SlideShare a Scribd company logo
HACKING
HISTORY OF HACKING:
• THE FIRST HACKER WAS APPEARED IN 1960’S AT THE MASSACHUSETTS INSTITUTE
OF TECHNOLOGY(MIT)
• DURING THE 1970’S, A DIFFERENT KIND OF HACKER APPEARED: PHONE
PHREAKER OR PHONE HACKER
WHAT IS HACKING:
• IN COMPUTING, A HACKER IS ANY SKILLED COMPUTER EXPERT THAT USES
THEIR TECHNICAL KNOWLEDGE TO OVERCOME A PROBLEM. WHILE "HACKER"
CAN REFER TO ANY COMPUTER PROGRAMMER, THE TERM HAS BECOME
ASSOCIATED IN POPULAR CULTURE WITH A "SECURITY HACKER", SOMEONE
WHO, WITH THEIR TECHNICAL KNOWLEDGE, USES BUGS OR EXPLOITS TO BREAK
INTO COMPUTER SYSTEMS.
TYPES OF HACKER:
Hacker
Ethical Hacker
(White hat)
Cracker
(Black hat)
Grey hat
(Both)
Ethical Hacker (White hat): A hacker who gains
access to systems with a view to fix the identified
weaknesses. They may also perform penetration
Testing and vulnerability assessments.
Cracker (Black hat): A hacker who gains
unauthorized access to computer systems for
personal gain. The intent is usually to steal
corporate data, violate privacy rights, transfer funds
from bank accounts etc.
Grey hat: A hacker who is in between ethical and
black hat hackers. He/she breaks into computer
systems without authority with a view to identify
weaknesses and reveal them to the system owner.
HACKING TECHNIQUES:
1. KEYLOGGER
2. DENIAL OF SERVICE (DOSDDOS)
3. WATERHOLE ATTACKS
4. FAKE WAP
5. EAVESDROPPING (PASSIVE ATTACKS)
6. PHISHING
7. VIRUS, TROJEN ETC.
8. CLICKJACKING ATTACKS
9. COOKIE THEFT
10. BAIT AND SWITCH
KEYLOGGER:
• KEYLOGGER IS A SIMPLE SOFTWARE THAT RECORDS THE KEY SEQUENCE AND
STROKES OF YOUR KEYBOARD INTO A LOG FILE ON YOUR MACHINE. THESE LOG
FILES MIGHT EVEN CONTAIN YOUR PERSONAL EMAIL IDS AND PASSWORDS.
• KEYLOGGER IS ONE OF THE MAIN REASONS WHY ONLINE BANKING SITES GIVE
YOU AN OPTION TO USE THEIR VIRTUAL KEYBOARDS.
DENIAL OF SERVICE ATTACK:
• A DENIAL OF SERVICE ATTACK IS A HACKING TECHNIQUE TO TAKE DOWN A SITE
OR SERVER BY FLOODING THAT SITE OR SERVER WITH A LOT OF TRAFFIC THAT
THE SERVER IS UNABLE TO PROCESS ALL THE REQUESTS IN THE REAL TIME AND
FINALLY CRASHES DOWN.
• FOR DDOS ATTACKS, HACKERS OFTEN DEPLOY BOTNETS OR ZOMBIE COMPUTERS
WHICH HAVE GOT THE ONLY WORK TO FLOOD YOUR SYSTEM WITH REQUEST
PACKETS.
WATERHOLE ATTACKS:
• IF YOU ARE A BIG FAN OF DISCOVERY OR NATIONAL GEOGRAPHIC CHANNELS, YOU
COULD RELATE EASILY WITH THE WATERHOLE ATTACKS. TO POISON A PLACE, IN THIS
CASE, THE HACKER HITS THE MOST ACCESSIBLE PHYSICAL POINT OF THE VICTIM.
• FOR EXAMPLE, IF THE SOURCE OF A RIVER IS POISONED, IT WILL HIT THE ENTIRE
STRETCH OF ANIMALS DURING SUMMER. IN THE SAME WAY, HACKERS TARGET THE
MOST ACCESSED PHYSICAL LOCATION TO ATTACK THE VICTIM. THAT POINT COULD
BE A COFFEE SHOP, A CAFETERIA ETC.
• ONCE HACKERS ARE AWARE OF YOUR TIMINGS, THEY MIGHT CREATE A FAKE WI-FI
