SlideShare a Scribd company logo
1 of 28
HACKING
CONTENT
• Hacking
• History of Hacking
• Types of Hacking
• Hackers
• Types of Hackers
• Famous Hacker
• Service of Ethical Hacking
• Disadvantages of Hacking
• Need of Hacking
• Cyber law for Hacking
• Scope of Ethical Hacking
WHAT IS HACKING?
• Hacking is an attempt to exploit a computer system or
a private network inside a computer. Simply put, it is
the unauthorised access to or control over computer
network security systems for some illicit purpose. To
better describe hacking, one needs to first understand
hackers. One can easily assume them to be intelligent
and highly skilled in computers.
HISTORY OF HACKING
• When hacking first started it was not thought of as that serious. The
hackers were not even known as hackers but as practical jokers. The
very first hack came in 1878 when the phone company, Bell Telephone,
was started. A group of teenage boys, hired to run the switchboards,
would disconnect or misdirect calls.
The first authentic computer hackers came in the 1960s. During those
times, computers were mainframes, locked away in temperature
controlled, glassed in areas. It cost a lot of money to run these
machines, so programmers had limited access to them.
HISTORY OF HACKING
• The smarter students, usually MIT students, had an insatiable
curiosity about how things worked. So, the smartest ones created
what they called "hacks", programming shortcuts, to complete
computing tasks more quickly. In some cases the shortcuts were better
than the original program. One of the hacks that was created in the
60s, 1969 to be exact, was created to act as an open set of rules to run
machines on the computer frontier. It was created by two employees
from the Bell Lab's think tank. The two employees were Dennis
Ritchie and Ken Thompson and the "hack" was called UNIX.
TYPES OF HACKING
• Ethical Hacking
• Back Door Hacking
• Website Hacking
• Network Hacking
• Password Hacking
ETHICAL HACKING
• Ethical hacking, also known as penetration testing or pen testing, is legally
breaking into computers and devices to test an organization's defenses. It's
among the most exciting IT jobs any person can be involved in. You are
literally getting paid to keep up with the latest technology and get to break
into computers without the threat of being arrested.
• Companies engage ethical hackers to identify vulnerabilities in their
systems. From the penetration tester's point of view, there is no downside: If
you hack in past the current defenses, you’ve given the client a chance to
close the hole before an attacker discovers it. If you don’t find anything, your
client is even happier because they now get to declare their systems “secure
enough that even paid hackers couldn’t break into it.”
BACKDOOR HACKING
• In the world of cybersecurity, a backdoor refers to any method by
which authorized and unauthorized users are able to get around
normal security measures and gain high level user access (aka root
access) on a computer system, network, or software application. Once
they're in, cybercriminals can use a backdoor to steal personal and
financial data, install additional malware, and hijack devices.
• A well-known backdoor example is called FinSpy. When installed on a
system, it enables the attacker to download and execute files remotely
on the system the moment it connects to the internet, irrespective of
the system's physical location. It compromises overall system security.
WEBSITE HACKING
• Hacking a website is nothing but getting the password to add, edit,
delete data stored in that website. After the attack done by a hacker, if
he has changed the password of that website software, then it will be
tough for the Webmaster to get it back. Hacker will insert harmful
programs by inserting malicious codes into the website. It will also
cause to the website server to be slow.
• In the past years, even Amazon and Yahoo had been attacked by the
hacker experts, but it would not affect much to them. In the last year
we had seen that, the world wide hackers are tried their level best to
make fear on the famous companies like PayPal and Facebook.
NETWORK HACKING
• Networking Hacking is an offensive branch of computer security
related to networks hacking and the penetration of a target via the
networking services or equipment.
• Network Hacking is generally means gathering information about
domain by using tools like Telnet , Nslookup , Ping, Tracert , Netstat ,
etc.
• It also includes OS Fingerprinting, Port Scanning and Port Surfing
