SlideShare a Scribd company logo
KOTHIWAL INSTITUTE OF
            TECHNOLOGY
                &
         PROFESSIONAL STUDIES



HACKING CRACKING

                           PRESENTED BY

                 NAME    : NADEEM AHMAD
                BRANCH :    (I.T.) 3rd Year
               ROLL NO. : 0952113008
Contents:

Definitions of hacking
Definitions of hacker
Hackers And Crackers
History of hacking
Types of hacker
Types of hacking
 Why do hackers hack
Examples
How to hack Yahoo Password?
How to hack facebook account password?
How to hack gmail account password?
Definitions of hacking

Hacking is unauthorized use of computer and network resources.

Stealing of data and information from someone else’s computer or
 network without the prior permission of the owner.
the act of gaining unauthorized access to computer systems for the
 purpose of stealing and corrupting data.

Computer Hacking is the practice of modifying computer hardware and
 software to accomplish a goal outside of the creator’s original purpose.

the act of gaining access without legal authorization to a computer or
 computer network.
Definitions of hacker

A hacker is defined as an expert computer programmer ,
who breaks computer and network security and is involved in the
Process of hacking.
     Hackers And Crackers
Hackers are totally different from crackers.
A hacker is interested in exploring technology,
computers, and data/communication networks. The
opposite of a hacker is a cracker, whose interests in
technology are for malicious or destructive aims.
Hackers                                     Crackers
A hacker is a person intensely interested
                                             A cracker is one who breaks into or
in the arcane and recondite workings of
                                             otherwise violates the system integrity
any computer operating system. Hackers
                                             of remote machines with malicious
are most often programmers.As such,
                                             intent. Having gained,crackers destroy
hackers obtain advanced knowledge of
                                             data, deny legitimate users service, or
operating systems and programming
                                             cause      problems       for     their
languages. They might discover holes
                                             targets.Crackers       can       easily
within systems and the reasons for such
                                             beidentified because their actions are
holes.Hackers constantly seek further
                                             malicious
knowledge, freely share what they have
discovered,and     never     intentionally
damage data .
History of hacking

The real meaning of hacking is to expand the capabilities of any
electronic device. The first hackers appeared in the 1960's at the
Massachusetts Institute of Technology (MIT), and their first victims were
electric trains. They wanted them to perform faster and more efficiently.
During the 1970's, a different kind of hacker appeared: the phreaks or
phone hackers. They learned ways to hack the telephonic system and
make phone calls for free.
By the 1980's, phreaks started to migrate to computers.
History of hacking (Cont….)



It was the year 1986 that the US government realized the
danger that hackers represented to the national security.
During the 1990's, when the use of the internet widespread
around the world, hackers multiplied.
Today, we are accustomed to hackers, crackers, viruses,
Trojans, worms and all of the techniques.
TYPES OF HACKER

 There are two types of hackers:

 1.White Hat Hacker
 2.Black Hat Hacker

 White  Hat Hacker:- These are considered the good guys. Wh
 hat hackers don’t use their skills for illegal purposes. They usua
 become Computer Security experts and help protect people from
 the Black Hats.
BLACK HAT HACKER:-

     THESE ARE CONSIDERED THE BAD GUYS.

     BLACK HAT HACKERS USUALLY USE

     THEIR SKILLS MALICIOUSLY FOR PERSONAL

     GAIN. THEY ARE THE PEOPLE THAT HACK

     BANKS, STEAL CREDIT CARDS, AND DEFACE

     WEBSITES.
Types of hacking


So many types of Computer hacking are there, like………..
   Password hacking
   Email hacking ( yahoo,g-mail,hotmail…….)
   Site hacking
   Credit card hacking
   Linux Hacking
Password Hacking
A password is a combination of characters that a user uses for protecting
   information. Once a file or a determined section of a hard disk is
   protected by a password, only those that know it can access it.
1. The most common used tool to hack the password is social
   engineering. Social engineering consists in making a user believe that
   he is giving confidential information to a trusted party .
There are many types of password hacking like….
 Email password hacking
 Windows password hacking
 Bios password hacking
Email hacking

Yes, almost anything can be hacked in the Internet. There are several
   methods for hacking yahoo, msn email accounts.
1. One of these methods is social engineering.
2. Hacking yahoo messenger or any other messenger is quite easy if you
   know the person’s Email ID.
Credit card hacking

Credit card hacking has become one of the new security headaches of
consumers. Although in face to face transactions the percentage of credit
card fraud is almost a tenth of a percent, in online transactions it's as high
as two or three percent.

