SlideShare a Scribd company logo
1 of 16
HACKING
The Art Of Exploitation
What is Hacking
Hacking refers to the activities which are done to intrude someone else’s personal
information so as to use it for malicious,unwanted purpose
OR
Hacking is a term which refer to the activities aimed to exploiting security amind to
exploiting security flaws to obtain personal information for gaining access to secured
network
Overview of Hacking
● Hack
➔ The rapid crafting of a new program or the making of changes to
existing,usually complicated software
● Hacker
➔ The Person who hacks
● Cracker
➔ System destroyer
Contents
● Who is hacker
● History of Hacking
● Types of Hacking
● Hacking accidents
● Why do hacker hack ?
● What hacker do after hacking ?
● What do hacker know ?
Who is hacker ?
● Hack
○ Cut with repeated irregular blows
○ Examine something very minutely
● Hacker
○ The person who hacks
● Cracker
○ System intruder/destroyer
● Hacker means cracker now days
○ Meaning has been changed
What is Hacker
A Hacker is someone who likes to tinker with electronics
computer system.Hacker like to explore and learn how computer
system work,finding ways to make them do what they do
better,or do things they weren’t intended to do Hcakers
History of Hacking
● 1960-1970
○ Good hack especially clever program code
● 1970-1990
○ Breaking in to computer became very easy
● 1990-present
○ www.developed & internet grow exponentially
○ Hacking can be writing a program for enjoyment
○ Hacking can also be done to perform reverse engineering of software where source code is lost
Types of Hacking
Interruption Interception
Modification Fabrication
Hacking Accidents
● Internet Worm
○ Robert T.Morris made an internet worm.It spread through the internet and crashed about 6000
system
● IP Spoof
○ Kevin Mitnick was caught by TSutomu Shimomura who was security expert.Kelvin uses the IP
Spoof attack in this accident
○ Internet Worm
● Cuckoo’s Egg
○ Clifford stoll caught the hacker who are the German hacker applied by KGB
Why do Hacker Hack?
● Just for fun
● Show off
● Hack other system secretly
● Notify many people their thought
● Steal important information
● Destroy enemy's computer network during the war
What do the Hacker do after hacking
● Patch security hole
○ The other hacker can’t intrude
● Clear logs and hide themselves
● Install rootkit(backdoor)
○ The hacker who hacked the system can use the system later
○ It consist trojan ls,ps and so on
● Install irc related program
○ identd ,irc,bitchx.eggdrop.bnc
● Install exploit porgram
● Install denial of service program
● Use all installed programs silently
What do Hacker Know
● Know how to intrude the system
● Know to crash the system
● Know where the hacking program are
How can protect the system ?
● Patch security hole often
● Encrypted important data
○ Ex:- pgp.ssh
● Do not run unused daemon Remove unused demon
● Remove unused setuid/setuid program
● Setup loghost
● Use switch hub
● Setup firewall
○ Ex ipchains
● Setup IDS
○ Ex:- snort
How can protect the system ?
● Backup the system often
What should do after hacked
● Shutdown the system
● Separate the system from network
● Restore the system with the backup
● Connect the system to the network
● It can be good to call the police
Thank You
If you have any question please don't feel hesitate to ask!
Shubham Choudhary

More Related Content

What's hot

cryptography deepan fav subject
cryptography deepan fav subjectcryptography deepan fav subject
cryptography deepan fav subjectdeepan v
 
Protect Your Data Now
Protect Your Data NowProtect Your Data Now
Protect Your Data NowJay Gotra
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSamip Shah
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generationTony Lauro
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?Ammar WK
 
Securing blockchain assets
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assetsSimon Wilson
 
Computer security
Computer securityComputer security
Computer securityrjfarraj
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vectorSmit Shah
 
Alice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the netAlice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the netChris Hammond-Thrasher
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012Detectify
 

What's hot (19)

S Dweek12
S Dweek12S Dweek12
S Dweek12
 
cryptography deepan fav subject
cryptography deepan fav subjectcryptography deepan fav subject
cryptography deepan fav subject
 
Protect Your Data Now
Protect Your Data NowProtect Your Data Now
Protect Your Data Now
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Uzair ppt
Uzair pptUzair ppt
Uzair ppt
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Dark web
Dark webDark web
Dark web
 