using various tools.
PASSWORD HACKING
• Password hacking, sometimes referred to as password cracking, is a
method of recovering passwords from data transmitted by or stored on
a computer.
• A password can be a secret word, phrase or string of characters used
to gain access to secured data. An individual with no knowledge of a
password may still determine it through password hacking.
• Conversely, a dictionary attack allows hackers to employ a program
which cycles through common words. A brute force attack goes letter
by letter, whereas a dictionary attack only tries possibilities most
likely to succeed. ... For example, users tend to pick
short passwords and base their passwords off common words.
HACKER
• A computer hacker is a computer expert who uses their technical
knowledge to achieve a goal or overcome an obstacle, within a
computerized system by non-standard means.
• Though the term "hacker" has become associated in popular
culture with a "security hacker" – someone who utilizes their technical
know-how of bugs or exploits to break into computer systems and
access data which would otherwise be unavailable to them – hacking
can also be utilized by legitimate figures in legal situations. For
example, law enforcement agencies sometimes use hacking techniques
in order to collect evidence on criminals and other malicious actors.
TYPES OF HACKERS
 Black Hat Hackers
 White Hat Hackers
 Grey Hat Hackers
BLACK HAT HACKER
• The term “black hat” originated from Western movies, where the bad
guys wore black hats and the good guys wore white hats.
• A black-hat hacker is an individual who attempts to gain
unauthorized entry into a system or network to exploit them for
malicious reasons. The black-hat hacker does not have any permission
or authority to compromise their targets. They try to inflict damage by
compromising security systems, altering functions of websites and
networks, or shutting down systems. They often do so to steal or gain
access to passwords, financial information, and other personal data.
WHITE HAT HACKER
• White-hat hackers, on the other hand, are deemed to be the good guys,
working with organizations to strengthen the security of a system. A
white hat has permission to engage the targets and to compromise
them within the prescribed rules of engagement.
• White-hat hackers are often referred to as ethical hackers. This
individual specializes in ethical hacking tools, techniques, and
methodologies to secure an organization’s information systems.
• Unlike black-hat hackers, ethical hackers exploit security networks
and look for backdoors when they are legally permitted to do so.
White-hat hackers always disclose every vulnerability they find in the
company’s security system so that it can be fixed before they are being
exploited by malicious actors.Some Fortune 50 companies like
Facebook, Microsoft, and Google also use white-hat hackers.
GREY HAT HACKER
• Grey hats exploit networks and computer systems in the way that
black hats do, but do so without any malicious intent, disclosing all
loopholes and vulnerabilities to law enforcement agencies or
intelligence agencies.
• Usually, grey-hat hackers surf the net and hack into computer
systems to notify the administrator or the owner that their
system/network contains one or more vulnerabilities that must be
fixed immediately. Grey hats may also extort the hacked, offering to
correct the defect for a nominal fee.
WORLD BEST HACKER
• Kevin Mitnick is the world's authority on hacking, social engineering,
and security awareness training. In fact, the world's most used
computer-based end-user security awareness training suite bears his
name. Kevin's keynote presentations are one part magic show, one
part education, and all parts entertaining.
• Hacked into 40 major corporations, landing him on the FBI’s Most
Wanted list
• CEO and chief "white hat" hacker at one of the most advanced
boutique security firms in the world
• His Global Ghost Team has a 100 percent success rate hacking into
security systems.
SERVICE OF ETHICAL HACKING
• Wireless Security
• Application Security
• Network Security
WIRELESS SECURITY
These services provide and assess the level of security in the existing
infrastructure and network to provide instructions promising system
accessibility and uphold its integrity at the same time. Wireless security
works in three steps, which are:
• Identify vulnerabilities
• Adopt security measures
• Deploy the threats
APPLICATION SECURITY
• Application security is the process of making apps more secure by
