Successfully reported this slideshow.
Your SlideShare is downloading. ×

Hacking Presentation

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Upcoming SlideShare
my new HACKING
my new HACKING
Loading in …3
×

Check these out next

1 of 10 Ad

Hacking Presentation

Download to read offline

Hi , This is the simple presentation about Hacking! with cool stylish pictures and quotes Hope u like it! Please support me. Thank you.

Hi , This is the simple presentation about Hacking! with cool stylish pictures and quotes Hope u like it! Please support me. Thank you.

Advertisement
Advertisement

More Related Content

Similar to Hacking Presentation (20)

Recently uploaded (20)

Advertisement

Hacking Presentation

  1. 1. ->HACK<- By MIDHUN
  2. 2. HACKING! Hacking is the gaining of access(wanted or unwanted) to a computer and viewing, copying, or creating data without the intention of destroying data or maliciously harming the computer.
  3. 3. METHODS OF HACKING hackers intention to stole critical information of users like account passwords, MasterCard detail, etc PHISHING Hackers will get your credentials through a follow known as key-logging. CRACK PASSWORD Code injection is the exploitation of a computer bug that is caused by processing invalid data MALWARE INJECTING Distributed Denial-of-Service is aimed toward taking down a website or wifi so that it cannot accesed by user. DDoS ATTACK Hackers access the website exploitation malicious codes and steal cookies that contain tips, login passwords, etc. COOKIE THEFT Social engineering is an attempt to share personal info, sometimes by impersonating a trustworthy supply. SOCIAL ENGINEERING AND MORE…
  4. 4. HACKER 💻  A hacker is any person engaged in hacking.  A hacker is someone who seeks and exploits weakness in a computer system or computer network.
  5. 5. TYPES OF HACKERS fun hacker, cybersecurity expert who hack into network & systems, but without malicious intent. GREY HAT Criminal hackers, who breaks into computer systems malicious or criminal intent. BLACK HAT Government Heired hacker, with specific focus on finding and disarming black hat hackers. RED HAT Authorized hackers, cybersecurity experts who use their skills to find vulnerabilities in networks,system. WHITE HAT AND MORE…
  6. 6. ETHICAL HACKING  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration testing which is focused on securing and protecting IT systems.  Perform all the same activities done by black hat hacker but with the owner’s permission.
  7. 7. CRACKING  Hacking with Malicious intention is CRACKING  Cracking is Crime.  Cyber crime are the result of cracking, not hacking
  8. 8. PREVENT HACKING IMPLEMENT FIREWALL BE AWARE OF PHISHING KEEP OS UP TO DATE INSTALL ANTI-VIRUS VULNERABILITY TEST DON’T RUN UNNESSERY NETWORK SERVICES DON’T ACCESS PRESONAL DATA IN PUBLIC WIFI TURN OFF ANYTHING YOU DON’T NEED
  9. 9. LEARN Best Operating System: Kali Linux, Parrot OS, Backbox, Fedora etc. Learn Hacking, not to hack others, To secure yourselffrom Hackers…! Tools: Nmap, Metaspoit, Ngrok, Social Engineering Tool-kit(SET) etc.
  10. 10. THANKS!

×