ACCESS POINT AND MODIFY YOUR MOST VISITED WEBSITE TO REDIRECT THEM TO
YOU TO GET YOUR PERSONAL INFORMATION.
FAKE WAP:
• EVEN JUST FOR FUN, A HACKER CAN USE SOFTWARE TO FAKE A WIRELESS
ACCESS POINT. THIS WAP CONNECTS TO THE OFFICIAL PUBLIC PLACE WAP. ONCE
YOU GET CONNECTED THE FAKE WAP, A HACKER CAN ACCESS YOUR DATA, JUST
LIKE IN THE ABOVE CASE.
• EX:
• TOOL: WI-FI PUMPKIN
EAVESDROPPING (PASSIVE ATTACKS):
• UNLIKE OTHER ATTACKS WHICH ARE ACTIVE IN NATURE, USING A PASSIVE
ATTACK, A HACKER JUST MONITORS THE COMPUTER SYSTEMS AND NETWORKS
TO GAIN SOME UNWANTED INFORMATION.
• THE MOTIVE BEHIND EAVESDROPPING IS NOT TO HARM THE SYSTEM BUT TO GET
SOME INFORMATION WITHOUT BEING IDENTIFIED.
PHISHING:
• PHISHING IS A HACKING TECHNIQUE USING WHICH A HACKER REPLICATES THE
MOST-ACCESSED SITES AND TRAPS THE VICTIM BY SENDING THAT SPOOFED
LINK.
• ONCE THE VICTIM TRIES TO LOGIN OR ENTER SOME DATA, THE HACKER GETS
THAT PRIVATE INFORMATION OF THE TARGET VICTIM USING THE TROJAN
RUNNING ON THE FAKE SITE.
VIRUS OR TROJANS ETC. :
• VIRUS OR TROJANS ARE MALICIOUS SOFTWARE PROGRAMS WHICH
GET INSTALLED INTO THE VICTIM’S SYSTEM AND KEEPS SENDING THE VICTIMS
DATA TO THE HACKER.
CLICKJACKING:
• CLICKJACKING IS ALSO KNOWN BY A DIFFERENT NAME, UI REDRESS. IN THIS
ATTACK, THE HACKER HIDES THE ACTUAL UI WHERE THE VICTIM IS SUPPOSED
TO CLICK.
• IN ANOTHER WORD, THE ATTACKER HIJACKS THE CLICKS OF THE VICTIM THAT
AREN’T MEANT FOR THE EXACT PAGE, BUT FOR A PAGE WHERE THE HACKER
WANTS YOU TO BE.
COOKIE THEFT:
• THE COOKIES OF A BROWSER KEEP OUR PERSONAL DATA SUCH AS BROWSING
HISTORY, USERNAME, AND PASSWORDS FOR DIFFERENT SITES THAT WE ACCESS.
ONCE THE HACKER GETS THE ACCESS TO YOUR COOKIE, HE CAN EVEN
AUTHENTICATE HIMSELF AS YOU ON A BROWSER.
BAIT AND SWITCH:
• USING BAIT AND SWITCH HACKING TECHNIQUE, THE HACKER RUNS
A MALICIOUS PROGRAM WHICH THE USER BELIEVES TO BE AUTHENTIC. THIS
WAY, AFTER INSTALLING THE MALICIOUS PROGRAM ON YOUR COMPUTER, THE
HACKER GETS UNPRIVILEGED ACCESS TO YOUR COMPUTER.
HACKING LANGUAGE:
1. WEB HACKING:
SINCE MOST OF THE TECH IS BUILD AROUND WORLD WIDE WEB, IT IS IMPORTANT TO LEARN WEB HACKING TO BE A
GOOD HACKER. LET’S SAY YOU ARE INTERESTED IN HACKING WEB APPS AND/OR WEBSITES THEN YOU WILL NEED TO
LEARN WEB CODING. WEBSITES USE MOSTLY HTML, PHP AND JAVASCRIPT SO IT IS IMPORTANT TO LEARN THESE THREE.
• HTML:
ONE OF THE EASIEST AND WIDELY USED STATIC MARKUP WEB LANGUAGE PRESENT IN EACH AND EVERY WEBSITE YOU
SEE IN YOUR BROWSER. IT’S RECOMMENDED TO LEARN HTML BECAUSE IT HELPS UNDERSTANDING WEB ACTIONS,
RESPONSE, AND LOGIC.
• JAVASCRIPT:
JS IS A CLIENT-SIDE WEB PROGRAMMING MOSTLY USED IN WEB SITES FOR BETTER USER INTERFACE AND QUICK
RESPONSE. IF YOU ARE INTERESTED IN A HACKING CAREER YOU NEED TO LEARN JAVASCRIPT BECAUSE IT HELPS TO