finding, fixing, and enhancing the security of apps. Much of this
happens during the development phase, but it includes tools and
methods to protect apps once they are deployed.
• This is used for digging deep into and processing the cruciality and
range of challenges faces by the thick client (Java) and the thin client
(web browsers). Application security comprises of services like client-
side testing and web application testing.
NETWORK SECURITY
• Network security is a broad term that covers a multitude of
technologies, devices and processes. In its simplest term, it is a set of
rules and configurations designed to protect the integrity,
confidentiality and accessibility of computer networks and data using
both software and hardware technologies.
It lends information on the networks, services, system devices, and
their agreements. It also examines and surveys the applications of the
voice over Internet convention within the organization
environment. Network security’s main objective is to facilitate the
presentation of the political repercussions on its own development.
WHY DO WE NEED ETHICAL HACKING?
• Ethical Hacking comes handy in corporate sectors and organizations,
to fight against unlawful practices of breaching systems and to take
precautionary actions on hackers.
• Dangerous software like Trojan horses, viruses and spam email causes
disruption and disturbance in the system and storage space. Ethical
hacking provides useful here as it helps to uncover these virus attacks
against systems and in addition, lends high-level security.
• The main objective of ethical hacking is to promise safety in wireless
infrastructure which constitutes most of the current business
companies’ aims.
DISADVANTAGES OF HACKING
• Massive security breach.
• Unauthorized system access on private information.
• Privacy violation.
• Hampering system operation.
• Denial of service attacks.
• Malicious attack on the system.
NEED OF ETHICAL HACKING?
• Ethical hacking follows the guidelines of safe hacking for the efficient
working of the system. This is a complex procedure hence an ethical
hacker requires great skills in comparison to penetration testing.
• Ethical hacking has the privilege of gathering access to a company’s
network and information system. This automatically provides security
to intellectual attacks and threats like viruses. Ethical hacking, as a
result, ends up also testing the security levels of the programs and
software.
CYBER LAW IN INDIA FOR HACKING
• Chapter XI Section 66 of IT Act, 2000 particularly deals with the act
of hacking. Section 66(1) defines a hack as, any person, dishonestly or
fraudulently, does any act referred to in Section 43 is called
hacking, and Section 66(2) prescribes the punishment for it. Hacking
is a punishable offense in India with imprisonment up to 3 years, or
with fine up to two lakh rupees, or with both.
• Chapter IX Section 43 of IT act, 2000 prescribes a penalty for the
damage to computer or computer system. It is a common thing which
happens whenever a computer system is hacked. Black hats damage
the system that they hack and steal the information. This
enumerative provision includes a lot of activities.
CYBER LAW IN INDIA FOR HACKING
• Chapter XI Section 65 of the said act makes tampering with computer
source documents an offense. Section 72 of the same chapter makes
the breach of confidentiality and privacy, a punishable offense. This is
the most common aftermath of hacking.
• The Information and Technology Act, 2000 (IT Act) covers all types
of cyber crime committed in the country
including hacking. Hacking earlier used to refer to a crime under
section 43 of the IT Act but at the same time, ethical hacking or better
known as white collar hacking was considered legal.
SCOPE FOR ETHICAL HACKING
• Ethical hacking is generally used as penetration testing to detect
vulnerabilities, risk and identify the loopholes in a security system
and to take corrective measures against those attacks.
• Ethical hacking is a key component of risk evaluation, auditing, and
counter-frauds. The scope for the Ethical Hackers is high and it is one
of the rapidly growing careers at present as many malicious attackers
cause a threat to the business and its networks. Industries like
Information Technology and Banking Sectors hire several Ethical
hackers to protect their data and infrastructure. Also, in the upcoming
days, the demand for this profile is going to be high compared to other
profiles due to an increased threat of vulnerabilities.

