SlideShare a Scribd company logo
1 of 19
Hacking? 
In Cyber security world, the person who is able 
to exploit the weakness in the system and 
manages it to exploit it to accomplish his goal 
(either good or bad) 
Is a 
HACKER
Script Kiddie 
White Hat Hacker 
Black Hat Hacker 
Grey Hat Hacker 
Hactivitist 
Types 
of 
hackers 
Black Hat
Script Kiddie 
Script Kiddies
• 1.Black hat 
Black Hat
• In summary, the term “Black hat" may refer to 
a hacker who: 
• violates computer security for little reason 
beyond maliciousness or for personal gain 
• Black hat hackers break into secure networks 
to destroy data or make the network unusable 
for those who are authorized to use the 
network.
• White Hat 
White Hat
• In summary, the term “White hat" may refer 
to a hacker who: 
• The term "white hat" in Internet slang refers 
to an ethical hacker. 
• breaks security for non-malicious reasons, 
perhaps to test their own security system or 
while working for a security company which 
makes security software.
• Grey hat 
Grey Hat
• In summary, the term "grey hat" may refer to a 
hacker who: 
• Engages in security research with the intention to 
secure rather than exploit 
• Grapples with questions of ethics and law in the 
line of their work. 
• Does not support full disclosure of vulnerabilities. 
• Usually reports the vulnerability to the product 
vendor.
HACKERS 
Programers with 
Good 
intentions 
who exploit the 
weakness. 
Not for any bad intentions
CRACKERS 
Programers with 
Negative 
intentions 
who exploit the 
weakness. 
for many bad intentions
cracking is Often 
Misunderstood as hacking 
Malicious attack on 
computers is officially called 
as cracking 
Hacking truly applies to 
activities having 
good intentions
Hackers and Crackers! A tiger Claw Presentation 003
Hackers and Crackers! A tiger Claw Presentation 003
Hackers and Crackers! A tiger Claw Presentation 003

More Related Content

What's hot

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 
Ethical hacking 4 6pm
Ethical hacking 4 6pmEthical hacking 4 6pm
Ethical hacking 4 6pmbharat6689
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs crackingNaren Naren
 
ETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGEETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGEHritik Jage
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakaleAakash Takale
 
Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module ankit sarode
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basicsMeenesh Jain
 
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric VanderburgInformation Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric VanderburgEric Vanderburg
 
Building a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudBuilding a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudProtectWise
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 

What's hot (20)

Hackers ESP
Hackers ESPHackers ESP
Hackers ESP
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking 4 6pm
Ethical hacking 4 6pmEthical hacking 4 6pm
Ethical hacking 4 6pm
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
ETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGEETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGE
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
 
Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric VanderburgInformation Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
 
Building a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudBuilding a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the Cloud
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ceh3
Ceh3Ceh3
Ceh3
 
Hackers
HackersHackers
Hackers
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 

Viewers also liked

Trabajo ciudadanía isaac
Trabajo ciudadanía isaacTrabajo ciudadanía isaac
Trabajo ciudadanía isaacIsaac Graça
 
Solaris OS - Tiger Claw Presentation 006
Solaris OS - Tiger Claw Presentation 006Solaris OS - Tiger Claw Presentation 006
Solaris OS - Tiger Claw Presentation 006Lakshmanan Meiyappan
 
How to Insert a Trap for a Sparrow
How to Insert a Trap for a SparrowHow to Insert a Trap for a Sparrow
How to Insert a Trap for a SparrowMason Garran
 
Pirates of silicon valley, Clash Between Bill Gates And Steve Jobs
Pirates of silicon valley, Clash Between Bill Gates And Steve JobsPirates of silicon valley, Clash Between Bill Gates And Steve Jobs
Pirates of silicon valley, Clash Between Bill Gates And Steve JobsLakshmanan Meiyappan
 
Chrome and Android Operating Systems
Chrome and Android Operating SystemsChrome and Android Operating Systems
Chrome and Android Operating SystemsLakshmanan Meiyappan
 
Tecnologia en la edad de piedra
Tecnologia en la edad de piedraTecnologia en la edad de piedra
Tecnologia en la edad de piedrasandramilenamora
 
Command and Prohibition
Command and ProhibitionCommand and Prohibition
Command and Prohibitiondewi885
 

Viewers also liked (9)

Being indian!
Being indian!Being indian!
Being indian!
 
