SlideShare a Scribd company logo
1 of 23
Contents
 Introduction
 History of hacking
 Hackers
 Types of hacking
 Steps of Hacking
 Purpose of hacking
 What should do after hacked
 How to secure our data
 Advantages
 Disadvantages
 Conclusions
Introduction
 Hacking is the act of a person abusing
computer access, breaking into computers,
or using computers without authorization.
 The process of attempting to gain or
successfully gaining unauthorized access to
computer resources is called hacking.
History of Hacking
 Hacking has been a part of computing for
almost five decades. The first known event
of hacking had taken place in 1961 at MIT
and at the same time, the term "Hacker" was
originated.
History
 1970s : Phreakers or phone hackers
 1980s : creating viruses and
breaking into systems
 1990s : Kevin Mitnick, Kevin Poulsen
makes millions of dollars
 2000s : Microsoft, eBay, etc are
affected with Dos
 2010s : Wi-Fi attacks, exposing
government secrets
Hackers
 A “clever programmer" who tries to break into
computer systems.
 A hacker is someone who seeks and exploits
weakness in computer system or computer network.
 Types of hackers-
White Hat hackers are also
known as Ethical Hackers
Black Hat hackers, also known
as Crackers
Types of Hacking
 Website Hacking
 Network Hacking
 Email Hacking
 Ethical Hacking
 Password Hacking
 Computer Hacking
Website Hacking
 Hacking a website means taking control from the
website owner to a person who hacks the website.
 The hacker will get the username and password and the
hacker will use that website for any purpose which may
sometimes to destroy the valuable database information.
Network Hacking
 Network hacking generally means gathering
information about domain by using tools like Ping,
Tracert, Netstat, etc….over the network.
 There are three common ways of hacking a wireless
network:
○ Sniffing
○ Spoofing
○ Encryption cracking
Email Hacking
 Email hacking is an illicit access to an email account.
 Ways of email hacking:
o Personal information
o Social hacking
o Phishing
o Trojan virus
Password Hacking
 Password hacking is the process of recovering secret
passwords from data that has been stored in or
transmitted by a computer system.
 Password can be cracked or hacked by the following
ways:
○ Hashing
○ Guessing
○ Default passwords
○ Phishing
Computer Hacking
 Computer hacking is when files on your computer are
viewed, created or deleted without your authorization.
 People can get complete access to your computer from
anywhere in the world if your computer is turned on,
unprotected and has internet connection.
 Remote desktop connection is the technique.
Steps of hacking
Reconnaissance
Scanning
Gaining access
Maintaining access
Clearing Tracks
Purpose of Hacking
 Just for fun
 Show-off
 Steal important information
 Damaging the system
 Hampering privacy
 Money extortion
 System security testing
 To break policy compliance
Determinations
 Files disappear or are modified unexpectedly.
 Strange files appear or grow in size unexpectedly.
 Hard disk space shrinks without reason.
 Computer slows.
 Strange messages or dialog boxes appear on the
screen.
 The computer starts crashing frequently.
 Programs stop working as expected.
What should do after hacked??
 Shut down the system.
 Separate the system from network.
 Restore the system with the backup.
 It can be good to inform the Police or IT
security department.
How to secure our data??
 1->ior l ||->n
 3->e |/|->m
 4->a s->z
 +->t c->[
 9->g f->p
 x->ck s->$
Example:
 I transferred Rs. 4000 to your account.
 1 +r$||$ph3rr3d R$ aooo +o y0ur 4[[ou||+
Advantages of Hacking
 To recover lost information,
especially in case you lost your password.
 To perform penetration testing to strengthen
computer and network security.
 To put adequate preventative measures in
place to prevent security breaches.
 To have a computer system that prevents
malicious hackers from gaining access.
Disadvantages of Hacking
 Massive security breach.
 Unauthorized system access on private
information.
 Privacy violation.
 Hampering system operation.
 Denial of service attacks.
 Malicious attack on the system.
Conclusion
 Proper ethical hackers should be employed.
 Do not expose your passwords to untrusted
sites.
 Practice using exact web address.
 Close your internet while not in use.
Hacking
Hacking

More Related Content

What's hot (20)

Computer security
Computer securityComputer security
Computer security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Password Attack
Password Attack Password Attack
Password Attack
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Ppt
PptPpt
Ppt
 

