Hacking

Sharique Masood
Sharique MasoodStudent at Jaipur National University, Jaipur
Hackinghacking defined experts for those who dare
SUBMITTED TO SUBMITTED BY
MR. SUBHASH CHANDRA SHARIQUE MASOOD(5CS63)
Contents
 History of Hacking
 What is Hacking?
 Who is Hacker?
 Famous hackers in history
 Types of hacker
 Why do Hackers hack?
 Types of Hacking
 How to give a password to account
 What should do after hacked
 How to secure our data
 Advantages of Hacking
 Disadvantages of Hacking
 Conclusion
 References
History of Hacking
 Hacking has been a part of computing for 40 years.
 The first computer hacker emerged at MIT.
 Hacking is began in the 1960s at MIT , origin of the term
“hacker”.
 The truth hacker amongst our societies have thirst for the
knowledge .
 Boredom is never an object of challenge for the hacker
What is Hacking ?
 The Process of attempting to gain or successfully
gaining, unauthorized access to computer resources
is called Hacking.
Hacking
Who is a hacker?
 In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
 The term hacker is reclaimed by computer programmers
who argue that someone breaking into computers is better
called a cracker.
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds
Mark Abene Robert Morris
Types of Hacker
 Black hat :
Black-hat hackers, or simply “black hats,” are the type of hacker the popular media seems
to focus on. Black-hat hackers violate computer security for personal gain (such as
stealing credit card numbers or harvesting personal data for sale to identity thieves) or for
pure maliciousness (such as creating a botnet and using that botnet to perform DDOS
attacks against websites they don’t like.)
 White hat:
hackers are the opposite of the black-hat hackers. They’re the “ethical hackers,” experts in
compromising computer security systems who use their abilities for good, ethical, and
legal purposes rather than bad, unethical, and criminal purposes.
 Grey hat:
Very few things in life are clear black-and-white categories. In reality, there’s often a gray
area. A grey-hat hacker falls somewhere between a black hat and a white hat. A gray hat
doesn’t work for their own personal gain or to cause carnage, but they may technically
commit crimes and do arguably unethical things.
Why do hackers hack ?
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network during the war.
Types of Hacking
Website Hacking
Network Hacking
Ethical Hacking
Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
Hacking
Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the
website.
Hacking
Network Hacking
 Network Hacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
Hacking
Ethical Hacking
 Ethical hacking is where a person hacks to find
weaknesses in a system and then usually patches them.
Hacking
Email Hacking
 Email hacking is illicit access to an email account
or email correspondence.
Hacking
Password Hacking
 Password Hacking Password cracking is the process of
recovering secret passwords from data that has been
stored in or transmitted by a computer system.
Hacking
Online Banking Hacking
 Online banking Hacking Unauthorized accessing bank accounts
without knowing the password or without permission of account
holder is known as Online banking hacking.
Hacking
Computer Hacking
 Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.
What should do after hacked?
 Shutdown the system
− Or turn off the system
 Separate the system from network
 Restore the system with the backup
− Or reinstall all programs
 Connect the system to the network
 It can be good to call the police
How to give a password to account
 Use unique passwords for your accounts.
 Choose a combination of letters, numbers, or
symbols to
create a unique password.
How to secure our data
1 -> i or l
3 -> e
4 -> a
+ -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
c -> [
f -> ph
ph -> f
x -> ck
ck -> x
How to secure our data
 Ex.
1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d
4$ 0ur pi4||.
I transferred Rs.100000 to your account, So go ahead as our
plan.
Advantages of hacking
 Can be used to recover lost information where the
computer password has been lost.
 Teaches you that no technology is 100% secure.
 To test how good security is on your own network.
 They call it white hat computer hacking.
Disadvantages of Hacking
Criminals can use it to their advantage.
It can harm someone's privacy
It's Illegal
Conclusion
 Keep your password protected. Write your password should be with
combination of characters, digits, special symbols. Do not respond to
feck on fishing email. when you are doing any online transection always
keep watch on site whether the protocol of site is https & whether there
is a lock symbol .
References
www.wikipedia.org/wiki/Hacker
www.wikipedia.org/wiki/Hacking
Thank You
1 von 33

Recomendados

HACKING von
HACKINGHACKING
HACKINGD's Surti
1.1K views33 Folien
Ethical Hacking von
Ethical HackingEthical Hacking
Ethical HackingTharindu Kalubowila
2.9K views20 Folien
Inetsecurity.in Ethical Hacking presentation von
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
1.4K views35 Folien
Ethical hacking von
Ethical hackingEthical hacking
Ethical hackingMonika Deswal
4.2K views15 Folien
Hacking ppt von
Hacking pptHacking ppt
Hacking pptgiridhar_sadasivuni
153.9K views14 Folien
ETHICAL HACKING PPT von
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPTSweta Leena Panda
91.8K views25 Folien

Más contenido relacionado

Was ist angesagt?