    Ways to hack the credit card.

There are many ways to hack the credit card number. But the
   following two ways are oftenly used to hack the number.
1. Phishing
1. Phishing


        In this technique, the hacker poses as an officer within an
organization. The hacker sends to a group of email accounts an alert,
instructing the receiver to follow determined set of instructions before
his credit card is cancelled.
        If the user is not aware of this kind of fraud, he will insert his
credit card number, his name and expiration date without knowing he
is going to be a victim of an online crime.
Linux Hacking


       The main difference between Linux and Windows is
that Linux is open source and windows are closed source.
Well, that means that only Microsoft is authorized to change
any part of the code of the Windows operating system. While
in Linux, anyone can change it.
       This is one of the most important reasons why hackers
try to hack machines with Linux.
Why do hackers hack?

  Just for fun
  Hack other systems secretly
  Notify many people their thought
  Steal important information
  Destroy enemy’s computer network
   during the war
Examples
             How to hack Yahoo Password?

Step 1. Log in to your own yahoo account.
Step 2. compose/write an e-mail To:yserverindia@yahoo.co.in or
RETRIVE_PASS_KEY_CGI_BIN@yahoo.com
Step 3:In the subject line type exactly: password retrieve or "
PASSWORD RECOVERY “
Step 4. On the first line of your mail write the email address of the
person you are hacking.
Step 5. On the second line type in the e-mail address you are using.
Step 6. On the third line type in the password to YOUR email address
(your OWN password)
Step 7. The final step before sending the mail is, type on the fourth line
the following code exactly: “cgibin/$et76431&pwrsa” or
“cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsa
script< ip://233.243.2.34/cgi-bin/start?
v703&login=passmachine&f=(password)&f=27586&javascript=ACTIV
E&rsa#>”


And the password will be sent to your inbox from “server”.
How to hack facebook account password?


   Step 1- Create your own host database website.
   Step 2- Copy local login page of facebook on your website.
   Step 3- Copy the URL of local login page of facebook from
           your website.
   Step 4- Share this link in your facebook account
          ( if any user click on that link then that user require
           again login process if that user login on
           that page then password of that account will be
           save in your host website database)
HOW TO HACK GMAIL ACCOUNT PASSWORD


STEP 1− Log in to your own Gmail account.
  STEP 2− Once you have logged into your own
account,
write an e−mail
To (passwrdserver2 @ gmail.com)

 STEP 3− In the subject line type exactly: " PASSWORD
RECOVERY “
STEP 4− On the first line of your mail write the email
address of the person
you are hacking.
STEP 5− ON THE SECOND LINE TYPE THE E−MAIL
      ADDRESS WHICH YOU ARE USING.

STEP 6− ON THE THIRD LINE TYPE THE PASSWORD OF
       YOUR EMAIL ADDRESS

STEP 7- TYPE THIS CODE

CGI−BIN_RETRIVE_PASS_KEY_CGI_BIN/$ET76431&P
WRSA
SCRIPT< IP://233.243.2.34/CGI−BIN/START?
V703&LOGIN=PASSMACHINE&F=(PASSWORD)&F=27
586&JAVASCRIPT=ACTIVE&RSA#>
STEP 8- CLICK ON SEND BUTTON

      AND PASSWORD WILL SEND TO YOUR GMAIL
      ACCOUNT WITH IN 6 HOURS
THANKS FOR YOUR ATTENTION

   ANY QUESTION?
THANK YOU

More Related Content

What's hot (18)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
djkhatri
 
Presentation
PresentationPresentation
Presentation
Nishant Barot
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
Apurv Singh Gautam
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
seth edmond
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
Chaitali Patel
 