UNDERSTAND CLIENT-SIDE MECHANISM WHICH IS ESSENTIAL FOR FINDING CLIENT-SIDE FLAWS.
CONT.….
• PHP:
A DYNAMIC SERVER-SIDE LANGUAGE WHICH IS RESPONSIBLE FOR MANAGING WEB-APPS AND
DATABASE. PHP IS CONSIDERED ONE OF THE MOST ESSENTIAL LANGUAGE BECAUSE IT CONTROLS
EVERYTHING ON SITE AND SERVER, LIKE A CAPTAIN OF A SHIP. IT IS ADVISED TO LEARN PHP
NICELY.
• SQL:
SQL IS RESPONSIBLE FOR STORING AND MANAGING SENSITIVE AND CONFIDENTIAL DATA SUCH AS
USER CREDENTIALS, BANK AND PERSONAL INFORMATION ABOUT THE WEBSITE VISITORS. BLACK
HAT HACKERS MOSTLY TARGET SQL DATABASE AND STEAL INFORMATION WHICH IS LATER SOLD
ON UNDERGROUND DARK WEB FORUM. IF YOU WANT TO BE GOOD SECURITY RESEARCHER, YOU
SHOULD LEARN SQL SO THAT YOU CAN FIND FLAWS IN A WEBSITE AND REPORT THEM.
CONT...
2. EXPLOIT WRITING
AFTER WEB HACKING, ANOTHER MOST IMPORTANT FEATURE OF HACKING IS EXPLOITS. YOU CAN CRACK A PARTICULAR
SOFTWARE BY WRITING A EXPLOIT. BUT TO WRITE A EXPLOIT YOU NEED TO LEARN EITHER PYTHON OR RUBY.
• PYTHON:
IT IS SAID THAT A SECURITY RESEARCHER OR HACKER SHOULD KNOW PYTHON BECAUSE IT THE CORE LANGUAGE FOR
CREATING EXPLOITS AND TOOLS. SECURITY EXPERTS AND EVEN PRO HACKERS SUGGEST THAT MASTER PYTHON IS THE
BEST WAY TO LEARN HACKING. PYTHON OFFERS WIDER FLEXIBILITY AND YOU CAN CREATE EXPLOITS ONLY IF YOU ARE
GOOD IN PYTHON.
• RUBY:
RUBY IS A SIMPLE YET COMPLICATED OBJECT-ORIENTED LANGUAGE. RUBY IS VERY USEFUL WHEN IT COMES TO EXPLOIT
WRITING. IT IS USED FOR METERPRETER SCRIPTING BY HACKERS. THE MOST FAMOUS HACKER TOOL, METASPLOIT
FRAMEWORK IS PROGRAMMED IN RUBY. THOUGH RUBY MAY NOT BE AS VERSATILE AS PYTHON, KNOWLEDGE OF RUBY IS
MUST IN UNDERSTANDING EXPLOITS.
CONT.…
• REVERSE ENGINEERING:
• REVERSE ENGINEERING, THE PROCESS OF TAKING A SOFTWARE
PROGRAM’S BINARY CODE AND RECREATING IT SO AS TO TRACE IT BACK TO
THE ORIGINAL SOURCE CODE. IF YOU KNOW REVERSE ENGINEERING YOU CAN
FIND FLAWS AND BUGS EASILY. IF YOU WANT TO LEARN REVERSE ENGINEERING
YOU NEED TO KNOW C, C++ AND JAVA. THE PROCESS OF CONVERTING THE CODE
WRITTEN IN HIGH LEVEL LANGUAGE INTO A LOW LEVEL LANGUAGE WITHOUT
CHANGING THE ORIGINAL PROGRAM IS KNOWN AS REVERSE ENGINEERING.
HOW TO TRANSLATE THE HACKERS’
LANGUAGE
1 -> I OR L
3 -> E
4 -> A
7 -> T
9 -> G
0 -> O
$ -> S
| -> I OR L
|| -> N
|/| -> M
S -> Z
Z -> S
F -> PH
PH -> F
X -> CK
CK -> X
HOW TO TRANSLATE THE HACKERS’
LANGUAGE
• EX)
• 1 D1D N0T H4CK TH1S P4G3, 1T W4S L1K3 TH1S WH3N 1 H4CK3D 1N
• I DID NOT HACK THIS PAGE, IT WAS LIKE THIS WHEN I HACKED IN
TOP 10 ETHICAL HACKER:
1) RAHUL TYAGI
2) PRANAV MISTRY
3) ANKIT FADIA
4) KOUSHIK DUTTA
5) VIVEK RAMACHANDRAN
6) TRISHNEET ARORA
7) SUNNY VAGHELA
8) BENILD JOSEPH
9) FALGUN RATHOD
10) JAYANT KRISHNAMURTHY
Hacking and Types of Hacker.

