Hacking
Upcoming SlideShare
Loading in...5
×
 

Hacking

on

  • 1,197 views

 

Statistics

Views

Total Views
1,197
Views on SlideShare
1,197
Embed Views
0

Actions

Likes
0
Downloads
83
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Hacking Hacking Presentation Transcript

  •  Meaning of Hacking. Why do people Hack?? Types of Hacking. Types of Hackers. Conclusion.
  • The Process of attempting to gain or successfully gaining, unauthorized access tocomputer resources for the purpose of help or secure system is called Hacking. Hacking is technique in which, any one can access any one’s computer without his permission.
  •  To make security stronger ( Ethical Hacking ). Just for fun. Show off. Hack other systems secretly. Notify many people their thought. Steal important information. Destroy enemy’s computer network.
  •  Website Hacking. Email Hacking. Network Hacking. Password Hacking. Online Banking Hacking. Computer Hacking.
  •  Hacking a website means taking control from the website owner to a person who hacks the website. The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information database.
  •  Email hacking is illicit access to an email account or email correspondence. Ways of Email Hacking: Personal Information. Social Hacking. Phishing/ Hacking Software. Trojan Virus etc. Email may be protected by methods such as a strong password, encryption of the contents or a digital signature. An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective.
  •  Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network. It also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools. These are the three most common methods of hacking a wireless network:• Sniffing• Spoofing• Encryption Cracking
  •  Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Most passwords can be cracked by using following techniques: • Hashing • Guessing • Default Passwords • Brute Force • Phishing
  •  Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.  A bank account can be accessed in many ways. When someone gets access to your account, that person can take all your funds without your knowledge.Here are five simple tips that will help Protect Your Online Accounts:• Use Strong Password• Protect your Computer• Keep an eye on running processes• Download with care• Be careful when using unprotected public networks
  •  Computer Hacking is when files on your computer are viewed, created, or edited without your authorization. People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them. Remote desktop connection technique.
  •  The good guys who identify the security weakness of the system or network and inform the owner about them.
  • A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.Also known as ‘cracker’.
  • A Grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.
  • 1 -> i or l || -> n3 -> e |/| -> m4 -> a s -> z7 -> t z -> s9 -> g f -> ph0 -> o$ -> s ph -> f| -> i or l x -> ck ck -> x
  • Example:1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1swh3|| 1 h4ck3d 1nI did not hack this page, it was like thiswhen I hacked in.
  •  Stephen Wozniac Tsutomu Shimomura
  •  Kevin Mitnick Kevin Poulsen
  •  Theaverage age group of hackers are aged between 14-24 yrs.…
  • Social networking sites like ‘FACEBOOK’,’GMAIL’,’YAHOO” comprised of 60% of direct or indirect hacking incidents.
  • Links involving private pictures of celebrities.Links showing pictures of famous personalities like Gaddafi’s dead body or videos of Osama Bin Laden’s killing.
  • Facebook lottery scam.
  •  www.jntu.ac.in was hacked on 7 Nov 2010. www.songs.pk was hacked on 15 July 2011. Songs.pk JNTU homepage after it was hacked
  •  Installa strong anti-virus Always run a anti-virus check before you download a program or a file from the internet. Avoid disclosing personal details like phone number, credit card details to strangers.
  •  Proper ethical hackers should be employed. Do not expose your passwords to untrusted sites. Practice using exact web address. Close your internet while not in use.