Trabajo ciudadanía isaac
Trabajo ciudadanía isaacTrabajo ciudadanía isaac
Trabajo ciudadanía isaac
 
Solaris OS - Tiger Claw Presentation 006
Solaris OS - Tiger Claw Presentation 006Solaris OS - Tiger Claw Presentation 006
Solaris OS - Tiger Claw Presentation 006
 
How to Insert a Trap for a Sparrow
How to Insert a Trap for a SparrowHow to Insert a Trap for a Sparrow
How to Insert a Trap for a Sparrow
 
Pirates of silicon valley, Clash Between Bill Gates And Steve Jobs
Pirates of silicon valley, Clash Between Bill Gates And Steve JobsPirates of silicon valley, Clash Between Bill Gates And Steve Jobs
Pirates of silicon valley, Clash Between Bill Gates And Steve Jobs
 
Chrome and Android Operating Systems
Chrome and Android Operating SystemsChrome and Android Operating Systems
Chrome and Android Operating Systems
 
XBox 360 vs PS4
XBox 360 vs PS4XBox 360 vs PS4
XBox 360 vs PS4
 
Tecnologia en la edad de piedra
Tecnologia en la edad de piedraTecnologia en la edad de piedra
Tecnologia en la edad de piedra
 
Command and Prohibition
Command and ProhibitionCommand and Prohibition
Command and Prohibition
 

Similar to Hackers and Crackers! A tiger Claw Presentation 003

Similar to Hackers and Crackers! A tiger Claw Presentation 003 (20)

Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
All About Hacking.!!
All About Hacking.!! All About Hacking.!!
All About Hacking.!!
 
ICT ~Hacking~
ICT ~Hacking~ICT ~Hacking~
ICT ~Hacking~
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Hacking
HackingHacking
Hacking
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Hacking-coffee and latte
Hacking-coffee and latteHacking-coffee and latte
Hacking-coffee and latte
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]
 
ETHICAL HACKING.pptx
ETHICAL HACKING.pptxETHICAL HACKING.pptx
ETHICAL HACKING.pptx
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And Hackers
 

Recently uploaded

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Hackers and Crackers! A tiger Claw Presentation 003

  • 1.
  • 2. Hacking? In Cyber security world, the person who is able to exploit the weakness in the system and manages it to exploit it to accomplish his goal (either good or bad) Is a HACKER
  • 3. Script Kiddie White Hat Hacker Black Hat Hacker Grey Hat Hacker Hactivitist Types of hackers Black Hat
  • 5. • 1.Black hat Black Hat
  • 6. • In summary, the term “Black hat" may refer to a hacker who: • violates computer security for little reason beyond maliciousness or for personal gain • Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.
  • 7. • White Hat White Hat
  • 8. • In summary, the term “White hat" may refer to a hacker who: • The term "white hat" in Internet slang refers to an ethical hacker. • breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software.
  • 9.
  • 10. • Grey hat Grey Hat
  • 11. • In summary, the term "grey hat" may refer to a hacker who: • Engages in security research with the intention to secure rather than exploit • Grapples with questions of ethics and law in the line of their work. • Does not support full disclosure of vulnerabilities. • Usually reports the vulnerability to the product vendor.
  • 12.
  • 13.
  • 14. HACKERS Programers with Good intentions who exploit the weakness. Not for any bad intentions
  • 15. CRACKERS Programers with Negative intentions who exploit the weakness. for many bad intentions
  • 16. cracking is Often Misunderstood as hacking Malicious attack on computers is officially called as cracking Hacking truly applies to activities having good intentions