More Related Content

What's hot (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
Sushil Ranjan
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Hacking
HackingHacking
Hacking
Asma Khan
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
Institute of Information Security (IIS)
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Muhammad Osama Khalid
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aryan Saxena
 

Similar to Hacking and Types of Hacker. (20)

Hacking
HackingHacking
Hacking
VipinYadav257
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Lalit Kumar
 
Hacking
Hacking Hacking
Hacking
Harendra Singh
 
News2 bytes
News2 bytesNews2 bytes
News2 bytes
Shreyasi Rao
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
Outhai SAIOUDOM
 
Social engineering
Social engineering Social engineering
Social engineering
Abdelhamid Limami
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rishabha Garg
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
JasminJaman1
 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty Basics
HackerOne
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Alan Quayle
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
Nikhil Tripathi
 
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
Florent Batard
 
Hacking intro
Hacking introHacking intro
Hacking intro
Milind Mishra
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
Barcamp Kerala
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Sourabh Goyal
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
SuhailShaik16
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
Er Mahendra Yadav
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
leoimpact
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
Outhai SAIOUDOM
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
JasminJaman1
 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty Basics
HackerOne
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Alan Quayle
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
Nikhil Tripathi
 
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
Florent Batard
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
Barcamp Kerala
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
SuhailShaik16
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
leoimpact
 

More from Coder Tech (9)

HTML (Basic to Advance)
HTML (Basic to Advance)HTML (Basic to Advance)
HTML (Basic to Advance)
Coder Tech
 
PHP Course (Basic to Advance)
PHP Course (Basic to Advance)PHP Course (Basic to Advance)
PHP Course (Basic to Advance)
Coder Tech
 
Kotlin- Basic to Advance
Kotlin- Basic to Advance Kotlin- Basic to Advance
Kotlin- Basic to Advance
Coder Tech
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
Coder Tech
 
Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)
Coder Tech
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory space
Coder Tech
 
Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)
Coder Tech
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
Coder Tech
 
HTML (Basic to Advance)
HTML (Basic to Advance)HTML (Basic to Advance)
HTML (Basic to Advance)
Coder Tech
 
