• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Hacking
 

Hacking

on

  • 2,639 views

 

Statistics

Views

Total Views
2,639
Views on SlideShare
2,638
Embed Views
1

Actions

Likes
1
Downloads
50
Comments
4

1 Embed 1

https://www.facebook.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

14 of 4 previous next Post a comment

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • http://gg.gg/19qo2
    Are you sure you want to
    Your message goes here
    Processing…
  • You Can Free Download Latest & Working -> http://gg.gg/PasswordHack
    Are you sure you want to
    Your message goes here
    Processing…
  • I Got The Full File, I Just Wanna Share to You Guyszz.. It's Working You Can The Download The Full File + Instructions Here : http://gg.gg/setupexe
    Are you sure you want to
    Your message goes here
    Processing…
  • Fake! Don't Even Try This, You Should Try This One Below Link , http://gg.gg/PasswordHack it Worked Great For Me, This is A Great Team of Game Hackers That Released Great Hacking Tools For More Games, They Have 24/24 Support And Are So Professional! Try it :)
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Hacking Hacking Presentation Transcript

    • KOTHIWAL INSTITUTE OF TECHNOLOGY & PROFESSIONAL STUDIESHACKING CRACKING PRESENTED BY NAME : NADEEM AHMAD BRANCH : (I.T.) 3rd Year ROLL NO. : 0952113008
    • Contents:Definitions of hackingDefinitions of hackerHackers And CrackersHistory of hackingTypes of hackerTypes of hacking Why do hackers hack
    • ExamplesHow to hack Yahoo Password?How to hack facebook account password?How to hack gmail account password?
    • Definitions of hackingHacking is unauthorized use of computer and network resources.Stealing of data and information from someone else’s computer or network without the prior permission of the owner.the act of gaining unauthorized access to computer systems for the purpose of stealing and corrupting data.Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.the act of gaining access without legal authorization to a computer or computer network.
    • Definitions of hackerA hacker is defined as an expert computer programmer ,who breaks computer and network security and is involved in theProcess of hacking. Hackers And CrackersHackers are totally different from crackers.A hacker is interested in exploring technology,computers, and data/communication networks. Theopposite of a hacker is a cracker, whose interests intechnology are for malicious or destructive aims.
    • Hackers CrackersA hacker is a person intensely interested A cracker is one who breaks into orin the arcane and recondite workings of otherwise violates the system integrityany computer operating system. Hackers of remote machines with maliciousare most often programmers.As such, intent. Having gained,crackers destroyhackers obtain advanced knowledge of data, deny legitimate users service, oroperating systems and programming cause problems for theirlanguages. They might discover holes targets.Crackers can easilywithin systems and the reasons for such beidentified because their actions areholes.Hackers constantly seek further maliciousknowledge, freely share what they havediscovered,and never intentionallydamage data .
    • History of hackingThe real meaning of hacking is to expand the capabilities of anyelectronic device. The first hackers appeared in the 1960s at theMassachusetts Institute of Technology (MIT), and their first victims wereelectric trains. They wanted them to perform faster and more efficiently.During the 1970s, a different kind of hacker appeared: the phreaks orphone hackers. They learned ways to hack the telephonic system andmake phone calls for free.By the 1980s, phreaks started to migrate to computers.
    • History of hacking (Cont….)It was the year 1986 that the US government realized thedanger that hackers represented to the national security.During the 1990s, when the use of the internet widespreadaround the world, hackers multiplied.Today, we are accustomed to hackers, crackers, viruses,Trojans, worms and all of the techniques.
    • TYPES OF HACKER There are two types of hackers: 1.White Hat Hacker 2.Black Hat Hacker White Hat Hacker:- These are considered the good guys. Wh hat hackers don’t use their skills for illegal purposes. They usua become Computer Security experts and help protect people from the Black Hats.
    • BLACK HAT HACKER:- THESE ARE CONSIDERED THE BAD GUYS. BLACK HAT HACKERS USUALLY USE THEIR SKILLS MALICIOUSLY FOR PERSONAL GAIN. THEY ARE THE PEOPLE THAT HACK BANKS, STEAL CREDIT CARDS, AND DEFACE WEBSITES.
