SlideShare ist ein Scribd-Unternehmen logo
1 von 23
A Presentation on
Hacking

Group Name:- G3
Group Members :-

Ravikant Verma
Rahul Sisodiya
Sanjay Kumar
Jugendra Singh
Hacking
Authorized or unauthorized
attempts to bypass the security
mechanisms of an information
system or network.
Types of Hacking
•Website Hacking.
•E-mail Hacking.
•Network Hacking.
•Password Hacking.
•Online Banking Hacking.
•Computer Hacking.
Website Hacking..
E-mail Hacking…
Network Hacking...
Password Hacking..
Online Banking Hacking..
Computer Hacking..
Who is a “HACKER” ?
Someone who bypasses the
system‟s access controls by taking
advantage of security weaknesses
left in the system by developers.
Types of Hackers
White-Hat Hackers
The good guys who identify the
security weakness of the system or
network and inform the owner about
them.
Black Hat Hackers
A black hat is the villain or bad guy,
who crash into victim‟s security to
steal information and destroy the
victims security network.
Also known as „cracker‟.
Grey Hat Hackers
A grey hat, in the hacking
community, refers to a skilled
hacker who is somewhere in
between white and black hat
hackers.
Why do people hack ?
•To make security stronger ( Ethical
Hacking ).
•Just for fun.
•Show off.
•Hack other systems secretly.
•Notify many people their thought.
•For money purpose.
Random Fact !!!!
The average age group of hackers
are aged between 14-24 yrs. …
Did you know ?
Social networking sites like
„FACEBOOK‟,‟GMAIL‟,‟YAHOO”
comprised of 60% of direct or
indirect hacking incidents.
Popular Hacked sites
www.jntu.ac.in was hacked on 7 Nov
2010.
www.songs.pk was hacked on 15 July
2011.

Songs.pk

JNTUhomepage after it was hcked
Preventive measures
•Install a strong anti-virus.
•Always run a anti-virus check before
you download a program or a file
from the internet.
•Avoid disclosing personal details like
phone number, credit card details
to strangers.
Any Queries ??

Weitere ähnliche Inhalte

Was ist angesagt?

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
djkhatri
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
Aitezaz Mohsin
 

Was ist angesagt? (19)

Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 
Hackers final
Hackers finalHackers final
Hackers final
 
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And Hackers
 
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threats
 
Hackers
HackersHackers
Hackers
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
Final ethical hacking
Final ethical hackingFinal ethical hacking
Final ethical hacking
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Hacking
HackingHacking
Hacking
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Andere mochten auch (6)

Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
 
Datateknik
DatateknikDatateknik
Datateknik
 
Hacking the Public Presentation
Hacking the Public PresentationHacking the Public Presentation
Hacking the Public Presentation
 
Martie star wars birthday
Martie star wars birthdayMartie star wars birthday
Martie star wars birthday
 
Outlook configuration in Microsoft Office
Outlook configuration in Microsoft OfficeOutlook configuration in Microsoft Office
Outlook configuration in Microsoft Office
 
Dhtic expo
Dhtic expoDhtic expo
Dhtic expo
 

Ähnlich wie Hacking

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
djkhatri
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
Alefya1
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
talhaabid
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
Cikgu Syam
 

Ähnlich wie Hacking (20)

hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Hacking
HackingHacking
Hacking
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
HACKING
HACKINGHACKING
HACKING
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Hacking-coffee and latte
Hacking-coffee and latteHacking-coffee and latte
Hacking-coffee and latte
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking
HackingHacking
Hacking
 

Mehr von Rahul Baghla (10)

Holography
HolographyHolography
Holography
 
Sensor technology
Sensor technologySensor technology
Sensor technology
 
Lifi technology
Lifi technologyLifi technology
Lifi technology
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Computer virus
Computer virusComputer virus
Computer virus
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Hacking