Overview of Hacking.
Types of Hacker .
Why do Hacker hacks?
How do Hacker hacks?
Ethical Hacking and it’s Process.
Skills of an Ethical Hackers.
Prevention of Hacking.
What should do after Hacked ?
The term “Hack” was first used by US university staff
When eBay was first attacked in Feb-2000 it’s
server was bombarded with fake request for web
pages & overloaded the site.
A group of teenagers once hacked into AOL and stole
credit cards to buy Video Games.
In 1998,teenagers hack into Bell Atlantic phone
Eric Raymond compiler of the “The new
Hacker’s Dictionary", defines a hacker as a
A ‘good hack’ is a clever solution to a
Hacking is act of doing it.
A person who enjoys learning
language or system.
A person who
actually doing the
programming rather then just
A person capable of appreciating some once
A black hat is the villain or bad guys.
Use computer to attack systems for profit, for
revenge, or for political mitigations.
Black hat hackers always do Illegal work.
They work for black money.
They are professional in their field.
They use their knowledge for illegal purpose.
Kevin d mitnick
White hat hackers like Ethical hackers. They use
their skills for good purposes.
They work for organizations for stop the illegal
activities through Black Hat Hackers.
They works to ensure the security of an
Tim Berner Lee
To make Security Stronger (Ethical Hacking).
Just for fun.
Hack other System secretly.
Notify many people their thoughts.
Steel important information.
Destroy enemy’s computer network during war.
1 ->i or l
L ->i or I
EX:1 d1d n0t h4ck th1s p4g3, 1t w4s I1k3 th1s wh3n
1 h4ck3d 1n.(Encrypted )
I did not hack this page, it was this when I
It is legal.
Permission is obtained from the target.
Also called – Attack & penetration testing, white hat
Part of an overall security program.
Perform most of the same activities but with owner’s