SlideShare a Scribd company logo
A SEMINAR BY
---JASMINE.A.JAMAN
CONTENTS
1. What is Hacking?
2. History of Hacking
3. Who is Hacker?
4. Famous Hackers in History
5. Why do Hackers Hack?
6. Types of Hacking
7. Techniques of Hacking
8. How to give a password to an account
9. What should do after hacked
10. How to secure our data
11. Advantages of Hacking
12. Disadvantages of Hacking
13. Conclusion
14. Questions
WHAT IS HACKING?
• The process of attempting to gain or successfully gaining ,
unauthorized access to computer resources is called
Hacking
• Hacking refers to an array of activities which are done to
intrude someone else’s personal information so as to use it
for malicious , unwanted purposes.
HISTORY OF HACKING
• Hacking has been part of Computing for nearly 40 years .
• First hacker emerged at MIT in 1960.
• 1960s: Interestingly, the term “hack” did not originate
from computers. Rather, it originated with MIT's Tech
Model Railroad Club way back in 1961 when club
members hacked their high-tech train sets in order to
modify their functions .
Hacking- Ethical/ Non-ethical, Cyber Security.
WHO IS HACKER?
• In the computer security context , Hacker
is the one who seeks and exploits
weakness in the computer system or
computer network.
• The term Hackers is reclaimed by
computer programmers who argue that
someone who breaks into computers must
be called as Cracker.
Hacking- Ethical/ Non-ethical, Cyber Security.
WHY DO HACKERS HACK?
Just for fun.
Show off.
 Hack others systems secretly.
Notify many people their thought .
Steal important information.
Destroy enemy’s computer network during war.
TYPES OF HACKING
• Website Hacking
• Network Hacking
• Ethical Hacking
• Email Hacking
• Password Hacking
• Online Banking Hacking
• Computer Hacking
WEBSITE HACKING
• Hacking a Website means taking
overall control of the website from
the website owner to the person who
hacks the website.
NETWORK HACKING
• Network Hacking is generally means
gathering information about domain
by using tools like Telnet, NslookUp,
Ping, Tracert, Netstat, etc. It also
includes OS Fingerprinting , Port
Scanning and Port Surfing using
various tools.
ETHICAL HACKING
• Ethical Hacking is where a person
hacks to find weakness in the system
and usually patches them.
• Ethical Hacking is also known as
Penetration testing, Intrusion testing,
or Red teaming.
EMAIL HACKING
• Email Hacking is the unauthorized access to, or manipulation
of, an email account or email correspondence.
PASSWORD HACKING
• Password Hacking, sometimes referred to as password
cracking, is a method of recovering passwords from data
transmitted by or stored on a computer
ONLINE BANKING HACKING
• Unauthorised accessing of bank accounts without the permission
of account holder is known as Online Banking Hacking.
COMPUTER HACKING
• Computer Hacking refers to the practice of modifying or
altering computer software and hardware to accomplish a
goal that is considered to be outside of the creator's original
objective.
• Computer Hacking is when files on the computer are
viewed, created or edited without Computer owner’s
authorization.
TECHNIQUES OF HACKING
1.Keylogger:
Keylogger is a simple software that records
the key sequence and strokes of your
keyboard into a log file on your machine. These
log files might even contain your personal
email IDs and passwords.
2. Denial of Service (DoSDDoS):
A Denial of Service attack is a hacking
technique to take down a site or server by
flooding that site or server with a lot of traffic
that the server is unable to process all the
requests in the real time and finally crashes
down.
TECHNIQUES OF HACKING
3.Waterhole Attacks: To poison a place ,in
this case, the hacker hits the most accessible
physical point of the Victim.
4. Fake WAP: Hacker uses a software to
fake a wireless access point . WAP connects to the
public place WAP. Once you get connected to the
fake WAP , Hacker can Access your data same as
in above case.
TECHNIQUES OF HACKING
5.Eawesdropping(Passive Attacks):
6.Phishing:
Unlike other attacks which are active in
nature, using a passive attack, a hacker just
monitors the computer systems and networks
to gain some unwanted information.
Phishing is a hacking technique using
which a hacker replicates the most-
accessed sites and traps the victim by
sending that spoofed link.
TECHNIQUES OF HACKING
7.Virus, Trojan etc.:
8.ClickJacking:
Virus or trojans are malicious software
programs which get installed into the victim’s
system and keeps sending the victims data to
the hacker.
ClickJacking is also known by a different
name, UI Redress. In this attack, the hacker
hides the actual UI where the victim is
supposed to click
TECHNIQUES OF HACKING
9.Cookies Theft:
10.Bait & Switch:
The cookies of a browser keep our personal data
such as browsing history, username, and passwords
for different sites that we access. Once the hacker
gets the access to your cookie, he can even
authenticate himself as you on a browser.
Using bait and switch hacking technique,
an attacker can buy advertising spaces on
the websites. Later, when a user clicks on
the ad, he might get directed to a page
that’s infected with malware.
WHAT SHOULD DO AFTER HACKED?
Shutdown the system .
Separate the system from network.
Restore the system with Backup
Reinstall all the programs
Connect the system to the network
Its better to call the police
HOW TO SET A PASSWORD TO YOUR ACCOUNT?
• Use unique passwords for your accounts.
• Choose a combination of letters ,numbers
and symbols to make a unique password.
HOW TO SECURE OUR DATA?
1  i or l
3  e
4  a
+  t
9  g
0  o
$  s
|  i or l
|/|  M
||  N
s  z
c  c
f  ph
Ph  f
x  ks
ks  x
ADVANTAGES OF HACKING
Hacking is quite useful in the following scenarios :
1.To recover lost information, especially in case you lost
your password.
2.To perform penetration testing to strengthen computer and
network security.
3.To put adequate preventative measures in place to prevent
security breaches.
4.To have a computer system that prevents malicious
hackers from gaining access.
DISADVANTAGES OF HACKING
• Hacking is quite dangerous if it is done with harmful
intent. It can cause −
1. Massive security breach.
2. Unauthorized system access on private information.
3. Privacy violation.
4. Hampering system operation.
5. Denial of service attacks.
6. Malicious attack on the system.
CONCLUSION
• Keep your password protected. Your password should be
combination of characters , digits, special symbols. Do
not respond to fake or phishing Email. Whenever you do
any online transaction always keep watch on site whether
the protocol of site is “https” and whether it has a lock
Symbol or not.
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.

