Hacking

Ranjan Som
Ranjan SomChairman um SOM Industries
Let’s go in…
Som Ranjan



HaCKinG
A technological threat
Introduction
What is HacKING?

• The Process of attempting to gain or successfully gaining,
  unauthorized access to computer resources for the purpose
  of help or secure system is called Hacking.
• Hacking is technique in which, any one can access any
  one’s computer without his permission.
• Hacker is not a cyber criminal but he is the very intelligent
  person who is use his knowledge in constructive manner to
  secure system & never damage data.
• A Hacker knows all about the operating system and
  different holes in the system.
Types Of Hacking
 These are the Types of Hacking
 Website Hacking
 Email Hacking
 Network Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking

 Ethical Hacking
Website Hacking
• Hacking a website means taking control from the
  website owner to a person who hacks the website.
• The hacker will get the username and password and
  the hacker will use that website for any purpose
  which may sometimes to destroy some valuable
  information database.




                                Click here for Phishing Process
Email Hacking
• Email hacking is illicit access to
  an email account or email correspondence.
• Ways of Email Hacking
• Personal Information           Social Hacking
• Phishing/ Hacking Software     Trojan Virus etc.
• Email may be protected by methods such as
  a strong password, encryption of the contents
  or a digital signature. An email disclaimer may
  be used to warn unauthorized readers but these
  are thought to be ineffective
Network Hacking

 Network Hacking is generally means gathering
 information about domain by using tools like Telnet,
 NslookUP, Ping, Tracert, Netstat, etc… over the
 network.
 It is also include OS Fingerprinting, Port Scanning,
 Port Surfing using various Tools.
 These are the three most common methods of hacking
 a wireless network:
 • Sniffing
 • Spoofing
 • Encryption Cracking
Password Hacking
Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted by a
computer system. A common approach is to repeatedly try
guesses for the password.
Most passwords can be cracked by using following techniques:

                             • Hashing
                             • Guessing
                             • Default Passwords
                             • Brute Force
                             • Phishing
Online banking Hacking
Unauthorized accessing bank accounts without knowing the
password or without permission of account holder is known as
Online banking hacking.
A bank account can be accessed in many ways. When someone
gets access to your account, that person can take all your funds
without your knowledge.
Here are five simple tips that will help Protect Your Online
Accounts:
• Use Strong Password
• Protect your Computer
• Keep an eye on running processes
• Download with care
• Be careful when using unprotected public networks
Online banking Hacking
 Default Connection




                      Connection Hacked By Hacker
Computer Hacking
• Computer Hacking is when files on your
  computer are viewed, created, or edited
  without your authorization.
• People can gain complete access to your
  computer from any where in the world if
  your computer is turned on, unprotected,
  and has an internet connection. What they
  do, is up to them.
• Remote desktop connection technique.
Ethical Hacker
An ethical hacker is a computer and
network expert who attacks a security
system on behalf of its owners,
seeking    vulnerabilities    that   a
malicious hacker could exploit.
To test a security system, ethical
hackers use the same methods as their
less principled counterparts, but
report problems instead of taking
advantage of them. Ethical hacking is
also     known     as      penetration
testing, intrusion testing and red
teaming. An ethical hacker is
sometimes called a white hat.
Ethical Hacker
What do ethical hackers do?
An ethical hacker’s evaluation of a system security seeks
answers to these basic questions:
                 What can an intruder see on that target system?


                 What are you trying to protect?


                 What can an intruder do with that information?
Conclusion

Proper ethical hackers should be employed.

Do not expose your passwords to untrusted sites.

Practice using exact web address.

Close your internet while not in use.
Prepared By: Somaranjan
Roll No.: 3212
B Com Professioanl
1 von 15

Recomendados

HACKING von
HACKINGHACKING
HACKINGShubham Agrawal
1.2K views17 Folien
Hacking von
HackingHacking
HackingSharique Masood
8.2K views33 Folien
presentation on hacking von
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
54.8K views19 Folien
Hacking & its types von
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
296.8K views32 Folien
hacking von
hackinghacking
hackingmayank1293
3.9K views23 Folien
Internet security von
Internet securityInternet security
Internet securityMohamed El-malki
44.4K views20 Folien

Más contenido relacionado

Was ist angesagt?

cyber crime von
cyber crimecyber crime
cyber crimeSaba MuShtaq
2.3K views12 Folien
Cyber crime ppt von
Cyber crime pptCyber crime ppt
Cyber crime pptRitesh Thakur
1.4K views18 Folien
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ... von
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
4.3K views29 Folien
Cyber crime ✔ von
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
2.4K views29 Folien
HACKING von
HACKINGHACKING
HACKINGUpendraSingamsetty
178 views16 Folien
Haking PPT von
Haking PPTHaking PPT
Haking PPTSushil Ranjan
2.4K views18 Folien

Was ist angesagt?(20)

Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ... von Qazi Anwar
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar4.3K views
Cyber crime ✔ von hubbysoni
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni2.4K views
Cybercrime presentation von Rajat Jain
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain146.3K views
Cyber crime and its types von DINESH KAMBLE
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE2.1K views
Cyber crimes and their prevention von Ansar Gill
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
Ansar Gill5.8K views
Social engineering attacks von Ramiro Cid
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid5.9K views
Identity Theft Presentation von charlesgarrett
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett17.3K views
presentation on cyber crime and security von Alisha Korpal
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal35.4K views

Similar a Hacking

Hacking von
HackingHacking
Hackingj naga sai
1.2K views18 Folien
Hacking and Online Security von
Hacking and Online SecurityHacking and Online Security
Hacking and Online SecurityJeanie Arnoco
764 views16 Folien
Hacking von
HackingHacking
HackingRaghu engineering college
478 views18 Folien
Hacking von
HackingHacking
Hackingvkradhika
4.1K views31 Folien
Ethical Hacking von
Ethical HackingEthical Hacking
Ethical HackingRohit Trimukhe
131 views24 Folien