PHP Course (Basic to Advance)
PHP Course (Basic to Advance)PHP Course (Basic to Advance)
PHP Course (Basic to Advance)
Coder Tech
 
Kotlin- Basic to Advance
Kotlin- Basic to Advance Kotlin- Basic to Advance
Kotlin- Basic to Advance
Coder Tech
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
Coder Tech
 
Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)
Coder Tech
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory space
Coder Tech
 
Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)
Coder Tech
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
Coder Tech
 

Recently uploaded (20)

How to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of saleHow to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of sale
Celine George
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Studying Drama: Definition, types and elements
Studying Drama: Definition, types and elementsStudying Drama: Definition, types and elements
Studying Drama: Definition, types and elements
AbdelFattahAdel2
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdfExploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Sandeep Swamy
 
Open Access: Revamping Library Learning Resources.
Open Access: Revamping Library Learning Resources.Open Access: Revamping Library Learning Resources.
Open Access: Revamping Library Learning Resources.
Rishi Bankim Chandra Evening College, Naihati, North 24 Parganas, West Bengal, India
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
milanasargsyan5
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Unit 5: Dividend Decisions and its theories
Unit 5: Dividend Decisions and its theoriesUnit 5: Dividend Decisions and its theories
Unit 5: Dividend Decisions and its theories
bharath321164
 
The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...
Sandeep Swamy
 
Envenomation---Clinical Toxicology. pptx
Envenomation---Clinical Toxicology. pptxEnvenomation---Clinical Toxicology. pptx
Envenomation---Clinical Toxicology. pptx
rekhapositivity
 
How to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of saleHow to manage Multiple Warehouses for multiple floors in odoo point of sale
How to manage Multiple Warehouses for multiple floors in odoo point of sale
Celine George
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Studying Drama: Definition, types and elements
Studying Drama: Definition, types and elementsStudying Drama: Definition, types and elements
Studying Drama: Definition, types and elements
AbdelFattahAdel2
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdfExploring-Substances-Acidic-Basic-and-Neutral.pdf
Exploring-Substances-Acidic-Basic-and-Neutral.pdf
Sandeep Swamy
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
milanasargsyan5
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Unit 5: Dividend Decisions and its theories
Unit 5: Dividend Decisions and its theoriesUnit 5: Dividend Decisions and its theories
Unit 5: Dividend Decisions and its theories
bharath321164
 
The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...
Sandeep Swamy
 
Envenomation---Clinical Toxicology. pptx
Envenomation---Clinical Toxicology. pptxEnvenomation---Clinical Toxicology. pptx
Envenomation---Clinical Toxicology. pptx
rekhapositivity
 

Hacking and Types of Hacker.