More Related Content

What's hot (20)

How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Hacking final
Hacking finalHacking final
Hacking final
JiyaaNaqvi
 
Hacking intro
Hacking introHacking intro
Hacking intro
Milind Mishra
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Devendra Yadav
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Tharindu Kalubowila
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ganesh Vadulekar
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
Tenet Systems Pvt Ltd
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
Lokender Yadav
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
padmeshagrekar
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Namrata Raiyani
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Harshit Upadhyay
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
HarishBabuKaveri
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
S Sai Karthik
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
sumit dimri
 

Similar to Hacking- Ethical/ Non-ethical, Cyber Security. (20)

HACKING
HACKINGHACKING
HACKING
Shubham Agrawal
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ritwick Mukherjee
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
vamshimatangi
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
Animesh Behera
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
 
Hacking
Hacking Hacking
Hacking
ANUSHAMOL2
 
Hacking
Hacking Hacking
Hacking
ANUSHAMOL2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Keith Brooks
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
1.hacking and its types for all types of attackers.ppt
1.hacking and its types for all types of attackers.ppt1.hacking and its types for all types of attackers.ppt
1.hacking and its types for all types of attackers.ppt
RohitAhuja58
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Bharat Sabne
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
GIRISHKUMARBC1
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
Jeanie Arnoco
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
vamshimatangi
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
1.hacking and its types for all types of attackers.ppt
1.hacking and its types for all types of attackers.ppt1.hacking and its types for all types of attackers.ppt
1.hacking and its types for all types of attackers.ppt
RohitAhuja58
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
GIRISHKUMARBC1
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
Jeanie Arnoco
 

