SlideShare a Scribd company logo
1 of 12
Presented By 
MISS. KUSAL SONAL K. 
3RD year computer engineering 
Guided By 
Mrs.M.Kokate 
Government polytechnic pune .
1. INTRODUCTION OF HACKING. 
2. WHAT IS HACKING. 
3. TYPES OF HACKING. 
4. TECHNIQUE OF HACKING. 
5. WHAT SHOULD DO AFTER HACKED? 
6. ADVANTAGES AND DISADVANTAGES. 
7. CONCLUSION.
Hacking is the art of exploting computers to 
get access to otherwise unauthorized 
information. 
Now that the world is using IT system to 
gather, store and manipulate important 
information. 
There is also need to make data secure.
1. Hacking is the practice of 
modifying the feature of the system, 
in order to accomplish a goal outside 
of the creators original purpose 
2. A hacker is basically someone who 
breaks into computer networks 
personal computer system for the 
challenge of it.
1. Ethical hacking 
2. Unethical hacking.
1. White hat hacker 
2. Black hat hacker 
3. Grey hat hacker 
4. Elite hat hacker 
5. Neophyte 
6. Blue hat hacker
1. Password cracking 
2. Packet sniffer 
3. Social engineering 
4. Spoofing attack 
5. Rootkit
1. Shutdown the system Or turn off the system 
2. Separate the system from network 
3. Restore the system with the backup Or 
reinstall all program. 
4. Connect the system to the network.
 Can be used to recover lost information 
where the computer password has been 
lost.
 It can harm someone privacy.
Here conclude hacker is good as well as bad 
It is depend upon the minds of hacker. 
There's nothing wrong with the hacker 
knowledge itself, despite its potential 
applications.
Thank you…………!!!!! 
Any question…..?

More Related Content

What's hot (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
INTERNATIONAL SECURITY MEASURES IN CYBERSPACE
INTERNATIONAL SECURITY MEASURES  IN CYBERSPACEINTERNATIONAL SECURITY MEASURES  IN CYBERSPACE
INTERNATIONAL SECURITY MEASURES IN CYBERSPACE
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
ECDPM - Discussion Paper 116 - Emerging Players in the Caribbean What Implica...
ECDPM - Discussion Paper 116 - Emerging Players in the Caribbean What Implica...ECDPM - Discussion Paper 116 - Emerging Players in the Caribbean What Implica...
ECDPM - Discussion Paper 116 - Emerging Players in the Caribbean What Implica...
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
White tiger
White tigerWhite tiger
White tiger
 

Similar to Hacking

Similar to Hacking (20)

Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Network security
Network securityNetwork security
Network security
 
Hacking
HackingHacking
Hacking
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking
 

Recently uploaded

Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 

Recently uploaded (20)

Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 

Hacking

  • 1. Presented By MISS. KUSAL SONAL K. 3RD year computer engineering Guided By Mrs.M.Kokate Government polytechnic pune .
  • 2. 1. INTRODUCTION OF HACKING. 2. WHAT IS HACKING. 3. TYPES OF HACKING. 4. TECHNIQUE OF HACKING. 5. WHAT SHOULD DO AFTER HACKED? 6. ADVANTAGES AND DISADVANTAGES. 7. CONCLUSION.
  • 3. Hacking is the art of exploting computers to get access to otherwise unauthorized information. Now that the world is using IT system to gather, store and manipulate important information. There is also need to make data secure.
  • 4. 1. Hacking is the practice of modifying the feature of the system, in order to accomplish a goal outside of the creators original purpose 2. A hacker is basically someone who breaks into computer networks personal computer system for the challenge of it.
  • 5. 1. Ethical hacking 2. Unethical hacking.
  • 6. 1. White hat hacker 2. Black hat hacker 3. Grey hat hacker 4. Elite hat hacker 5. Neophyte 6. Blue hat hacker
  • 7. 1. Password cracking 2. Packet sniffer 3. Social engineering 4. Spoofing attack 5. Rootkit
  • 8. 1. Shutdown the system Or turn off the system 2. Separate the system from network 3. Restore the system with the backup Or reinstall all program. 4. Connect the system to the network.
  • 9.  Can be used to recover lost information where the computer password has been lost.
  • 10.  It can harm someone privacy.
  • 11. Here conclude hacker is good as well as bad It is depend upon the minds of hacker. There's nothing wrong with the hacker knowledge itself, despite its potential applications.