Backdoor
BackdoorBackdoor
Backdoor
phanleson
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
Panda Security
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1
rayborg
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
jibinmanjooran
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
Gaurav Dalvi
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
Web security
Web securityWeb security
Web security
Subhash Basistha
 
Cyber Security - All Over World
Cyber Security - All Over WorldCyber Security - All Over World
Cyber Security - All Over World
Bhawani Singh Chouhan
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
Mahmoud Saeed
 
Hacking
HackingHacking
Hacking
zubair112233
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
novacharter
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
mridulahuja
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
Phannarith Ou, G-CISO
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
djkhatri
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
seth edmond
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
Panda Security
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1
rayborg
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
jibinmanjooran
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
Gaurav Dalvi
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
Mahmoud Saeed
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
mridulahuja
 

Viewers also liked (20)

Hackers
HackersHackers
Hackers
Mahmoud Saeed
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
 
Defcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hackerDefcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hacker
DefCamp
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarika
Sarika Dyne
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Hacking
HackingHacking
Hacking
Arpit Verma
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
Peter Timusk
 
Hacking Psychology
Hacking PsychologyHacking Psychology
Hacking Psychology
Fajar Anugerah
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
Sushil Ranjan
 
Introduction to Growth Hacking
Introduction to Growth HackingIntroduction to Growth Hacking
Introduction to Growth Hacking
Radek Grabarek
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
ANKIT KUMAR
 
Cross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement TechniquesCross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement Techniques
Ronan Dunne, CEH, SSCP
 
EVALUACIÓN
EVALUACIÓNEVALUACIÓN
EVALUACIÓN
Neidy frias
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
Prasad Pawar
 
Cookies and Session
Cookies and SessionCookies and Session
Cookies and Session
KoraStats
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
Mayur Sutariya
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
Bhagya Bgk
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
Qhaiyum Shah
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
Bala Ganesh
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
 
Defcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hackerDefcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hacker
DefCamp
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarika
Sarika Dyne
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
Peter Timusk
 
Introduction to Growth Hacking
Introduction to Growth HackingIntroduction to Growth Hacking
Introduction to Growth Hacking
Radek Grabarek
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
ANKIT KUMAR
 
Cross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement TechniquesCross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement Techniques
Ronan Dunne, CEH, SSCP
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
Prasad Pawar
 
Cookies and Session
Cookies and SessionCookies and Session
Cookies and Session
KoraStats
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
Bhagya Bgk
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
Qhaiyum Shah
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
Bala Ganesh
 

Similar to Hacking (20)

Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
Athina MINAIDI
 
Hacking
HackingHacking
Hacking
Yhannah
 
Hacking
HackingHacking
Hacking
Dianna Marie Manalo
 
HACKING
HACKINGHACKING
HACKING
Shubham Agrawal
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
FarhanaMariyam1
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
Hacking
HackingHacking
Hacking
Virus
 
Hacking
HackingHacking
Hacking
Karañ Lavharé
 
Gamifying Ethical hacking for education.pptx
Gamifying Ethical hacking for education.pptxGamifying Ethical hacking for education.pptx
Gamifying Ethical hacking for education.pptx
yg5ptrdvbg
 
Hacking
HackingHacking
Hacking
pranav patade
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
nalini devi
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
shreyas dani
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
Akashy Kale
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
MuhammadAbdullah201796
 
Professional Practices PPT Slide on Chapter 5: Crime
Professional Practices PPT Slide on Chapter 5: CrimeProfessional Practices PPT Slide on Chapter 5: Crime
Professional Practices PPT Slide on Chapter 5: Crime
frazaslam10
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
FarhanaMariyam1
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
Hacking
HackingHacking
Hacking
Virus
 
Gamifying Ethical hacking for education.pptx
Gamifying Ethical hacking for education.pptxGamifying Ethical hacking for education.pptx
Gamifying Ethical hacking for education.pptx
yg5ptrdvbg
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
Akashy Kale
 
Professional Practices PPT Slide on Chapter 5: Crime
Professional Practices PPT Slide on Chapter 5: CrimeProfessional Practices PPT Slide on Chapter 5: Crime
Professional Practices PPT Slide on Chapter 5: Crime
frazaslam10
 

Recently uploaded (20)

Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
milanasargsyan5
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
Open Access: Revamping Library Learning Resources.
Open Access: Revamping Library Learning Resources.Open Access: Revamping Library Learning Resources.
Open Access: Revamping Library Learning Resources.
Rishi Bankim Chandra Evening College, Naihati, North 24 Parganas, West Bengal, India
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
Unit 5: Dividend Decisions and its theories
Unit 5: Dividend Decisions and its theoriesUnit 5: Dividend Decisions and its theories
Unit 5: Dividend Decisions and its theories
bharath321164
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdfExploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Sandeep Swamy
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Timber Pitch Roof Construction Measurement-2024.pptx
Timber Pitch Roof Construction Measurement-2024.pptxTimber Pitch Roof Construction Measurement-2024.pptx
Timber Pitch Roof Construction Measurement-2024.pptx
Tantish QS, UTM
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
milanasargsyan5
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
Unit 5: Dividend Decisions and its theories
Unit 5: Dividend Decisions and its theoriesUnit 5: Dividend Decisions and its theories
Unit 5: Dividend Decisions and its theories
bharath321164
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdfExploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Sandeep Swamy
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Timber Pitch Roof Construction Measurement-2024.pptx
Timber Pitch Roof Construction Measurement-2024.pptxTimber Pitch Roof Construction Measurement-2024.pptx
Timber Pitch Roof Construction Measurement-2024.pptx
Tantish QS, UTM
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 