More from JasminJaman1 (6)

Virtual / Artificial Reality-Augmented Reality
Virtual / Artificial Reality-Augmented RealityVirtual / Artificial Reality-Augmented Reality
Virtual / Artificial Reality-Augmented Reality
JasminJaman1
 
Networking-digital telecommunications network.
Networking-digital telecommunications network.Networking-digital telecommunications network.
Networking-digital telecommunications network.
JasminJaman1
 
Blue brain, Virtual Brain.
Blue brain, Virtual Brain.Blue brain, Virtual Brain.
Blue brain, Virtual Brain.
JasminJaman1
 
Bill gates- Founder & owner of Microsoft
Bill gates- Founder & owner of MicrosoftBill gates- Founder & owner of Microsoft
Bill gates- Founder & owner of Microsoft
JasminJaman1
 
5 g wireless technology
5 g wireless technology5 g wireless technology
5 g wireless technology
JasminJaman1
 
3 d printing
3 d printing3 d printing
3 d printing
JasminJaman1
 
Virtual / Artificial Reality-Augmented Reality
Virtual / Artificial Reality-Augmented RealityVirtual / Artificial Reality-Augmented Reality
Virtual / Artificial Reality-Augmented Reality
JasminJaman1
 
Networking-digital telecommunications network.
Networking-digital telecommunications network.Networking-digital telecommunications network.
Networking-digital telecommunications network.
JasminJaman1
 
Blue brain, Virtual Brain.
Blue brain, Virtual Brain.Blue brain, Virtual Brain.
Blue brain, Virtual Brain.
JasminJaman1
 
Bill gates- Founder & owner of Microsoft
Bill gates- Founder & owner of MicrosoftBill gates- Founder & owner of Microsoft
Bill gates- Founder & owner of Microsoft
JasminJaman1
 
5 g wireless technology
5 g wireless technology5 g wireless technology
5 g wireless technology
JasminJaman1
 

Recently uploaded (20)

#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 

Hacking- Ethical/ Non-ethical, Cyber Security.