  • 2. HISTORY OF HACKING: • THE FIRST HACKER WAS APPEARED IN 1960’S AT THE MASSACHUSETTS INSTITUTE OF TECHNOLOGY(MIT) • DURING THE 1970’S, A DIFFERENT KIND OF HACKER APPEARED: PHONE PHREAKER OR PHONE HACKER
  • 3. WHAT IS HACKING: • IN COMPUTING, A HACKER IS ANY SKILLED COMPUTER EXPERT THAT USES THEIR TECHNICAL KNOWLEDGE TO OVERCOME A PROBLEM. WHILE "HACKER" CAN REFER TO ANY COMPUTER PROGRAMMER, THE TERM HAS BECOME ASSOCIATED IN POPULAR CULTURE WITH A "SECURITY HACKER", SOMEONE WHO, WITH THEIR TECHNICAL KNOWLEDGE, USES BUGS OR EXPLOITS TO BREAK INTO COMPUTER SYSTEMS.
  • 4. TYPES OF HACKER: Hacker Ethical Hacker (White hat) Cracker (Black hat) Grey hat (Both)
  • 5. Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration Testing and vulnerability assessments. Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
  • 6. HACKING TECHNIQUES: 1. KEYLOGGER 2. DENIAL OF SERVICE (DOSDDOS) 3. WATERHOLE ATTACKS 4. FAKE WAP 5. EAVESDROPPING (PASSIVE ATTACKS) 6. PHISHING 7. VIRUS, TROJEN ETC. 8. CLICKJACKING ATTACKS 9. COOKIE THEFT 10. BAIT AND SWITCH
  • 7. KEYLOGGER: • KEYLOGGER IS A SIMPLE SOFTWARE THAT RECORDS THE KEY SEQUENCE AND STROKES OF YOUR KEYBOARD INTO A LOG FILE ON YOUR MACHINE. THESE LOG FILES MIGHT EVEN CONTAIN YOUR PERSONAL EMAIL IDS AND PASSWORDS. • KEYLOGGER IS ONE OF THE MAIN REASONS WHY ONLINE BANKING SITES GIVE YOU AN OPTION TO USE THEIR VIRTUAL KEYBOARDS.
  • 8. DENIAL OF SERVICE ATTACK: • A DENIAL OF SERVICE ATTACK IS A HACKING TECHNIQUE TO TAKE DOWN A SITE OR SERVER BY FLOODING THAT SITE OR SERVER WITH A LOT OF TRAFFIC THAT THE SERVER IS UNABLE TO PROCESS ALL THE REQUESTS IN THE REAL TIME AND FINALLY CRASHES DOWN. • FOR DDOS ATTACKS, HACKERS OFTEN DEPLOY BOTNETS OR ZOMBIE COMPUTERS WHICH HAVE GOT THE ONLY WORK TO FLOOD YOUR SYSTEM WITH REQUEST PACKETS.
  • 9. WATERHOLE ATTACKS: • IF YOU ARE A BIG FAN OF DISCOVERY OR NATIONAL GEOGRAPHIC CHANNELS, YOU COULD RELATE EASILY WITH THE WATERHOLE ATTACKS. TO POISON A PLACE, IN THIS CASE, THE HACKER HITS THE MOST ACCESSIBLE PHYSICAL POINT OF THE VICTIM. • FOR EXAMPLE, IF THE SOURCE OF A RIVER IS POISONED, IT WILL HIT THE ENTIRE STRETCH OF ANIMALS DURING SUMMER. IN THE SAME WAY, HACKERS TARGET THE MOST ACCESSED PHYSICAL LOCATION TO ATTACK THE VICTIM. THAT POINT COULD BE A COFFEE SHOP, A CAFETERIA ETC. • ONCE HACKERS ARE AWARE OF YOUR TIMINGS, THEY MIGHT CREATE A FAKE WI-FI ACCESS POINT AND MODIFY YOUR MOST VISITED WEBSITE TO REDIRECT THEM TO YOU TO GET YOUR PERSONAL INFORMATION.
  • 10. FAKE WAP: • EVEN JUST FOR FUN, A HACKER CAN USE SOFTWARE TO FAKE A WIRELESS ACCESS POINT. THIS WAP CONNECTS TO THE OFFICIAL PUBLIC PLACE WAP. ONCE YOU GET CONNECTED THE FAKE WAP, A HACKER CAN ACCESS YOUR DATA, JUST LIKE IN THE ABOVE CASE. • EX: • TOOL: WI-FI PUMPKIN
