Your SlideShare is downloading. ×
0
Let’s go in…
Som RanjanHaCKinGA technological threat
IntroductionWhat is HacKING?• The Process of attempting to gain or successfully gaining,  unauthorized access to computer ...
Types Of Hacking These are the Types of Hacking Website Hacking Email Hacking Network Hacking Password Hacking Online Bank...
Website Hacking• Hacking a website means taking control from the  website owner to a person who hacks the website.• The ha...
Email Hacking• Email hacking is illicit access to  an email account or email correspondence.• Ways of Email Hacking• Perso...
Network Hacking Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUP...
Password HackingPassword cracking is the process of recovering secretpasswords from data that has been stored in or transm...
Online banking HackingUnauthorized accessing bank accounts without knowing thepassword or without permission of account ho...
Online banking Hacking Default Connection                      Connection Hacked By Hacker
Computer Hacking• Computer Hacking is when files on your  computer are viewed, created, or edited  without your authorizat...
Ethical HackerAn ethical hacker is a computer andnetwork expert who attacks a securitysystem on behalf of its owners,seeki...
Ethical HackerWhat do ethical hackers do?An ethical hacker’s evaluation of a system security seeksanswers to these basic q...
ConclusionProper ethical hackers should be employed.Do not expose your passwords to untrusted sites.Practice using exac...
Prepared By: SomaranjanRoll No.: 3212B Com Professioanl
Upcoming SlideShare
Loading in...5
×

Hacking

17,825

Published on

Hacking with ethical hacking.

Published in: Education
5 Comments
21 Likes
Statistics
Notes
No Downloads
Views
Total Views
17,825
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1,830
Comments
5
Likes
21
Embeds 0
No embeds

No notes for slide

Transcript of "Hacking"

  1. 1. Let’s go in…
  2. 2. Som RanjanHaCKinGA technological threat
  3. 3. IntroductionWhat is HacKING?• The Process of attempting to gain or successfully gaining, unauthorized access to computer resources for the purpose of help or secure system is called Hacking.• Hacking is technique in which, any one can access any one’s computer without his permission.• Hacker is not a cyber criminal but he is the very intelligent person who is use his knowledge in constructive manner to secure system & never damage data.• A Hacker knows all about the operating system and different holes in the system.
  4. 4. Types Of Hacking These are the Types of Hacking Website Hacking Email Hacking Network Hacking Password Hacking Online Banking Hacking Computer Hacking Ethical Hacking
  5. 5. Website Hacking• Hacking a website means taking control from the website owner to a person who hacks the website.• The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information database. Click here for Phishing Process
  6. 6. Email Hacking• Email hacking is illicit access to an email account or email correspondence.• Ways of Email Hacking• Personal Information Social Hacking• Phishing/ Hacking Software Trojan Virus etc.• Email may be protected by methods such as a strong password, encryption of the contents or a digital signature. An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective
  7. 7. Network Hacking Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network. It is also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools. These are the three most common methods of hacking a wireless network: • Sniffing • Spoofing • Encryption Cracking
  8. 8. Password HackingPassword cracking is the process of recovering secretpasswords from data that has been stored in or transmitted by acomputer system. A common approach is to repeatedly tryguesses for the password.Most passwords can be cracked by using following techniques: • Hashing • Guessing • Default Passwords • Brute Force • Phishing
  9. 9. Online banking HackingUnauthorized accessing bank accounts without knowing thepassword or without permission of account holder is known asOnline banking hacking.A bank account can be accessed in many ways. When someonegets access to your account, that person can take all your fundswithout your knowledge.Here are five simple tips that will help Protect Your OnlineAccounts:• Use Strong Password• Protect your Computer• Keep an eye on running processes• Download with care• Be careful when using unprotected public networks
  10. 10. Online banking Hacking Default Connection Connection Hacked By Hacker
  11. 11. Computer Hacking• Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.• People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them.• Remote desktop connection technique.
  12. 12. Ethical HackerAn ethical hacker is a computer andnetwork expert who attacks a securitysystem on behalf of its owners,seeking vulnerabilities that amalicious hacker could exploit.To test a security system, ethicalhackers use the same methods as theirless principled counterparts, butreport problems instead of takingadvantage of them. Ethical hacking isalso known as penetrationtesting, intrusion testing and redteaming. An ethical hacker issometimes called a white hat.
  13. 13. Ethical HackerWhat do ethical hackers do?An ethical hacker’s evaluation of a system security seeksanswers to these basic questions:  What can an intruder see on that target system?  What are you trying to protect?  What can an intruder do with that information?
  14. 14. ConclusionProper ethical hackers should be employed.Do not expose your passwords to untrusted sites.Practice using exact web address.Close your internet while not in use.
  15. 15. Prepared By: SomaranjanRoll No.: 3212B Com Professioanl
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×