  • 2. CONTENTS 1. What is Hacking? 2. History of Hacking 3. Who is Hacker? 4. Famous Hackers in History 5. Why do Hackers Hack? 6. Types of Hacking 7. Techniques of Hacking 8. How to give a password to an account 9. What should do after hacked 10. How to secure our data 11. Advantages of Hacking 12. Disadvantages of Hacking 13. Conclusion 14. Questions
  • 3. WHAT IS HACKING? • The process of attempting to gain or successfully gaining , unauthorized access to computer resources is called Hacking • Hacking refers to an array of activities which are done to intrude someone else’s personal information so as to use it for malicious , unwanted purposes.
  • 4. HISTORY OF HACKING • Hacking has been part of Computing for nearly 40 years . • First hacker emerged at MIT in 1960. • 1960s: Interestingly, the term “hack” did not originate from computers. Rather, it originated with MIT's Tech Model Railroad Club way back in 1961 when club members hacked their high-tech train sets in order to modify their functions .
  • 6. WHO IS HACKER? • In the computer security context , Hacker is the one who seeks and exploits weakness in the computer system or computer network. • The term Hackers is reclaimed by computer programmers who argue that someone who breaks into computers must be called as Cracker.
  • 8. WHY DO HACKERS HACK? Just for fun. Show off.  Hack others systems secretly. Notify many people their thought . Steal important information. Destroy enemy’s computer network during war.
  • 9. TYPES OF HACKING • Website Hacking • Network Hacking • Ethical Hacking • Email Hacking • Password Hacking • Online Banking Hacking • Computer Hacking
  • 10. WEBSITE HACKING • Hacking a Website means taking overall control of the website from the website owner to the person who hacks the website.
  • 11. NETWORK HACKING • Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc. It also includes OS Fingerprinting , Port Scanning and Port Surfing using various tools.
  • 12. ETHICAL HACKING • Ethical Hacking is where a person hacks to find weakness in the system and usually patches them. • Ethical Hacking is also known as Penetration testing, Intrusion testing, or Red teaming.
  • 13. EMAIL HACKING • Email Hacking is the unauthorized access to, or manipulation of, an email account or email correspondence.
  • 14. PASSWORD HACKING • Password Hacking, sometimes referred to as password cracking, is a method of recovering passwords from data transmitted by or stored on a computer
  • 15. ONLINE BANKING HACKING • Unauthorised accessing of bank accounts without the permission of account holder is known as Online Banking Hacking.
  • 16. COMPUTER HACKING • Computer Hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective. • Computer Hacking is when files on the computer are viewed, created or edited without Computer owner’s authorization.
  • 17. TECHNIQUES OF HACKING 1.Keylogger: Keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. These log files might even contain your personal email IDs and passwords. 2. Denial of Service (DoSDDoS): A Denial of Service attack is a hacking technique to take down a site or server by flooding that site or server with a lot of traffic that the server is unable to process all the requests in the real time and finally crashes down.
  • 18. TECHNIQUES OF HACKING 3.Waterhole Attacks: To poison a place ,in this case, the hacker hits the most accessible physical point of the Victim. 4. Fake WAP: Hacker uses a software to fake a wireless access point . WAP connects to the public place WAP. Once you get connected to the fake WAP , Hacker can Access your data same as in above case.
  • 19. TECHNIQUES OF HACKING 5.Eawesdropping(Passive Attacks): 6.Phishing: Unlike other attacks which are active in nature, using a passive attack, a hacker just monitors the computer systems and networks to gain some unwanted information. Phishing is a hacking technique using which a hacker replicates the most- accessed sites and traps the victim by sending that spoofed link.
  • 20. TECHNIQUES OF HACKING 7.Virus, Trojan etc.: 8.ClickJacking: Virus or trojans are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker. ClickJacking is also known by a different name, UI Redress. In this attack, the hacker hides the actual UI where the victim is supposed to click
  • 21. TECHNIQUES OF HACKING 9.Cookies Theft: 10.Bait & Switch: The cookies of a browser keep our personal data such as browsing history, username, and passwords for different sites that we access. Once the hacker gets the access to your cookie, he can even authenticate himself as you on a browser. Using bait and switch hacking technique, an attacker can buy advertising spaces on the websites. Later, when a user clicks on the ad, he might get directed to a page that’s infected with malware.
  • 22. WHAT SHOULD DO AFTER HACKED? Shutdown the system . Separate the system from network. Restore the system with Backup Reinstall all the programs Connect the system to the network Its better to call the police
  • 23. HOW TO SET A PASSWORD TO YOUR ACCOUNT? • Use unique passwords for your accounts. • Choose a combination of letters ,numbers and symbols to make a unique password.
  • 24. HOW TO SECURE OUR DATA? 1  i or l 3  e 4  a +  t 9  g 0  o $  s |  i or l |/|  M ||  N s  z c  c f  ph Ph  f x  ks ks  x
  • 25. ADVANTAGES OF HACKING Hacking is quite useful in the following scenarios : 1.To recover lost information, especially in case you lost your password. 2.To perform penetration testing to strengthen computer and network security. 3.To put adequate preventative measures in place to prevent security breaches. 4.To have a computer system that prevents malicious hackers from gaining access.
  • 26. DISADVANTAGES OF HACKING • Hacking is quite dangerous if it is done with harmful intent. It can cause − 1. Massive security breach. 2. Unauthorized system access on private information. 3. Privacy violation. 4. Hampering system operation. 5. Denial of service attacks. 6. Malicious attack on the system.
  • 27. CONCLUSION • Keep your password protected. Your password should be combination of characters , digits, special symbols. Do not respond to fake or phishing Email. Whenever you do any online transaction always keep watch on site whether the protocol of site is “https” and whether it has a lock Symbol or not.