES- LOWEST LEVEL HACKERS
  • 30. WHY DO PEOPLE HACK? • TO ACQUIRE DATA • TO IMPERSONATE • TO DESTROY DATA • JUST FOR FUN ^_^
  • 31. What is Ethical Hacking?? Ethical Hacking is testing the resources for a good cause and for the betterment of technology. Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.
  • 32. Some Famous Hacker  Kevin Mitnick At age 15, he used social engineering and dumpster diving to bypass the punch card system used in the Los Angeles bus system. Social engineering became his primary method of obtaining information, including user- names and passwords and modem phone numbers he was the most-wanted computer criminal in the United States.
  • 33. Some Famous Hacker(cont.)  Johan Helsinguis  born in 1961 in Helsinki, Finland, started and ran the Anon.penet.fi internet remailer.  Anon.penet.fi was one of the most popular Internet remailers, handling 10,000 messages a day. The server was the first of its kind to use a password-protected PO box system for sending and receiving e-mails. In the 1980s, he was the system administrator for the central Finnish news node as well as one of the founding members of the Finnish UNIX User Group.
  • 34. Some Famous Hacker(cont.)  Linus Torvalds  a Finnish American software engineer, he was the principal force behind the development of the Linux kernel that became the most popular kernel for operating systems.  He later became the chief architect of the Linux kernel and now acts as the project's coordinator.  He also created the revision control system Git as well as the diving log software Subsurface. He was honored, along with Shinya Yamanaka, with the 2012 Millennium Technology Prize by the Technology Academy Finland "in recognition of his creation of a new open source operating system for computers leading to the widely used Linux kernel".
  • 35. Some Famous Hacker(cont.)  Mark Abene  Mark Abene was one of the most notorious phone hackers. His hacker handle was Phiber Optik. His preferred hacking activity was breaking into telephone systems using a normal phone receiver.  Mark was a member of the Legion of Doom hacker group, and then founded the hacker group Masters of Deception (MOD). When the AT&T telephone system crashed in 1990, he was blamed and raided by the Secret Service, but the crash later turned out be caused by a computer bug.
  • 36. Some Famous Hacker(cont.)  Robbert Morris  He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet, and for companies he has founded.  Morris was prosecuted for releasing the worm, and became the first person convicted under the new Computer Fraud and Abuse Act.  He went on to co-found the online store Viaweb, one of the first web- based applications  He later joined the faculty in the department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, where he received tenure in 2006.