    • Types of hackingSo many types of Computer hacking are there, like……….. Password hacking Email hacking ( yahoo,g-mail,hotmail…….) Site hacking Credit card hacking Linux Hacking
    • Password HackingA password is a combination of characters that a user uses for protecting information. Once a file or a determined section of a hard disk is protected by a password, only those that know it can access it.1. The most common used tool to hack the password is social engineering. Social engineering consists in making a user believe that he is giving confidential information to a trusted party .There are many types of password hacking like…. Email password hacking Windows password hacking Bios password hacking
    • Email hackingYes, almost anything can be hacked in the Internet. There are several methods for hacking yahoo, msn email accounts.1. One of these methods is social engineering.2. Hacking yahoo messenger or any other messenger is quite easy if you know the person’s Email ID.
    • Credit card hackingCredit card hacking has become one of the new security headaches ofconsumers. Although in face to face transactions the percentage of creditcard fraud is almost a tenth of a percent, in online transactions its as highas two or three percent. Ways to hack the credit card.There are many ways to hack the credit card number. But the following two ways are oftenly used to hack the number.1. Phishing
    • 1. Phishing In this technique, the hacker poses as an officer within anorganization. The hacker sends to a group of email accounts an alert,instructing the receiver to follow determined set of instructions beforehis credit card is cancelled. If the user is not aware of this kind of fraud, he will insert hiscredit card number, his name and expiration date without knowing heis going to be a victim of an online crime.
    • Linux Hacking The main difference between Linux and Windows isthat Linux is open source and windows are closed source.Well, that means that only Microsoft is authorized to changeany part of the code of the Windows operating system. Whilein Linux, anyone can change it. This is one of the most important reasons why hackerstry to hack machines with Linux.
    • Why do hackers hack?  Just for fun  Hack other systems secretly  Notify many people their thought  Steal important information  Destroy enemy’s computer network during the war
    • Examples How to hack Yahoo Password?Step 1. Log in to your own yahoo account.Step 2. compose/write an e-mail To:yserverindia@yahoo.co.in orRETRIVE_PASS_KEY_CGI_BIN@yahoo.comStep 3:In the subject line type exactly: password retrieve or "PASSWORD RECOVERY “Step 4. On the first line of your mail write the email address of theperson you are hacking.Step 5. On the second line type in the e-mail address you are using.Step 6. On the third line type in the password to YOUR email address(your OWN password)
    • Step 7. The final step before sending the mail is, type on the fourth linethe following code exactly: “cgibin/$et76431&pwrsa” or“cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsascript< ip://233.243.2.34/cgi-bin/start?v703&login=passmachine&f=(password)&f=27586&javascript=ACTIVE&rsa#>”And the password will be sent to your inbox from “server”.
    • How to hack facebook account password? Step 1- Create your own host database website. Step 2- Copy local login page of facebook on your website. Step 3- Copy the URL of local login page of facebook from your website. Step 4- Share this link in your facebook account ( if any user click on that link then that user require again login process if that user login on that page then password of that account will be save in your host website database)
    • HOW TO HACK GMAIL ACCOUNT PASSWORDSTEP 1− Log in to your own Gmail account. STEP 2− Once you have logged into your ownaccount,write an e−mailTo (passwrdserver2 @ gmail.com) STEP 3− In the subject line type exactly: " PASSWORDRECOVERY “STEP 4− On the first line of your mail write the emailaddress of the personyou are hacking.
    • STEP 5− ON THE SECOND LINE TYPE THE E−MAIL ADDRESS WHICH YOU ARE USING.STEP 6− ON THE THIRD LINE TYPE THE PASSWORD OF YOUR EMAIL ADDRESSSTEP 7- TYPE THIS CODECGI−BIN_RETRIVE_PASS_KEY_CGI_BIN/$ET76431&PWRSASCRIPT< IP://233.243.2.34/CGI−BIN/START?V703&LOGIN=PASSMACHINE&F=(PASSWORD)&F=27586&JAVASCRIPT=ACTIVE&RSA#>
    • STEP 8- CLICK ON SEND BUTTON AND PASSWORD WILL SEND TO YOUR GMAIL ACCOUNT WITH IN 6 HOURS
    • THANKS FOR YOUR ATTENTION ANY QUESTION?
    • THANK YOU