Hacking
HackingHacking
Hacking
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
 
Securing blockchain assets
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assets
 
Darknet
DarknetDarknet
Darknet
 
Computer security
Computer securityComputer security
Computer security
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Alice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the netAlice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the net
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012
 

Similar to THE ART OF HACKING

Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To HackingAitezaz Mohsin
 
Ethical Hacking - An Overview
Ethical Hacking - An OverviewEthical Hacking - An Overview
Ethical Hacking - An OverviewAfaq Mansoor Khan
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learnedB.A.
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipurcyber cure
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security introAbhilash Ak
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in TeluguSravani Reddy
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 

Similar to THE ART OF HACKING (20)

Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Hacker
HackerHacker
Hacker
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking - An Overview
Ethical Hacking - An OverviewEthical Hacking - An Overview
Ethical Hacking - An Overview
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking.pptx
Ethical hacking.pptxEthical hacking.pptx
Ethical hacking.pptx
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

THE ART OF HACKING

  • 1. HACKING The Art Of Exploitation
  • 2. What is Hacking Hacking refers to the activities which are done to intrude someone else’s personal information so as to use it for malicious,unwanted purpose OR Hacking is a term which refer to the activities aimed to exploiting security amind to exploiting security flaws to obtain personal information for gaining access to secured network
  • 3. Overview of Hacking ● Hack ➔ The rapid crafting of a new program or the making of changes to existing,usually complicated software ● Hacker ➔ The Person who hacks ● Cracker ➔ System destroyer
  • 4. Contents ● Who is hacker ● History of Hacking ● Types of Hacking ● Hacking accidents ● Why do hacker hack ? ● What hacker do after hacking ? ● What do hacker know ?
  • 5. Who is hacker ? ● Hack ○ Cut with repeated irregular blows ○ Examine something very minutely ● Hacker ○ The person who hacks ● Cracker ○ System intruder/destroyer ● Hacker means cracker now days ○ Meaning has been changed
  • 6. What is Hacker A Hacker is someone who likes to tinker with electronics computer system.Hacker like to explore and learn how computer system work,finding ways to make them do what they do better,or do things they weren’t intended to do Hcakers
  • 7. History of Hacking ● 1960-1970 ○ Good hack especially clever program code ● 1970-1990 ○ Breaking in to computer became very easy ● 1990-present ○ www.developed & internet grow exponentially ○ Hacking can be writing a program for enjoyment ○ Hacking can also be done to perform reverse engineering of software where source code is lost
  • 8. Types of Hacking Interruption Interception Modification Fabrication
  • 9. Hacking Accidents ● Internet Worm ○ Robert T.Morris made an internet worm.It spread through the internet and crashed about 6000 system ● IP Spoof ○ Kevin Mitnick was caught by TSutomu Shimomura who was security expert.Kelvin uses the IP Spoof attack in this accident ○ Internet Worm ● Cuckoo’s Egg ○ Clifford stoll caught the hacker who are the German hacker applied by KGB
  • 10. Why do Hacker Hack? ● Just for fun ● Show off ● Hack other system secretly ● Notify many people their thought ● Steal important information ● Destroy enemy's computer network during the war
  • 11. What do the Hacker do after hacking ● Patch security hole ○ The other hacker can’t intrude ● Clear logs and hide themselves ● Install rootkit(backdoor) ○ The hacker who hacked the system can use the system later ○ It consist trojan ls,ps and so on ● Install irc related program ○ identd ,irc,bitchx.eggdrop.bnc ● Install exploit porgram ● Install denial of service program ● Use all installed programs silently
  • 12. What do Hacker Know ● Know how to intrude the system ● Know to crash the system ● Know where the hacking program are
  • 13. How can protect the system ? ● Patch security hole often ● Encrypted important data ○ Ex:- pgp.ssh ● Do not run unused daemon Remove unused demon ● Remove unused setuid/setuid program ● Setup loghost ● Use switch hub ● Setup firewall ○ Ex ipchains ● Setup IDS ○ Ex:- snort
  • 14. How can protect the system ? ● Backup the system often
  • 15. What should do after hacked ● Shutdown the system ● Separate the system from network ● Restore the system with the backup ● Connect the system to the network ● It can be good to call the police
  • 16. Thank You If you have any question please don't feel hesitate to ask! Shubham Choudhary