Similar a Hacking(20)

Hacking and Online Security von Jeanie Arnoco
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
Jeanie Arnoco764 views
Hacking von vkradhika
HackingHacking
Hacking
vkradhika4.1K views
Information security Presentation von dhirujapla
Information security Presentation  Information security Presentation
Information security Presentation
dhirujapla635 views
Information & cyber security, Winter training ,bsnl. online von SumanPramanik7
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
SumanPramanik7114 views
Hacking- Ethical/ Non-ethical, Cyber Security. von JasminJaman1
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
JasminJaman1192 views
Cyber Crime And Security von ritik shukla
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla5K views
Introduction to ethical hacking von ankit sarode
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode2.1K views
Cyber crime & security von Avani Patel
Cyber crime & securityCyber crime & security
Cyber crime & security
Avani Patel5.8K views

Último

Retail Store Scavenger Hunt.pptx von
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptxjmurphy154
52 views10 Folien
DISTILLATION.pptx von
DISTILLATION.pptxDISTILLATION.pptx
DISTILLATION.pptxAnupkumar Sharma
65 views47 Folien
ANGULARJS.pdf von
ANGULARJS.pdfANGULARJS.pdf
ANGULARJS.pdfArthyR3
51 views10 Folien
Thanksgiving!.pdf von
Thanksgiving!.pdfThanksgiving!.pdf
Thanksgiving!.pdfEnglishCEIPdeSigeiro
500 views17 Folien
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023 von
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023A Guide to Applying for the Wells Mountain Initiative Scholarship 2023
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023Excellence Foundation for South Sudan
82 views26 Folien
STRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdf von
STRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdfSTRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdf
STRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdfDr Vijay Vishwakarma
130 views68 Folien

Último(20)

Retail Store Scavenger Hunt.pptx von jmurphy154
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptx
jmurphy15452 views
ANGULARJS.pdf von ArthyR3
ANGULARJS.pdfANGULARJS.pdf
ANGULARJS.pdf
ArthyR351 views
JQUERY.pdf von ArthyR3
JQUERY.pdfJQUERY.pdf
JQUERY.pdf
ArthyR3105 views
Class 9 lesson plans von TARIQ KHAN
Class 9 lesson plansClass 9 lesson plans
Class 9 lesson plans
TARIQ KHAN82 views
Six Sigma Concept by Sahil Srivastava.pptx von Sahil Srivastava
Six Sigma Concept by Sahil Srivastava.pptxSix Sigma Concept by Sahil Srivastava.pptx
Six Sigma Concept by Sahil Srivastava.pptx
Sahil Srivastava44 views
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice von Taste
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a ChoiceCreative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Taste45 views
Career Building in AI - Technologies, Trends and Opportunities von WebStackAcademy
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and Opportunities
WebStackAcademy45 views
Guess Papers ADC 1, Karachi University von Khalid Aziz
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi University
Khalid Aziz99 views
Education of marginalized and socially disadvantages segments.pptx von GarimaBhati5
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptx
GarimaBhati543 views
CUNY IT Picciano.pptx von apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano64 views

Hacking

  • 3. Introduction What is HacKING? • The Process of attempting to gain or successfully gaining, unauthorized access to computer resources for the purpose of help or secure system is called Hacking. • Hacking is technique in which, any one can access any one’s computer without his permission. • Hacker is not a cyber criminal but he is the very intelligent person who is use his knowledge in constructive manner to secure system & never damage data. • A Hacker knows all about the operating system and different holes in the system.
  • 4. Types Of Hacking These are the Types of Hacking Website Hacking Email Hacking Network Hacking Password Hacking Online Banking Hacking Computer Hacking Ethical Hacking
  • 5. Website Hacking • Hacking a website means taking control from the website owner to a person who hacks the website. • The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information database. Click here for Phishing Process
  • 6. Email Hacking • Email hacking is illicit access to an email account or email correspondence. • Ways of Email Hacking • Personal Information Social Hacking • Phishing/ Hacking Software Trojan Virus etc. • Email may be protected by methods such as a strong password, encryption of the contents or a digital signature. An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective
  • 7. Network Hacking Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network. It is also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools. These are the three most common methods of hacking a wireless network: • Sniffing • Spoofing • Encryption Cracking
  • 8. Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Most passwords can be cracked by using following techniques: • Hashing • Guessing • Default Passwords • Brute Force • Phishing
  • 9. Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking. A bank account can be accessed in many ways. When someone gets access to your account, that person can take all your funds without your knowledge. Here are five simple tips that will help Protect Your Online Accounts: • Use Strong Password • Protect your Computer • Keep an eye on running processes • Download with care • Be careful when using unprotected public networks
  • 10. Online banking Hacking Default Connection Connection Hacked By Hacker
  • 11. Computer Hacking • Computer Hacking is when files on your computer are viewed, created, or edited without your authorization. • People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them. • Remote desktop connection technique.
  • 12. Ethical Hacker An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing and red teaming. An ethical hacker is sometimes called a white hat.
  • 13. Ethical Hacker What do ethical hackers do? An ethical hacker’s evaluation of a system security seeks answers to these basic questions:  What can an intruder see on that target system?  What are you trying to protect?  What can an intruder do with that information?
  • 14. Conclusion Proper ethical hackers should be employed. Do not expose your passwords to untrusted sites. Practice using exact web address. Close your internet while not in use.
  • 15. Prepared By: Somaranjan Roll No.: 3212 B Com Professioanl