Course on Ehtical Hacking - Introduction von
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
15.6K views149 Folien
Hacking von
HackingHacking
HackingRanjan Som
31.6K views15 Folien
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co... von
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
936 views17 Folien
Ethical hacking von
Ethical hackingEthical hacking
Ethical hackingarohan6
700 views21 Folien
Presentation on ethical hacking von
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
735 views12 Folien
Hacking von
Hacking Hacking
Hacking Farkhanda Kiran
1.3K views29 Folien

Was ist angesagt?(20)

Course on Ehtical Hacking - Introduction von Bharat Thakkar
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar15.6K views
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co... von Edureka!
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Edureka!936 views
Ethical hacking von arohan6
Ethical hackingEthical hacking
Ethical hacking
arohan6700 views
Presentation on ethical hacking von Sunny Sundeep
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
Sunny Sundeep735 views
Hacking and Types of Hacker. von Coder Tech
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
Coder Tech13.6K views
Hacking & its types von Sai Sakoji
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji296.8K views
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ... von Qazi Anwar
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar4.3K views

Similar a Hacking

Hacking and its types von
Hacking and its typesHacking and its types
Hacking and its typeshamza javed
740 views33 Folien
Hacking von
Hacking Hacking
Hacking Nafeesa Naeem
385 views32 Folien
Hacking von
HackingHacking
Hackingakam bajalan
580 views8 Folien
Hacking and its types V2 von
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
277 views24 Folien
Hacking von
HackingHacking
HackingAsma Khan
652 views23 Folien
Ethical hacking Chapter 1 - Overview.pptx von
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
3K views17 Folien

Más de Sharique Masood

Git Quick Start von
Git Quick StartGit Quick Start
Git Quick StartSharique Masood
65 views1 Folie
Concord a social networking website von
Concord a social networking websiteConcord a social networking website
Concord a social networking websiteSharique Masood
49 views28 Folien
Report on Hacking von
Report on HackingReport on Hacking
Report on HackingSharique Masood
4.2K views26 Folien
Crime Record Management System (CRMS) von
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Sharique Masood
1.1K views17 Folien
How the Internet Works von
How the Internet WorksHow the Internet Works
How the Internet WorksSharique Masood
1.2K views21 Folien
Global warming von
Global warmingGlobal warming
Global warmingSharique Masood
106 views8 Folien

Último

The Dark Web : Hidden Services von
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
16 views24 Folien
ATPMOUSE_융합2조.pptx von
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptxkts120898
35 views70 Folien
Affiliate Marketing von
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
18 views30 Folien
hamro digital logics.pptx von
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
10 views36 Folien
How to think like a threat actor for Kubernetes.pptx von
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
7 views33 Folien
Marketing and Community Building in Web3 von
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
15 views64 Folien

Último(6)

The Dark Web : Hidden Services von Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh16 views
ATPMOUSE_융합2조.pptx von kts120898
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptx
kts12089835 views
How to think like a threat actor for Kubernetes.pptx von LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze17 views
Marketing and Community Building in Web3 von Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast15 views

Hacking

  • 1. Hackinghacking defined experts for those who dare SUBMITTED TO SUBMITTED BY MR. SUBHASH CHANDRA SHARIQUE MASOOD(5CS63)
  • 2. Contents  History of Hacking  What is Hacking?  Who is Hacker?  Famous hackers in history  Types of hacker  Why do Hackers hack?  Types of Hacking  How to give a password to account  What should do after hacked  How to secure our data  Advantages of Hacking  Disadvantages of Hacking  Conclusion  References
  • 3. History of Hacking  Hacking has been a part of computing for 40 years.  The first computer hacker emerged at MIT.  Hacking is began in the 1960s at MIT , origin of the term “hacker”.  The truth hacker amongst our societies have thirst for the knowledge .  Boredom is never an object of challenge for the hacker
  • 4. What is Hacking ?  The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking.
  • 6. Who is a hacker?  In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.  The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 7. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds Mark Abene Robert Morris
  • 8. Types of Hacker  Black hat : Black-hat hackers, or simply “black hats,” are the type of hacker the popular media seems to focus on. Black-hat hackers violate computer security for personal gain (such as stealing credit card numbers or harvesting personal data for sale to identity thieves) or for pure maliciousness (such as creating a botnet and using that botnet to perform DDOS attacks against websites they don’t like.)  White hat: hackers are the opposite of the black-hat hackers. They’re the “ethical hackers,” experts in compromising computer security systems who use their abilities for good, ethical, and legal purposes rather than bad, unethical, and criminal purposes.  Grey hat: Very few things in life are clear black-and-white categories. In reality, there’s often a gray area. A grey-hat hacker falls somewhere between a black hat and a white hat. A gray hat doesn’t work for their own personal gain or to cause carnage, but they may technically commit crimes and do arguably unethical things.
  • 9. Why do hackers hack ?  Just for fun.  Show off.  Hack other systems secretly.  Notify many people their thought.  Steal important information.  Destroy enemy’s computer network during the war.
  • 10. Types of Hacking Website Hacking Network Hacking Ethical Hacking Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 12. Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website.
  • 14. Network Hacking  Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  • 16. Ethical Hacking  Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 18. Email Hacking  Email hacking is illicit access to an email account or email correspondence.
  • 20. Password Hacking  Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 22. Online Banking Hacking  Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 24. Computer Hacking  Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 25. What should do after hacked?  Shutdown the system − Or turn off the system  Separate the system from network  Restore the system with the backup − Or reinstall all programs  Connect the system to the network  It can be good to call the police
  • 26. How to give a password to account  Use unique passwords for your accounts.  Choose a combination of letters, numbers, or symbols to create a unique password.
  • 27. How to secure our data 1 -> i or l 3 -> e 4 -> a + -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z c -> [ f -> ph ph -> f x -> ck ck -> x
  • 28. How to secure our data  Ex. 1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur pi4||. I transferred Rs.100000 to your account, So go ahead as our plan.
  • 29. Advantages of hacking  Can be used to recover lost information where the computer password has been lost.  Teaches you that no technology is 100% secure.  To test how good security is on your own network.  They call it white hat computer hacking.
  • 30. Disadvantages of Hacking Criminals can use it to their advantage. It can harm someone's privacy It's Illegal
  • 31. Conclusion  Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .