SlideShare ist ein Scribd-Unternehmen logo
1 von 38
What is 
“HACKING”
Its just breaking the 
computer security system to 
access computer network 
legally or illegally.
Methods of hacking
PHISHING 
BRUTE FORCE POWER ATTACK 
SQL INJECTION 
SOCIAL ENGINEERING 
APPLICATION BASE ATTACK 
MISCONFIGURATION ATTACK
PHISHING 
1
Phishing is the most 
simplest way the hacker 
can access your 
personal Information.
Beware 
• ALWAYS CHECK THE ADDRESS BAR OF 
THE BROWSER AND THEN ENTER THE 
DETAILS.
BRUTE FORCE 
POWER ATTACK 
2
In this process, an 
application is used which 
literally guesses passwords 
and ultimately tries to crack 
the actual password.
3 
SQL INJECTION
It’s the most 
commonest method 
to hack websites..
In order to protect yourselves this 
type of attack, you need to secure 
your website programmatically. 
This technique is also used for 
penetration testing.
SOCIAL 
ENGINEERING 
4
It is mainly used for 
hacking social 
networking sites.
DO NOT EVER SHARE 
ANY INFORMATION 
ABOUT YOUR SOCIAL 
NETWORKING ACCOUNT 
WITH ANYONE.
5 
APPLICATION 
BASE ATTACK
In this method normally an 
application is used for either creating 
a phishing page or a brute force 
power attack. 
In simple words there are 
typically MALWARE.
MISCONFIGURATION 
ATTACK 
6
This usually occurs if you 
have misconfigured your 
system such that the 
valuable information gets 
exposed.
TYPES OF 
HACKERS!!!
WHITE HAT HACKER. 
BLACK HAT HACKER. 
GREY HAT HACKER. 
ELITE HACKER. 
SCRIPT KIDDIE.
They use their skills for good purposes. 
They work for organizations to stop the illegal 
activities through black hat hackers.
A white hat hacker breaks security 
for non-malicious reasons, perhaps 
to test their own security system. 
The term "white hat" in 
Internet slang refers to an Ethical 
Hacker.
A Black Hat 
Hacker is a hacker who violates computer security foR 
little reason beyond maliciousness or for personal 
gain.
BLACK HAT HACKERS ALWAYS DO ILLEGAL WORK. 
THEY ARE PROFESSIONALS IN THEIR FIELDS.
GREY HAT HACKERS HAVE BOTH QUALITIES LIKE BLACK HAT 
HACKERS AND WHITE HAT HACKERS . 
THEY USE THEIR KNOWLEDGE FOR BAD PURPOSES AND GOOD 
PURPOSES TOO.
A SOCIAL STATUS AMONG 
HACKERS, ELITE IS USED TO 
DESCRIBE THE MOST SKILLED. 
NEWLY 
DISCOVERED EXPLOITS CIRCULATE 
AMONG THESE HACKERS. 
ELITE GROUPS SUCH AS MASTERS OF 
DECEPTIONCONFERRED A KIND OF 
CREDIBILITY ON THEIR MEMBERS.
A script kiddie is a non-expert who breaks into computer 
systems by using pre-packaged automated tools written by 
others, hence the term script kiddie (i.e. kid, child—an 
individual lacking knowledge and experience, immature),usually 
with little understanding of the underlying concept.
SCRIPT KIDDIES HACKS INTO 
COMPUTER OR WEBSITES USING 
THE TOOLS AVAILABLE ON THE 
INTERNET . 
THEY DON’T HAVE KNOWLEDGE 
OF PROGRAMMING .
How to Hack??? 
Hacking = manipulating a system to 
do something it wasn’t designed to do. 
Like hot wiring a car. 
Hacking computers is 
often simple (once you 
know how computers work).
Thank 
you!

Weitere ähnliche Inhalte

Was ist angesagt? (19)

Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Hacking and Anti Hacking
Hacking and Anti HackingHacking and Anti Hacking
Hacking and Anti Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hackers
HackersHackers
Hackers
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
 

Andere mochten auch (13)

All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking..!!
 
Keys to Protecting Your Network
Keys to Protecting Your NetworkKeys to Protecting Your Network
Keys to Protecting Your Network
 
The Cost of Mismanaged Data
The Cost of Mismanaged DataThe Cost of Mismanaged Data
The Cost of Mismanaged Data
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
The Big Data Storm
The Big Data StormThe Big Data Storm
The Big Data Storm
 
Li fi technology
Li fi technologyLi fi technology
Li fi technology
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Big Data in Action
Big Data in ActionBig Data in Action
Big Data in Action
 
Study of WRM FURNACE of Vizag Steel Plant.
Study of WRM FURNACE of Vizag Steel Plant.Study of WRM FURNACE of Vizag Steel Plant.
Study of WRM FURNACE of Vizag Steel Plant.
 
Why Hacking Isn't Always Bad
Why Hacking Isn't Always BadWhy Hacking Isn't Always Bad
Why Hacking Isn't Always Bad
 
Hacking
HackingHacking
Hacking
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 

Ähnlich wie All About Hacking.!!

Ähnlich wie All About Hacking.!! (20)

Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking
HackingHacking
Hacking
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
ICT ~Hacking~
ICT ~Hacking~ICT ~Hacking~
ICT ~Hacking~
 
hacking
hackinghacking
hacking
 

Kürzlich hochgeladen

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 

Kürzlich hochgeladen (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

All About Hacking.!!

  • 1.
  • 3. Its just breaking the computer security system to access computer network legally or illegally.
  • 5. PHISHING BRUTE FORCE POWER ATTACK SQL INJECTION SOCIAL ENGINEERING APPLICATION BASE ATTACK MISCONFIGURATION ATTACK
  • 7. Phishing is the most simplest way the hacker can access your personal Information.
  • 8. Beware • ALWAYS CHECK THE ADDRESS BAR OF THE BROWSER AND THEN ENTER THE DETAILS.
  • 9. BRUTE FORCE POWER ATTACK 2
  • 10. In this process, an application is used which literally guesses passwords and ultimately tries to crack the actual password.
  • 11.
  • 13. It’s the most commonest method to hack websites..
  • 14. In order to protect yourselves this type of attack, you need to secure your website programmatically. This technique is also used for penetration testing.
  • 16. It is mainly used for hacking social networking sites.
  • 17. DO NOT EVER SHARE ANY INFORMATION ABOUT YOUR SOCIAL NETWORKING ACCOUNT WITH ANYONE.
  • 19. In this method normally an application is used for either creating a phishing page or a brute force power attack. In simple words there are typically MALWARE.
  • 21. This usually occurs if you have misconfigured your system such that the valuable information gets exposed.
  • 23. WHITE HAT HACKER. BLACK HAT HACKER. GREY HAT HACKER. ELITE HACKER. SCRIPT KIDDIE.
  • 24.
  • 25. They use their skills for good purposes. They work for organizations to stop the illegal activities through black hat hackers.
  • 26. A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system. The term "white hat" in Internet slang refers to an Ethical Hacker.
  • 27.
  • 28. A Black Hat Hacker is a hacker who violates computer security foR little reason beyond maliciousness or for personal gain.
  • 29. BLACK HAT HACKERS ALWAYS DO ILLEGAL WORK. THEY ARE PROFESSIONALS IN THEIR FIELDS.
  • 30.
  • 31. GREY HAT HACKERS HAVE BOTH QUALITIES LIKE BLACK HAT HACKERS AND WHITE HAT HACKERS . THEY USE THEIR KNOWLEDGE FOR BAD PURPOSES AND GOOD PURPOSES TOO.
  • 32.
  • 33. A SOCIAL STATUS AMONG HACKERS, ELITE IS USED TO DESCRIBE THE MOST SKILLED. NEWLY DISCOVERED EXPLOITS CIRCULATE AMONG THESE HACKERS. ELITE GROUPS SUCH AS MASTERS OF DECEPTIONCONFERRED A KIND OF CREDIBILITY ON THEIR MEMBERS.
  • 34.
  • 35. A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, hence the term script kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature),usually with little understanding of the underlying concept.
  • 36. SCRIPT KIDDIES HACKS INTO COMPUTER OR WEBSITES USING THE TOOLS AVAILABLE ON THE INTERNET . THEY DON’T HAVE KNOWLEDGE OF PROGRAMMING .
  • 37. How to Hack??? Hacking = manipulating a system to do something it wasn’t designed to do. Like hot wiring a car. Hacking computers is often simple (once you know how computers work).