3. Introduction
What is HacKING?
• The Process of attempting to gain or successfully gaining,
unauthorized access to computer resources for the purpose
of help or secure system is called Hacking.
• Hacking is technique in which, any one can access any
one’s computer without his permission.
• Hacker is not a cyber criminal but he is the very intelligent
person who is use his knowledge in constructive manner to
secure system & never damage data.
• A Hacker knows all about the operating system and
different holes in the system.
4. Types Of Hacking
These are the Types of Hacking
Website Hacking
Email Hacking
Network Hacking
Password Hacking
Online Banking Hacking
Computer Hacking
Ethical Hacking
5. Website Hacking
• Hacking a website means taking control from the
website owner to a person who hacks the website.
• The hacker will get the username and password and
the hacker will use that website for any purpose
which may sometimes to destroy some valuable
information database.
Click here for Phishing Process
6. Email Hacking
• Email hacking is illicit access to
an email account or email correspondence.
• Ways of Email Hacking
• Personal Information Social Hacking
• Phishing/ Hacking Software Trojan Virus etc.
• Email may be protected by methods such as
a strong password, encryption of the contents
or a digital signature. An email disclaimer may
be used to warn unauthorized readers but these
are thought to be ineffective
7. Network Hacking
Network Hacking is generally means gathering
information about domain by using tools like Telnet,
NslookUP, Ping, Tracert, Netstat, etc… over the
network.
It is also include OS Fingerprinting, Port Scanning,
Port Surfing using various Tools.
These are the three most common methods of hacking
a wireless network:
• Sniffing
• Spoofing
• Encryption Cracking
8. Password Hacking
Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted by a
computer system. A common approach is to repeatedly try
guesses for the password.
Most passwords can be cracked by using following techniques:
• Hashing
• Guessing
• Default Passwords
• Brute Force
• Phishing
9. Online banking Hacking
Unauthorized accessing bank accounts without knowing the
password or without permission of account holder is known as
Online banking hacking.
A bank account can be accessed in many ways. When someone
gets access to your account, that person can take all your funds
without your knowledge.
Here are five simple tips that will help Protect Your Online
Accounts:
• Use Strong Password
• Protect your Computer
• Keep an eye on running processes
• Download with care
• Be careful when using unprotected public networks
11. Computer Hacking
• Computer Hacking is when files on your
computer are viewed, created, or edited
without your authorization.
• People can gain complete access to your
computer from any where in the world if
your computer is turned on, unprotected,
and has an internet connection. What they
do, is up to them.
• Remote desktop connection technique.
12. Ethical Hacker
An ethical hacker is a computer and
network expert who attacks a security
system on behalf of its owners,
seeking vulnerabilities that a
malicious hacker could exploit.
To test a security system, ethical
hackers use the same methods as their
less principled counterparts, but
report problems instead of taking
advantage of them. Ethical hacking is
also known as penetration
testing, intrusion testing and red
teaming. An ethical hacker is
sometimes called a white hat.
13. Ethical Hacker
What do ethical hackers do?
An ethical hacker’s evaluation of a system security seeks
answers to these basic questions:
What can an intruder see on that target system?
What are you trying to protect?
What can an intruder do with that information?
14. Conclusion
Proper ethical hackers should be employed.
Do not expose your passwords to untrusted sites.
Practice using exact web address.
Close your internet while not in use.