2. Concept Of Hacking
Difference Between Hacking & Ethical
Hacking
History Of Hacking
Types Of Hacking
Types Of Hacker
Consequences
Conclusion
3. Hacking is not the one which you people
think of……
It’s not the one which you play with other’s
computers,
Facebook account, Organizations,
Governments etc…)
Now a days this technology has become a
crime due to these aspects
4. Hacking
•Access computer system or network without
authorization
•Breaks the law
Ethical Hacking
•Performs most of the same activities but with
owner’s permission
•It is Legal
•Part of an overall security program
5. The first hacker was appeared in
1960’s at the Massachusetts
Institute Of Technology(MIT)
During the 1970’s, a different kind of
hacker appeared:
Phone Phreaker or Phone Hacker
6. In the 1980’s, phreaks started to
migrate to computers, and the first
Bulletin Board System (BBS)
appeared
During the 1990’s, when the use of
internet widespread around the
world, hackers multiplied
7.
8. Phishing Method OR Fake Login
Hack. (Working)
Key logging (Working)
Brute Force Hack.. (Working)
Cookie Steal Hack. (Not Working)
9. White Hat Hacker
Good guys
Don’t use their skill for illegal
purpose
Computer security experts and help
to protect from Black Hats.
10. Black Hat Hacker
Bad guys
Use their skill maliciously for
personal gain
Hack banks, steal credit cards
and deface websites
11. Grey Hat Hacker
It is a combination of White hat n
Black Hat Hackers
Goal of grey hat hackers is to
provide national security
12. Ian Murphy Kevin Mitnick Johan Hesingus
Linus Trovald Mark Abene Robert Morris
14. Proper ethical hackers should
be employed
Do not expose your passwords to
untrusted sites
Practice using exact web address
Close your internet while not in
use
15. Hacking is of two types
Ethical hacking – a legal method
Consequences of illegal hacking