More Related Content

What's hot

Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportRaghav Bisht
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...Quinnipiac University
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 

What's hot (20)

Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similar to Hacking

Similar to Hacking (20)

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
HACKING
HACKINGHACKING
HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 

Recently uploaded

Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 

Recently uploaded (20)

Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 

Hacking

  • 2. CONTENT • Hacking • History of Hacking • Types of Hacking • Hackers • Types of Hackers • Famous Hacker • Service of Ethical Hacking • Disadvantages of Hacking • Need of Hacking • Cyber law for Hacking • Scope of Ethical Hacking
  • 3. WHAT IS HACKING? • Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose. To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers.
  • 4. HISTORY OF HACKING • When hacking first started it was not thought of as that serious. The hackers were not even known as hackers but as practical jokers. The very first hack came in 1878 when the phone company, Bell Telephone, was started. A group of teenage boys, hired to run the switchboards, would disconnect or misdirect calls. The first authentic computer hackers came in the 1960s. During those times, computers were mainframes, locked away in temperature controlled, glassed in areas. It cost a lot of money to run these machines, so programmers had limited access to them.
  • 5. HISTORY OF HACKING • The smarter students, usually MIT students, had an insatiable curiosity about how things worked. So, the smartest ones created what they called "hacks", programming shortcuts, to complete computing tasks more quickly. In some cases the shortcuts were better than the original program. One of the hacks that was created in the 60s, 1969 to be exact, was created to act as an open set of rules to run machines on the computer frontier. It was created by two employees from the Bell Lab's think tank. The two employees were Dennis Ritchie and Ken Thompson and the "hack" was called UNIX.
  • 6. TYPES OF HACKING • Ethical Hacking • Back Door Hacking • Website Hacking • Network Hacking • Password Hacking
  • 7. ETHICAL HACKING • Ethical hacking, also known as penetration testing or pen testing, is legally breaking into computers and devices to test an organization's defenses. It's among the most exciting IT jobs any person can be involved in. You are literally getting paid to keep up with the latest technology and get to break into computers without the threat of being arrested. • Companies engage ethical hackers to identify vulnerabilities in their systems. From the penetration tester's point of view, there is no downside: If you hack in past the current defenses, you’ve given the client a chance to close the hole before an attacker discovers it. If you don’t find anything, your client is even happier because they now get to declare their systems “secure enough that even paid hackers couldn’t break into it.”
  • 8. BACKDOOR HACKING • In the world of cybersecurity, a backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application. Once they're in, cybercriminals can use a backdoor to steal personal and financial data, install additional malware, and hijack devices. • A well-known backdoor example is called FinSpy. When installed on a system, it enables the attacker to download and execute files remotely on the system the moment it connects to the internet, irrespective of the system's physical location. It compromises overall system security.
  • 9. WEBSITE HACKING • Hacking a website is nothing but getting the password to add, edit, delete data stored in that website. After the attack done by a hacker, if he has changed the password of that website software, then it will be tough for the Webmaster to get it back. Hacker will insert harmful programs by inserting malicious codes into the website. It will also cause to the website server to be slow. • In the past years, even Amazon and Yahoo had been attacked by the hacker experts, but it would not affect much to them. In the last year we had seen that, the world wide hackers are tried their level best to make fear on the famous companies like PayPal and Facebook.
  • 10. NETWORK HACKING • Networking Hacking is an offensive branch of computer security related to networks hacking and the penetration of a target via the networking services or equipment. • Network Hacking is generally means gathering information about domain by using tools like Telnet , Nslookup , Ping, Tracert , Netstat , etc. • It also includes OS Fingerprinting, Port Scanning and Port Surfing using various tools.
  • 11. PASSWORD HACKING • Password hacking, sometimes referred to as password cracking, is a method of recovering passwords from data transmitted by or stored on a computer. • A password can be a secret word, phrase or string of characters used to gain access to secured data. An individual with no knowledge of a password may still determine it through password hacking. • Conversely, a dictionary attack allows hackers to employ a program which cycles through common words. A brute force attack goes letter by letter, whereas a dictionary attack only tries possibilities most likely to succeed. ... For example, users tend to pick short passwords and base their passwords off common words.
  • 12. HACKER • A computer hacker is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. • Though the term "hacker" has become associated in popular culture with a "security hacker" – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be unavailable to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors.
  • 13.
  • 14. TYPES OF HACKERS  Black Hat Hackers  White Hat Hackers  Grey Hat Hackers
  • 15. BLACK HAT HACKER • The term “black hat” originated from Western movies, where the bad guys wore black hats and the good guys wore white hats. • A black-hat hacker is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. The black-hat hacker does not have any permission or authority to compromise their targets. They try to inflict damage by compromising security systems, altering functions of websites and networks, or shutting down systems. They often do so to steal or gain access to passwords, financial information, and other personal data.