  • 11. EAVESDROPPING (PASSIVE ATTACKS): • UNLIKE OTHER ATTACKS WHICH ARE ACTIVE IN NATURE, USING A PASSIVE ATTACK, A HACKER JUST MONITORS THE COMPUTER SYSTEMS AND NETWORKS TO GAIN SOME UNWANTED INFORMATION. • THE MOTIVE BEHIND EAVESDROPPING IS NOT TO HARM THE SYSTEM BUT TO GET SOME INFORMATION WITHOUT BEING IDENTIFIED.
  • 12. PHISHING: • PHISHING IS A HACKING TECHNIQUE USING WHICH A HACKER REPLICATES THE MOST-ACCESSED SITES AND TRAPS THE VICTIM BY SENDING THAT SPOOFED LINK. • ONCE THE VICTIM TRIES TO LOGIN OR ENTER SOME DATA, THE HACKER GETS THAT PRIVATE INFORMATION OF THE TARGET VICTIM USING THE TROJAN RUNNING ON THE FAKE SITE.
  • 13. VIRUS OR TROJANS ETC. : • VIRUS OR TROJANS ARE MALICIOUS SOFTWARE PROGRAMS WHICH GET INSTALLED INTO THE VICTIM’S SYSTEM AND KEEPS SENDING THE VICTIMS DATA TO THE HACKER.
  • 14. CLICKJACKING: • CLICKJACKING IS ALSO KNOWN BY A DIFFERENT NAME, UI REDRESS. IN THIS ATTACK, THE HACKER HIDES THE ACTUAL UI WHERE THE VICTIM IS SUPPOSED TO CLICK. • IN ANOTHER WORD, THE ATTACKER HIJACKS THE CLICKS OF THE VICTIM THAT AREN’T MEANT FOR THE EXACT PAGE, BUT FOR A PAGE WHERE THE HACKER WANTS YOU TO BE.
  • 15. COOKIE THEFT: • THE COOKIES OF A BROWSER KEEP OUR PERSONAL DATA SUCH AS BROWSING HISTORY, USERNAME, AND PASSWORDS FOR DIFFERENT SITES THAT WE ACCESS. ONCE THE HACKER GETS THE ACCESS TO YOUR COOKIE, HE CAN EVEN AUTHENTICATE HIMSELF AS YOU ON A BROWSER.
  • 16. BAIT AND SWITCH: • USING BAIT AND SWITCH HACKING TECHNIQUE, THE HACKER RUNS A MALICIOUS PROGRAM WHICH THE USER BELIEVES TO BE AUTHENTIC. THIS WAY, AFTER INSTALLING THE MALICIOUS PROGRAM ON YOUR COMPUTER, THE HACKER GETS UNPRIVILEGED ACCESS TO YOUR COMPUTER.
  • 17. HACKING LANGUAGE: 1. WEB HACKING: SINCE MOST OF THE TECH IS BUILD AROUND WORLD WIDE WEB, IT IS IMPORTANT TO LEARN WEB HACKING TO BE A GOOD HACKER. LET’S SAY YOU ARE INTERESTED IN HACKING WEB APPS AND/OR WEBSITES THEN YOU WILL NEED TO LEARN WEB CODING. WEBSITES USE MOSTLY HTML, PHP AND JAVASCRIPT SO IT IS IMPORTANT TO LEARN THESE THREE. • HTML: ONE OF THE EASIEST AND WIDELY USED STATIC MARKUP WEB LANGUAGE PRESENT IN EACH AND EVERY WEBSITE YOU SEE IN YOUR BROWSER. IT’S RECOMMENDED TO LEARN HTML BECAUSE IT HELPS UNDERSTANDING WEB ACTIONS, RESPONSE, AND LOGIC. • JAVASCRIPT: JS IS A CLIENT-SIDE WEB PROGRAMMING MOSTLY USED IN WEB SITES FOR BETTER USER INTERFACE AND QUICK RESPONSE. IF YOU ARE INTERESTED IN A HACKING CAREER YOU NEED TO LEARN JAVASCRIPT BECAUSE IT HELPS TO UNDERSTAND CLIENT-SIDE MECHANISM WHICH IS ESSENTIAL FOR FINDING CLIENT-SIDE FLAWS.
