Published on

hi friends , this presentation is about Hacking and types of hackers...

find me on facebook
Mihir Roat
like or comment

thank you :D

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Network & Business Reconnaissance – Before hacking your Online business or corporate infrastructure, hackers first perform routine and detailed reconnaissance. Hackers must gather as much information about your business and networks as possible. Anything they discover about their target (you) can be valuable during their attack phases. Strategies for hacking rely on a foundation of knowledge and understanding, arising initially from whatever the hacker can learn about you and your business. Methods of reconnaissance include Dumpster Diving, Social Engineering, Google Searching & Google Hacking, and work their way up to more insidious methods such as infiltrating your employees environments from coffee shops to simply walking in and setting up in a cubicle and asking a lot of questions. Whatever methods are used to perform reconnaissance, hackers will usually collect a large amount of information varying from trivial to sensitive, all of which may be useful during their attacks.
  • Hackingpresentation

    1. 1. Hacking
    2. 2. Computer hacking is when someone modifiescomputer hardware or software in a way thatalters the creators original intent.
    3. 3. Hacker Phreaks CrackersScript kiddies
    4. 4. • Hackers are Intelligent Computer Professionals.• Motive/Intent –• To gain in-depth knowledge of a system, what’s happening at the backend, behind the screen.• To find possible security vulnerabilities in a system.• They create security awareness by sharing knowledge. It’s a team work.
    5. 5. White Hat• A white hat is the hero or good guy, especially in computing slang, where it refers to an ethical hacker or Penetration tester who focuses on securing and protecting IT systems.• White Hat Hackers, also known as Ethical Hackers
    6. 6. Black Hat• A black hat is the villain or bad guy. It refers to a hacker that breaks into networks or computers, or creates computer viruses. Black Hat Hackers (also called "crackers") who are specialized in unauthorized penetration of information systems.• They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause.
    7. 7. Grey Hat• A grey hat, in the hacking community, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not.• They are a hybrid between white and black hat hackers.• They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit crimes during the course of
    8. 8. Ian Murphy Kevin Mitnick Johan HelsinguisLinus Torvalds Mark Abene Robert Morris
    9. 9. • An Individuals who break into computers with malicious intent.• Motive/Intent –• To seek unauthorized access into a system and cause damage or destroy or reveal confidential information.• To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge.• Effects- Can cause financial losses &
    10. 10. • Phreaks – These are persons who use computer devices and software to break into phone networks.• Motive/Intention- To find loopholes in security in phone network and to make phone calls at free of cost!!!• Effects- You may have to big amount of phone bills, for doing nothing!!!
    11. 11. • Script Kiddies – These are persons not having technical skills to hack computers.• Motive/Intention- They use the available information about known• vulnerabilities to break into remote systems.• It’s an act performed for a fun or out of curiosity.
    12. 12. 1 Reconnaissance2 Scanning3 Attack
    13. 13. Scanning is the process of finding outopen/close ports,vulnerabilities in remote system, server &networks.• Scanning will reveal• IP addresses• Operating systems• Services running on each computer.• Services running on each computer.
    14. 14. • Port Scanning• Network Scanning• Vulnerability Scanning
    15. 15. • Port Scanning is one of the most popular techniqueattacker use todiscover the service they break into.• All machines connected to a LAN or connected toInternet via amodem run many services that listen at well-known andnot so wellknownports.• There are 1 to 65535 ports are available in thecomputer.• By port scanning the attacker finds which ports are
    16. 16. Understand IP Addresses and related information about the computer network systems
    17. 17. Understand the exiting weakness
    18. 18. 1. SQL Injection2. Cross Site Scripting (XSS)3. Malicious File Execution4. Insecure Direct Object Reference5. Cross Site Request Forgery (CSRF)6. Information Leakage and Improper Error Handling7. Broken Authentication and Session Management8. Insecure Cryptographic Storage9. Insecure Communications