  • 16. WHITE HAT HACKER • White-hat hackers, on the other hand, are deemed to be the good guys, working with organizations to strengthen the security of a system. A white hat has permission to engage the targets and to compromise them within the prescribed rules of engagement. • White-hat hackers are often referred to as ethical hackers. This individual specializes in ethical hacking tools, techniques, and methodologies to secure an organization’s information systems. • Unlike black-hat hackers, ethical hackers exploit security networks and look for backdoors when they are legally permitted to do so. White-hat hackers always disclose every vulnerability they find in the company’s security system so that it can be fixed before they are being exploited by malicious actors.Some Fortune 50 companies like Facebook, Microsoft, and Google also use white-hat hackers.
  • 17. GREY HAT HACKER • Grey hats exploit networks and computer systems in the way that black hats do, but do so without any malicious intent, disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies. • Usually, grey-hat hackers surf the net and hack into computer systems to notify the administrator or the owner that their system/network contains one or more vulnerabilities that must be fixed immediately. Grey hats may also extort the hacked, offering to correct the defect for a nominal fee.
  • 18. WORLD BEST HACKER • Kevin Mitnick is the world's authority on hacking, social engineering, and security awareness training. In fact, the world's most used computer-based end-user security awareness training suite bears his name. Kevin's keynote presentations are one part magic show, one part education, and all parts entertaining. • Hacked into 40 major corporations, landing him on the FBI’s Most Wanted list • CEO and chief "white hat" hacker at one of the most advanced boutique security firms in the world • His Global Ghost Team has a 100 percent success rate hacking into security systems.
  • 19. SERVICE OF ETHICAL HACKING • Wireless Security • Application Security • Network Security
  • 20. WIRELESS SECURITY These services provide and assess the level of security in the existing infrastructure and network to provide instructions promising system accessibility and uphold its integrity at the same time. Wireless security works in three steps, which are: • Identify vulnerabilities • Adopt security measures • Deploy the threats
  • 21. APPLICATION SECURITY • Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed. • This is used for digging deep into and processing the cruciality and range of challenges faces by the thick client (Java) and the thin client (web browsers). Application security comprises of services like client- side testing and web application testing.
  • 22. NETWORK SECURITY • Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. It lends information on the networks, services, system devices, and their agreements. It also examines and surveys the applications of the voice over Internet convention within the organization environment. Network security’s main objective is to facilitate the presentation of the political repercussions on its own development.
  • 23. WHY DO WE NEED ETHICAL HACKING? • Ethical Hacking comes handy in corporate sectors and organizations, to fight against unlawful practices of breaching systems and to take precautionary actions on hackers. • Dangerous software like Trojan horses, viruses and spam email causes disruption and disturbance in the system and storage space. Ethical hacking provides useful here as it helps to uncover these virus attacks against systems and in addition, lends high-level security. • The main objective of ethical hacking is to promise safety in wireless infrastructure which constitutes most of the current business companies’ aims.
  • 24. DISADVANTAGES OF HACKING • Massive security breach. • Unauthorized system access on private information. • Privacy violation. • Hampering system operation. • Denial of service attacks. • Malicious attack on the system.
  • 25. NEED OF ETHICAL HACKING? • Ethical hacking follows the guidelines of safe hacking for the efficient working of the system. This is a complex procedure hence an ethical hacker requires great skills in comparison to penetration testing. • Ethical hacking has the privilege of gathering access to a company’s network and information system. This automatically provides security to intellectual attacks and threats like viruses. Ethical hacking, as a result, ends up also testing the security levels of the programs and software.
  • 26. CYBER LAW IN INDIA FOR HACKING • Chapter XI Section 66 of IT Act, 2000 particularly deals with the act of hacking. Section 66(1) defines a hack as, any person, dishonestly or fraudulently, does any act referred to in Section 43 is called hacking, and Section 66(2) prescribes the punishment for it. Hacking is a punishable offense in India with imprisonment up to 3 years, or with fine up to two lakh rupees, or with both. • Chapter IX Section 43 of IT act, 2000 prescribes a penalty for the damage to computer or computer system. It is a common thing which happens whenever a computer system is hacked. Black hats damage the system that they hack and steal the information. This enumerative provision includes a lot of activities.
  • 27. CYBER LAW IN INDIA FOR HACKING • Chapter XI Section 65 of the said act makes tampering with computer source documents an offense. Section 72 of the same chapter makes the breach of confidentiality and privacy, a punishable offense. This is the most common aftermath of hacking. • The Information and Technology Act, 2000 (IT Act) covers all types of cyber crime committed in the country including hacking. Hacking earlier used to refer to a crime under section 43 of the IT Act but at the same time, ethical hacking or better known as white collar hacking was considered legal.
  • 28. SCOPE FOR ETHICAL HACKING • Ethical hacking is generally used as penetration testing to detect vulnerabilities, risk and identify the loopholes in a security system and to take corrective measures against those attacks. • Ethical hacking is a key component of risk evaluation, auditing, and counter-frauds. The scope for the Ethical Hackers is high and it is one of the rapidly growing careers at present as many malicious attackers cause a threat to the business and its networks. Industries like Information Technology and Banking Sectors hire several Ethical hackers to protect their data and infrastructure. Also, in the upcoming days, the demand for this profile is going to be high compared to other profiles due to an increased threat of vulnerabilities.