  • 18. CONT.…. • PHP: A DYNAMIC SERVER-SIDE LANGUAGE WHICH IS RESPONSIBLE FOR MANAGING WEB-APPS AND DATABASE. PHP IS CONSIDERED ONE OF THE MOST ESSENTIAL LANGUAGE BECAUSE IT CONTROLS EVERYTHING ON SITE AND SERVER, LIKE A CAPTAIN OF A SHIP. IT IS ADVISED TO LEARN PHP NICELY. • SQL: SQL IS RESPONSIBLE FOR STORING AND MANAGING SENSITIVE AND CONFIDENTIAL DATA SUCH AS USER CREDENTIALS, BANK AND PERSONAL INFORMATION ABOUT THE WEBSITE VISITORS. BLACK HAT HACKERS MOSTLY TARGET SQL DATABASE AND STEAL INFORMATION WHICH IS LATER SOLD ON UNDERGROUND DARK WEB FORUM. IF YOU WANT TO BE GOOD SECURITY RESEARCHER, YOU SHOULD LEARN SQL SO THAT YOU CAN FIND FLAWS IN A WEBSITE AND REPORT THEM.
  • 19. CONT... 2. EXPLOIT WRITING AFTER WEB HACKING, ANOTHER MOST IMPORTANT FEATURE OF HACKING IS EXPLOITS. YOU CAN CRACK A PARTICULAR SOFTWARE BY WRITING A EXPLOIT. BUT TO WRITE A EXPLOIT YOU NEED TO LEARN EITHER PYTHON OR RUBY. • PYTHON: IT IS SAID THAT A SECURITY RESEARCHER OR HACKER SHOULD KNOW PYTHON BECAUSE IT THE CORE LANGUAGE FOR CREATING EXPLOITS AND TOOLS. SECURITY EXPERTS AND EVEN PRO HACKERS SUGGEST THAT MASTER PYTHON IS THE BEST WAY TO LEARN HACKING. PYTHON OFFERS WIDER FLEXIBILITY AND YOU CAN CREATE EXPLOITS ONLY IF YOU ARE GOOD IN PYTHON. • RUBY: RUBY IS A SIMPLE YET COMPLICATED OBJECT-ORIENTED LANGUAGE. RUBY IS VERY USEFUL WHEN IT COMES TO EXPLOIT WRITING. IT IS USED FOR METERPRETER SCRIPTING BY HACKERS. THE MOST FAMOUS HACKER TOOL, METASPLOIT FRAMEWORK IS PROGRAMMED IN RUBY. THOUGH RUBY MAY NOT BE AS VERSATILE AS PYTHON, KNOWLEDGE OF RUBY IS MUST IN UNDERSTANDING EXPLOITS.
  • 20. CONT.… • REVERSE ENGINEERING: • REVERSE ENGINEERING, THE PROCESS OF TAKING A SOFTWARE PROGRAM’S BINARY CODE AND RECREATING IT SO AS TO TRACE IT BACK TO THE ORIGINAL SOURCE CODE. IF YOU KNOW REVERSE ENGINEERING YOU CAN FIND FLAWS AND BUGS EASILY. IF YOU WANT TO LEARN REVERSE ENGINEERING YOU NEED TO KNOW C, C++ AND JAVA. THE PROCESS OF CONVERTING THE CODE WRITTEN IN HIGH LEVEL LANGUAGE INTO A LOW LEVEL LANGUAGE WITHOUT CHANGING THE ORIGINAL PROGRAM IS KNOWN AS REVERSE ENGINEERING.
  • 21. HOW TO TRANSLATE THE HACKERS’ LANGUAGE 1 -> I OR L 3 -> E 4 -> A 7 -> T 9 -> G 0 -> O $ -> S | -> I OR L || -> N |/| -> M S -> Z Z -> S F -> PH PH -> F X -> CK CK -> X
  • 22. HOW TO TRANSLATE THE HACKERS’ LANGUAGE • EX) • 1 D1D N0T H4CK TH1S P4G3, 1T W4S L1K3 TH1S WH3N 1 H4CK3D 1N • I DID NOT HACK THIS PAGE, IT WAS LIKE THIS WHEN I HACKED IN
  • 23. TOP 10 ETHICAL HACKER: 1) RAHUL TYAGI 2) PRANAV MISTRY 3) ANKIT FADIA 4) KOUSHIK DUTTA 5) VIVEK RAMACHANDRAN 6) TRISHNEET ARORA 7) SUNNY VAGHELA 8) BENILD JOSEPH 9) FALGUN RATHOD 10) JAYANT KRISHNAMURTHY