SlideShare a Scribd company logo
The Chinese Search
Engine• Baidu is the dominant Chinese internet search engine company, and it is
the equivalent to Google in the United States.
• Baidu, Inc. was incorporated on 18 January, 2000 and was created by Robin
Li and Eric Xu.
• Baidu.com is the second most popular but a Chinese language search
engine with nearly 10% usage share in searches.
• Baidu is similar to Google and offers similar products and services, but the
focus is China where it controls most of the search market.
• Baidu censors search results and other content in accordance with Chinese
regulations. Hackesh
Hacking Hacking
Hackesh
• What is Hacking
• History of Hacking
• Who is Hacker
• Types of Hackers
• Why do Hackers hack?
• Famous hackers in history
• Types of Hacking
• How to give a password to account
• What should do after hacked
• How to secure our data
• Advantages of Hacking
• Disadvantages of Hacking
• Conclusion Hackesh
• Hacking is usually done to gain unauthorized access
to a computer system or a computer network, either
to harm the systems or to steal sensitive information
available on the computer
• Hacking is usually legal as long as it is being done to find
weaknesses in a computer or network system for testing
purpose.
• This sort of hacking is what we call Ethical Hacking
Hackesh
• In 1988 a "worm program" written by a college
student shut down about 10 percent of computers
connected to the Internet.
• This was the beginning of the era of cyber attacks.
• Today we have about 10,000 incidents of cyber
attacks which are reported and the number grows.
Hackesh
• A Hacker is a person who finds and exploits weakness in
computer systems to gain access
• First -> Cracker
• A hacker is a Person who thinks outside the box
• A hacker is a person who discover unknowns features and
properties in a computer or in a computer network
• A hacker is a person who is highly creative and dedicated to
knowledge
• All hackers are not criminals that depends on their work
Hackesh
Black Hat
Hacker
Gray Hat
Hacker
White Hat
Hacker
Hackesh
• Website Hacking
• Email Hacking
• Network Hacking
• Password Hacking
• Online transactions Hacking
• Computer Hacking
• Mobile Hacking
Hackesh
• Hacking a website means taking unauthorized control over a
web server and its associated software such as databases and
other interfaces.
• Hacking a website is getting the password to add, edit, delete
data stored in that website.
• After the attack done by a hacker, if he has changed the
password of that website software, then it will be tough for
theWebmaster to get it back.
• Hacker will insert harmful programs by inserting malicious
codes into the website. It will also cause to the website server
to be slow.
Hackesh
• Hacking on computer network is often done through
scripts and other network software.
• These specially-designed software programs generally
manipulate data passing through a network connection in
ways designed to obtain more information about how the
target system works
• Worms
• DOS
• RAT
• Trojans Hackesh
• This is the process of recovering secret passwords from data
that has been stored in or transmitted by a computer system.
• Find a valid user ID
• Create a list of possible passwords
• Rank the passwords from high probability to low
• They will type in each password with the help of Crunch tool
• DictionaryAttack
• Brute force Attack
Hackesh
• It includes getting unauthorized access on an Email account
and using it without taking the consent of its owner.
• While there exists many nasty websites on the internet that
mislead people with fake methods and false promises to
obtain passwords, some often present readers with obsolete
methods that can no longer be used.
• key logging
• Phishing
Hackesh
• Ethical hacking involves finding weaknesses in a computer or network system
for testing purpose and finally getting them fixed.
• Ethical Hacking sometimes called as PenetrationTesting is an act of
intruding/penetrating into system or networks to find out threats,
• vulnerabilities in those systems which a malicious attacker may find and exploit
causing loss of data, financial loss or other major damages.
• The purpose of ethical hacking is to improve the security of the network or
systems by fixing the vulnerabilities found during testing.
• Ethical hackers may use the same methods and tools used by the malicious
hackers but with the permission of the authorized person for the purpose of
improving the security and defending the systems from attacks by malicious
users.
• Ethical hackers are expected to report all the vulnerabilities and weakness found
during the process to the management.Hackesh
• This is the process of stealing computer ID and password
by applying hacking methods and getting unauthorized
access to a computer system.
• The Practice of modifying computer hardware and
software to accomplish a goal outside of the creator’s
original purpose.
• To be accused of hacking, it must be proven that someone
gained access to the computer, intending to hack It
without permission.
Hackesh
• When you use your credit or debit card to bank online or
make any kind of electronic financial transaction, you are in
a risk that your personal information or money could be
stolen
• Especially now when are doing online shopping almost
daily, this threats almost each one of us.
• Threw PHISHING
• TROJANVirus to steal information key Logger
• SESSION Hijacking threwWi-Fi redirect the path
Hackesh
• Mobile hacking is the practice of manipulating or gaining
unauthorized access to mobile phones, such as by
intercepting telephone calls or accessing voicemail message.
• When the unauthorized access is to the phone user’s
conversation, it is more commonly, it is more commonly
referred to as phone tapping.
• RAT- Remote AdministrativeTool
• Key logging
• Spyware
• Unwanted application
Hackesh
• Venting anger at a company or organization
• Terrorism
• Financial Gain
• For fun
Hackesh
• Can used to recover lost information where the
computer password has been lost.
• Teaches you that no technology is 100% secure.
• To test how good security is on your own network.
• They call it white hat computer hacking.
Hackesh
• Criminal can use it to their advantage.
• It can harm someone's privacy
• It's Illegal
Hackesh
• Keep your password protected.
• Write your password should be with combination of
characters, digits, special symbols.
• Do not respond to feck on fishing email.
• when you are doing any online transection always
keep watch on site whether the protocol of site is
https & whether there is a lock symbol .
Hackesh
Hackesh

More Related Content

What's hot (20)

Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Hackers
HackersHackers
Hackers
 
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackers
 
Web defacement
Web defacementWeb defacement
Web defacement
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Similar to Hacking 2018

ethicalhacking1 final.pdf
ethicalhacking1 final.pdfethicalhacking1 final.pdf
ethicalhacking1 final.pdfKALASHSHAR
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.pptShivaniSingha1
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online SecurityJeanie Arnoco
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxmahamnisar6
 
ETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGEETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGEHritik Jage
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younasShahzad Younas
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...GIRISHKUMARBC1
 

Similar to Hacking 2018 (20)

Hacking
HackingHacking
Hacking
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Hacking
HackingHacking
Hacking
 
ethicalhacking1 final.pdf
ethicalhacking1 final.pdfethicalhacking1 final.pdf
ethicalhacking1 final.pdf
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
ETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGEETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGE
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 

Recently uploaded

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfOndejSur
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideVarun Mithran
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理aagad
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxAnkitscribd
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?Linksys Velop Login
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkklolsDocherty
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfappinfoedgeca
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxChloeMeadows1
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxabhinandnam9997
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresencePC Doctors NET
 

Recently uploaded (14)

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptx
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 

Hacking 2018

  • 1. The Chinese Search Engine• Baidu is the dominant Chinese internet search engine company, and it is the equivalent to Google in the United States. • Baidu, Inc. was incorporated on 18 January, 2000 and was created by Robin Li and Eric Xu. • Baidu.com is the second most popular but a Chinese language search engine with nearly 10% usage share in searches. • Baidu is similar to Google and offers similar products and services, but the focus is China where it controls most of the search market. • Baidu censors search results and other content in accordance with Chinese regulations. Hackesh
  • 3. • What is Hacking • History of Hacking • Who is Hacker • Types of Hackers • Why do Hackers hack? • Famous hackers in history • Types of Hacking • How to give a password to account • What should do after hacked • How to secure our data • Advantages of Hacking • Disadvantages of Hacking • Conclusion Hackesh
  • 4. • Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer • Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. • This sort of hacking is what we call Ethical Hacking Hackesh
  • 5. • In 1988 a "worm program" written by a college student shut down about 10 percent of computers connected to the Internet. • This was the beginning of the era of cyber attacks. • Today we have about 10,000 incidents of cyber attacks which are reported and the number grows. Hackesh
  • 6. • A Hacker is a person who finds and exploits weakness in computer systems to gain access • First -> Cracker • A hacker is a Person who thinks outside the box • A hacker is a person who discover unknowns features and properties in a computer or in a computer network • A hacker is a person who is highly creative and dedicated to knowledge • All hackers are not criminals that depends on their work Hackesh
  • 8. • Website Hacking • Email Hacking • Network Hacking • Password Hacking • Online transactions Hacking • Computer Hacking • Mobile Hacking Hackesh
  • 9. • Hacking a website means taking unauthorized control over a web server and its associated software such as databases and other interfaces. • Hacking a website is getting the password to add, edit, delete data stored in that website. • After the attack done by a hacker, if he has changed the password of that website software, then it will be tough for theWebmaster to get it back. • Hacker will insert harmful programs by inserting malicious codes into the website. It will also cause to the website server to be slow. Hackesh
  • 10. • Hacking on computer network is often done through scripts and other network software. • These specially-designed software programs generally manipulate data passing through a network connection in ways designed to obtain more information about how the target system works • Worms • DOS • RAT • Trojans Hackesh
  • 11. • This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. • Find a valid user ID • Create a list of possible passwords • Rank the passwords from high probability to low • They will type in each password with the help of Crunch tool • DictionaryAttack • Brute force Attack Hackesh
  • 12. • It includes getting unauthorized access on an Email account and using it without taking the consent of its owner. • While there exists many nasty websites on the internet that mislead people with fake methods and false promises to obtain passwords, some often present readers with obsolete methods that can no longer be used. • key logging • Phishing Hackesh
  • 13. • Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed. • Ethical Hacking sometimes called as PenetrationTesting is an act of intruding/penetrating into system or networks to find out threats, • vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. • The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. • Ethical hackers may use the same methods and tools used by the malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems from attacks by malicious users. • Ethical hackers are expected to report all the vulnerabilities and weakness found during the process to the management.Hackesh
  • 14. • This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system. • The Practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. • To be accused of hacking, it must be proven that someone gained access to the computer, intending to hack It without permission. Hackesh
  • 15. • When you use your credit or debit card to bank online or make any kind of electronic financial transaction, you are in a risk that your personal information or money could be stolen • Especially now when are doing online shopping almost daily, this threats almost each one of us. • Threw PHISHING • TROJANVirus to steal information key Logger • SESSION Hijacking threwWi-Fi redirect the path Hackesh
  • 16. • Mobile hacking is the practice of manipulating or gaining unauthorized access to mobile phones, such as by intercepting telephone calls or accessing voicemail message. • When the unauthorized access is to the phone user’s conversation, it is more commonly, it is more commonly referred to as phone tapping. • RAT- Remote AdministrativeTool • Key logging • Spyware • Unwanted application Hackesh
  • 17. • Venting anger at a company or organization • Terrorism • Financial Gain • For fun Hackesh
  • 18. • Can used to recover lost information where the computer password has been lost. • Teaches you that no technology is 100% secure. • To test how good security is on your own network. • They call it white hat computer hacking. Hackesh
  • 19. • Criminal can use it to their advantage. • It can harm someone's privacy • It's Illegal Hackesh
  • 20. • Keep your password protected. • Write your password should be with combination of characters, digits, special symbols. • Do not respond to feck on fishing email. • when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol . Hackesh