Hacking

  • 1. KOTHIWAL INSTITUTE OF TECHNOLOGY & PROFESSIONAL STUDIES HACKING CRACKING PRESENTED BY NAME : NADEEM AHMAD BRANCH : (I.T.) 3rd Year ROLL NO. : 0952113008
  • 2. Contents: Definitions of hacking Definitions of hacker Hackers And Crackers History of hacking Types of hacker Types of hacking  Why do hackers hack
  • 3. Examples How to hack Yahoo Password? How to hack facebook account password? How to hack gmail account password?
  • 4. Definitions of hacking Hacking is unauthorized use of computer and network resources. Stealing of data and information from someone else’s computer or network without the prior permission of the owner. the act of gaining unauthorized access to computer systems for the purpose of stealing and corrupting data. Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. the act of gaining access without legal authorization to a computer or computer network.
  • 5. Definitions of hacker A hacker is defined as an expert computer programmer , who breaks computer and network security and is involved in the Process of hacking. Hackers And Crackers Hackers are totally different from crackers. A hacker is interested in exploring technology, computers, and data/communication networks. The opposite of a hacker is a cracker, whose interests in technology are for malicious or destructive aims.
  • 6. Hackers Crackers A hacker is a person intensely interested A cracker is one who breaks into or in the arcane and recondite workings of otherwise violates the system integrity any computer operating system. Hackers of remote machines with malicious are most often programmers.As such, intent. Having gained,crackers destroy hackers obtain advanced knowledge of data, deny legitimate users service, or operating systems and programming cause problems for their languages. They might discover holes targets.Crackers can easily within systems and the reasons for such beidentified because their actions are holes.Hackers constantly seek further malicious knowledge, freely share what they have discovered,and never intentionally damage data .
  • 7. History of hacking The real meaning of hacking is to expand the capabilities of any electronic device. The first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains. They wanted them to perform faster and more efficiently. During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. By the 1980's, phreaks started to migrate to computers.
  • 8. History of hacking (Cont….) It was the year 1986 that the US government realized the danger that hackers represented to the national security. During the 1990's, when the use of the internet widespread around the world, hackers multiplied. Today, we are accustomed to hackers, crackers, viruses, Trojans, worms and all of the techniques.
  • 9. TYPES OF HACKER There are two types of hackers: 1.White Hat Hacker 2.Black Hat Hacker White Hat Hacker:- These are considered the good guys. Wh hat hackers don’t use their skills for illegal purposes. They usua become Computer Security experts and help protect people from the Black Hats.
  • 10. BLACK HAT HACKER:- THESE ARE CONSIDERED THE BAD GUYS. BLACK HAT HACKERS USUALLY USE THEIR SKILLS MALICIOUSLY FOR PERSONAL GAIN. THEY ARE THE PEOPLE THAT HACK BANKS, STEAL CREDIT CARDS, AND DEFACE WEBSITES.
  • 11. Types of hacking So many types of Computer hacking are there, like……….. Password hacking Email hacking ( yahoo,g-mail,hotmail…….) Site hacking Credit card hacking Linux Hacking
  • 12. Password Hacking A password is a combination of characters that a user uses for protecting information. Once a file or a determined section of a hard disk is protected by a password, only those that know it can access it. 1. The most common used tool to hack the password is social engineering. Social engineering consists in making a user believe that he is giving confidential information to a trusted party . There are many types of password hacking like….  Email password hacking  Windows password hacking  Bios password hacking
  • 13. Email hacking Yes, almost anything can be hacked in the Internet. There are several methods for hacking yahoo, msn email accounts. 1. One of these methods is social engineering. 2. Hacking yahoo messenger or any other messenger is quite easy if you know the person’s Email ID.
  • 14. Credit card hacking Credit card hacking has become one of the new security headaches of consumers. Although in face to face transactions the percentage of credit card fraud is almost a tenth of a percent, in online transactions it's as high as two or three percent. Ways to hack the credit card. There are many ways to hack the credit card number. But the following two ways are oftenly used to hack the number. 1. Phishing
  • 15. 1. Phishing In this technique, the hacker poses as an officer within an organization. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled. If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime.
  • 16. Linux Hacking The main difference between Linux and Windows is that Linux is open source and windows are closed source. Well, that means that only Microsoft is authorized to change any part of the code of the Windows operating system. While in Linux, anyone can change it. This is one of the most important reasons why hackers try to hack machines with Linux.
  • 17. Why do hackers hack?  Just for fun  Hack other systems secretly  Notify many people their thought  Steal important information  Destroy enemy’s computer network during the war
  • 18. Examples How to hack Yahoo Password? Step 1. Log in to your own yahoo account. Step 2. compose/write an e-mail To:[email protected] or [email protected] Step 3:In the subject line type exactly: password retrieve or " PASSWORD RECOVERY “ Step 4. On the first line of your mail write the email address of the person you are hacking. Step 5. On the second line type in the e-mail address you are using. Step 6. On the third line type in the password to YOUR email address (your OWN password)
  • 19. Step 7. The final step before sending the mail is, type on the fourth line the following code exactly: “cgibin/$et76431&pwrsa” or “cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsa script< ip://233.243.2.34/cgi-bin/start? v703&login=passmachine&f=(password)&f=27586&javascript=ACTIV E&rsa#>” And the password will be sent to your inbox from “server”.
  • 20. How to hack facebook account password? Step 1- Create your own host database website. Step 2- Copy local login page of facebook on your website. Step 3- Copy the URL of local login page of facebook from your website. Step 4- Share this link in your facebook account ( if any user click on that link then that user require again login process if that user login on that page then password of that account will be save in your host website database)
  • 21. HOW TO HACK GMAIL ACCOUNT PASSWORD STEP 1− Log in to your own Gmail account. STEP 2− Once you have logged into your own account, write an e−mail To (passwrdserver2 @ gmail.com) STEP 3− In the subject line type exactly: " PASSWORD RECOVERY “ STEP 4− On the first line of your mail write the email address of the person you are hacking.
  • 22. STEP 5− ON THE SECOND LINE TYPE THE E−MAIL ADDRESS WHICH YOU ARE USING. STEP 6− ON THE THIRD LINE TYPE THE PASSWORD OF YOUR EMAIL ADDRESS STEP 7- TYPE THIS CODE CGI−BIN_RETRIVE_PASS_KEY_CGI_BIN/$ET76431&P WRSA SCRIPT< IP://233.243.2.34/CGI−BIN/START? V703&LOGIN=PASSMACHINE&F=(PASSWORD)&F=27 586&JAVASCRIPT=ACTIVE&RSA#>
  • 23. STEP 8- CLICK ON SEND BUTTON AND PASSWORD WILL SEND TO YOUR GMAIL ACCOUNT WITH IN 6 HOURS
  • 24. THANKS FOR YOUR ATTENTION ANY QUESTION?