SlideShare ist ein Scribd-Unternehmen logo
1 von 38
What is 
“HACKING”
Its just breaking the 
computer security system to 
access computer network 
legally or illegally.
Methods of hacking
PHISHING 
BRUTE FORCE POWER ATTACK 
SQL INJECTION 
SOCIAL ENGINEERING 
APPLICATION BASE ATTACK 
MISCONFIGURATION ATTACK
PHISHING 
1
Phishing is the most 
simplest way the hacker 
can access your 
personal Information.
Beware 
• ALWAYS CHECK THE ADDRESS BAR OF 
THE BROWSER AND THEN ENTER THE 
DETAILS.
BRUTE FORCE 
POWER ATTACK 
2
In this process, an 
application is used which 
literally guesses passwords 
and ultimately tries to crack 
the actual password.
3 
SQL INJECTION
It’s the most 
commonest method 
to hack websites..
In order to protect yourselves this 
type of attack, you need to secure 
your website programmatically. 
This technique is also used for 
penetration testing.
SOCIAL 
ENGINEERING 
4
It is mainly used for 
hacking social 
networking sites.
DO NOT EVER SHARE 
ANY INFORMATION 
ABOUT YOUR SOCIAL 
NETWORKING ACCOUNT 
WITH ANYONE.
5 
APPLICATION 
BASE ATTACK
In this method normally an 
application is used for either creating 
a phishing page or a brute force 
power attack. 
In simple words there are 
typically MALWARE.
MISCONFIGURATION 
ATTACK 
6
This usually occurs if you 
have misconfigured your 
system such that the 
valuable information gets 
exposed.
TYPES OF 
HACKERS!!!
WHITE HAT HACKER. 
BLACK HAT HACKER. 
GREY HAT HACKER. 
ELITE HACKER. 
SCRIPT KIDDIE.
They use their skills for good purposes. 
They work for organizations to stop the illegal 
activities through black hat hackers.
A white hat hacker breaks security 
for non-malicious reasons, perhaps 
to test their own security system. 
The term "white hat" in 
Internet slang refers to an Ethical 
Hacker.
A Black Hat 
Hacker is a hacker who violates computer security foR 
little reason beyond maliciousness or for personal 
gain.
BLACK HAT HACKERS ALWAYS DO ILLEGAL WORK. 
THEY ARE PROFESSIONALS IN THEIR FIELDS.
GREY HAT HACKERS HAVE BOTH QUALITIES LIKE BLACK HAT 
HACKERS AND WHITE HAT HACKERS . 
THEY USE THEIR KNOWLEDGE FOR BAD PURPOSES AND GOOD 
PURPOSES TOO.
A SOCIAL STATUS AMONG 
HACKERS, ELITE IS USED TO 
DESCRIBE THE MOST SKILLED. 
NEWLY 
DISCOVERED EXPLOITS CIRCULATE 
AMONG THESE HACKERS. 
ELITE GROUPS SUCH AS MASTERS OF 
DECEPTIONCONFERRED A KIND OF 
CREDIBILITY ON THEIR MEMBERS.
A script kiddie is a non-expert who breaks into computer 
systems by using pre-packaged automated tools written by 
others, hence the term script kiddie (i.e. kid, child—an 
individual lacking knowledge and experience, immature),usually 
with little understanding of the underlying concept.
SCRIPT KIDDIES HACKS INTO 
COMPUTER OR WEBSITES USING 
THE TOOLS AVAILABLE ON THE 
INTERNET . 
THEY DON’T HAVE KNOWLEDGE 
OF PROGRAMMING .
How to Hack??? 
Hacking = manipulating a system to 
do something it wasn’t designed to do. 
Like hot wiring a car. 
Hacking computers is 
often simple (once you 
know how computers work).
Thank 
you!

Weitere ähnliche Inhalte

Was ist angesagt? (19)

Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Hacking and Anti Hacking
Hacking and Anti HackingHacking and Anti Hacking
Hacking and Anti Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hackers
HackersHackers
Hackers
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
 

Ähnlich wie All About Hacking..!!

Ähnlich wie All About Hacking..!! (20)

Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking
HackingHacking
Hacking
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
ICT ~Hacking~
ICT ~Hacking~ICT ~Hacking~
ICT ~Hacking~
 
hacking
hackinghacking
hacking
 

Kürzlich hochgeladen

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Kürzlich hochgeladen (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

All About Hacking..!!

  • 1.
  • 3. Its just breaking the computer security system to access computer network legally or illegally.
  • 5. PHISHING BRUTE FORCE POWER ATTACK SQL INJECTION SOCIAL ENGINEERING APPLICATION BASE ATTACK MISCONFIGURATION ATTACK
  • 7. Phishing is the most simplest way the hacker can access your personal Information.
  • 8. Beware • ALWAYS CHECK THE ADDRESS BAR OF THE BROWSER AND THEN ENTER THE DETAILS.
  • 9. BRUTE FORCE POWER ATTACK 2
  • 10. In this process, an application is used which literally guesses passwords and ultimately tries to crack the actual password.
  • 11.
  • 13. It’s the most commonest method to hack websites..
  • 14. In order to protect yourselves this type of attack, you need to secure your website programmatically. This technique is also used for penetration testing.
  • 16. It is mainly used for hacking social networking sites.
  • 17. DO NOT EVER SHARE ANY INFORMATION ABOUT YOUR SOCIAL NETWORKING ACCOUNT WITH ANYONE.
  • 19. In this method normally an application is used for either creating a phishing page or a brute force power attack. In simple words there are typically MALWARE.
  • 21. This usually occurs if you have misconfigured your system such that the valuable information gets exposed.
  • 23. WHITE HAT HACKER. BLACK HAT HACKER. GREY HAT HACKER. ELITE HACKER. SCRIPT KIDDIE.
  • 24.
  • 25. They use their skills for good purposes. They work for organizations to stop the illegal activities through black hat hackers.
  • 26. A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system. The term "white hat" in Internet slang refers to an Ethical Hacker.
  • 27.
  • 28. A Black Hat Hacker is a hacker who violates computer security foR little reason beyond maliciousness or for personal gain.
  • 29. BLACK HAT HACKERS ALWAYS DO ILLEGAL WORK. THEY ARE PROFESSIONALS IN THEIR FIELDS.
  • 30.
  • 31. GREY HAT HACKERS HAVE BOTH QUALITIES LIKE BLACK HAT HACKERS AND WHITE HAT HACKERS . THEY USE THEIR KNOWLEDGE FOR BAD PURPOSES AND GOOD PURPOSES TOO.
  • 32.
  • 33. A SOCIAL STATUS AMONG HACKERS, ELITE IS USED TO DESCRIBE THE MOST SKILLED. NEWLY DISCOVERED EXPLOITS CIRCULATE AMONG THESE HACKERS. ELITE GROUPS SUCH AS MASTERS OF DECEPTIONCONFERRED A KIND OF CREDIBILITY ON THEIR MEMBERS.
  • 34.
  • 35. A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, hence the term script kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature),usually with little understanding of the underlying concept.
  • 36. SCRIPT KIDDIES HACKS INTO COMPUTER OR WEBSITES USING THE TOOLS AVAILABLE ON THE INTERNET . THEY DON’T HAVE KNOWLEDGE OF PROGRAMMING .
  • 37. How to Hack??? Hacking = manipulating a system to do something it wasn’t designed to do. Like hot wiring a car. Hacking computers is often simple (once you know how computers work).