Similar to Hacking

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typeshamza javed
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vectorSmit Shah
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online SecurityJeanie Arnoco
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxmahamnisar6
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 

Similar to Hacking (20)

Hacking
Hacking Hacking
Hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
HACKING
HACKINGHACKING
HACKING
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking
HackingHacking
Hacking
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Hacking
HackingHacking
Hacking
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Hacking
HackingHacking
Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 

Recently uploaded

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 

Recently uploaded (20)

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 

Hacking

  • 1.
  • 2. Contents  Introduction  History of hacking  Hackers  Types of hacking  Steps of Hacking  Purpose of hacking  What should do after hacked  How to secure our data  Advantages  Disadvantages  Conclusions
  • 3. Introduction  Hacking is the act of a person abusing computer access, breaking into computers, or using computers without authorization.  The process of attempting to gain or successfully gaining unauthorized access to computer resources is called hacking.
  • 4. History of Hacking  Hacking has been a part of computing for almost five decades. The first known event of hacking had taken place in 1961 at MIT and at the same time, the term "Hacker" was originated.
  • 5. History  1970s : Phreakers or phone hackers  1980s : creating viruses and breaking into systems  1990s : Kevin Mitnick, Kevin Poulsen makes millions of dollars  2000s : Microsoft, eBay, etc are affected with Dos  2010s : Wi-Fi attacks, exposing government secrets
  • 6. Hackers  A “clever programmer" who tries to break into computer systems.  A hacker is someone who seeks and exploits weakness in computer system or computer network.  Types of hackers- White Hat hackers are also known as Ethical Hackers Black Hat hackers, also known as Crackers
  • 7. Types of Hacking  Website Hacking  Network Hacking  Email Hacking  Ethical Hacking  Password Hacking  Computer Hacking
  • 8. Website Hacking  Hacking a website means taking control from the website owner to a person who hacks the website.  The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy the valuable database information.
  • 9. Network Hacking  Network hacking generally means gathering information about domain by using tools like Ping, Tracert, Netstat, etc….over the network.  There are three common ways of hacking a wireless network: ○ Sniffing ○ Spoofing ○ Encryption cracking
  • 10. Email Hacking  Email hacking is an illicit access to an email account.  Ways of email hacking: o Personal information o Social hacking o Phishing o Trojan virus
  • 11. Password Hacking  Password hacking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.  Password can be cracked or hacked by the following ways: ○ Hashing ○ Guessing ○ Default passwords ○ Phishing
  • 12. Computer Hacking  Computer hacking is when files on your computer are viewed, created or deleted without your authorization.  People can get complete access to your computer from anywhere in the world if your computer is turned on, unprotected and has internet connection.  Remote desktop connection is the technique.
  • 13. Steps of hacking Reconnaissance Scanning Gaining access Maintaining access Clearing Tracks
  • 14. Purpose of Hacking  Just for fun  Show-off  Steal important information  Damaging the system  Hampering privacy  Money extortion  System security testing  To break policy compliance
  • 15. Determinations  Files disappear or are modified unexpectedly.  Strange files appear or grow in size unexpectedly.  Hard disk space shrinks without reason.  Computer slows.  Strange messages or dialog boxes appear on the screen.  The computer starts crashing frequently.  Programs stop working as expected.
  • 16. What should do after hacked??  Shut down the system.  Separate the system from network.  Restore the system with the backup.  It can be good to inform the Police or IT security department.
  • 17. How to secure our data??  1->ior l ||->n  3->e |/|->m  4->a s->z  +->t c->[  9->g f->p  x->ck s->$
  • 18. Example:  I transferred Rs. 4000 to your account.  1 +r$||$ph3rr3d R$ aooo +o y0ur 4[[ou||+
  • 19. Advantages of Hacking  To recover lost information, especially in case you lost your password.  To perform penetration testing to strengthen computer and network security.  To put adequate preventative measures in place to prevent security breaches.  To have a computer system that prevents malicious hackers from gaining access.
  • 20. Disadvantages of Hacking  Massive security breach.  Unauthorized system access on private information.  Privacy violation.  Hampering system operation.  Denial of service attacks.  Malicious attack on the system.
  • 21. Conclusion  Proper ethical hackers should be employed.  Do not expose your passwords to untrusted sites.  Practice using exact web address.  Close your internet while not in use.