2. Why security is required?
Introduction to hacking
Hackers
Types of hackers
Vulnerability
Hacking through ports
Conclusion
2
Index
Noble Group of Institutions, Junagadh
3. In today’s day to day life use of Internet has been
increased in vast.
If we see there is a threat for the security issues.
At company level if any breach has been found there
may threat of leaking of asset and skills of employees
At government level any of the security can affect the
reputation of country.
3
Why security is required?
Noble Group of Institutions, Junagadh
4. Nowadays the increased use of infrastructures of
internet has been given threat of security
Many sites which relate to the payment can be
breached and all the money can be stolen
Phishing is common attack nowadays which leads to
requirement of the security to internet access
Malware attacks, ransom ware attacks are also results
of lack of security.
4
Cont..
Noble Group of Institutions, Junagadh
5. Hacking is nothing but a art through which one can
find breaches and loopholes.
Hacking can also be termed as anti-social activity.
Hacking can be relatable to both good and bad uses
of itself
One can help through finding breaches into any of the
source
5
Introduction to Hacking
Noble Group of Institutions, Junagadh
6. When any hacker use it in a bad way it can lead to
many of the critical damages to sources.
It can lead to dangerous issues of the crimes as well
profitable acts also.
Many script kiddies can be available with negative
sidelines.
Thus hacking can lead to both positive and negative
effects.
6
Cont..
Noble Group of Institutions, Junagadh
7. Hackers are those persons who can use the term
hacking in there own way in a professional way.
In simple terms hackers are intelligent computer
professional.
There can be different motives for an hacker by there
hacking.
It can be both positive and negative.
7
Hackers
Noble Group of Institutions, Junagadh
8. Motives or intentions:
• One can hack something to get deepest knowledge of the
system.
• Many hackers can hack something for knowing the backened
process of the system.
• Main motive can be finding the vulnerabilities in any system.
• The hackeres can create security awareness in people of the
organization or institutions.
• Malicious intentions can be one of the motive.
• Many other motives are been notified.
8
Cont..
Noble Group of Institutions, Junagadh
9. Types of Hackers are defined or based on the motives
or intentions.
They can also be said on the work or type of hacking
they do.
There are different types of Hackers:
• Black hat
• White hat
• Grey hat
9
Types of Hackers
Noble Group of Institutions, Junagadh
10. Black hat hackers is the term which is given to such
hackers who do some illegal activities
They are the hackers who have not thought about the
postiveness.
They are the stereotypical groups who don’t care
about any good motives.
They hack into any system to destroy, deploy, steal
data, modify data and many other.
10
Black Hat
Noble Group of Institutions, Junagadh
11. White hat hackers are totally opposite from balck hat
hackers.
They are hackers which are helping the instituitons
and organizations.
They find the vulnerabilities in any of the system for
helping purpose
They are not giving the threats to any of the
companies or organization.
11
White hat
Noble Group of Institutions, Junagadh
12. Gray hat hackers are the hackers which can be said to
be combination of black hat and white hat hackers
Gray hat hackers hack any of the system on the order
of any organization or institutions.
The do not have any of intentions of destroying or
damaging any system.
Thus they are not having criminal ideas.
12
Grey Hat
Noble Group of Institutions, Junagadh
13. Phreaks are very interesting persons who use
different breaching processes
They are included in types of Hackers in terms for
different types of hacking.
They are named Phreaks because those are the
hackers who breaks into mobile phones.
They do so by using different computer networks and
devices.
13
Phreaks
Noble Group of Institutions, Junagadh
14. Those can also be included into types of Hackers.
They don’t have any of the technical skills for hacking
any of the systems.
Though they are included because they use available
information from any other source to break into the
systems or organization.
They do such activities for fun or curiosity activities.
14
Script Kiddies
Noble Group of Institutions, Junagadh
15. Term vulnerability is nothing but the mistakes in any
of the sites or any of the organizations or institutions.
Those are the available loopholes in server system or
network.
Vulnerability can be found out anywhere by any
means through different methods.
It’s notes can be searched on internet through
number or CVE.
15
Vulnerability
Noble Group of Institutions, Junagadh
16. There are many ways to hack into something as said
in ahead slides
One of those is through ports available.
Ports can be available in hardware part or software
part or network part.
This method of hacking is simplest way to hack
something available.
16
Hacking through ports
Noble Group of Institutions, Junagadh
17. We have many available ports for hacking like:
Physical: USB,Serial
Virtual: 1 to 65535
From above 1 to 65535 ports port number 80,443and 21 are
the most important ports for any website. That will be
explained in detail in second PPT.
SMTP (Simple Mail Transfer Protocol): Port number 25
POP(Post Office Protocol):Port number 110
17
Cont…
Noble Group of Institutions, Junagadh
18. We should be having security in our surroundings
because it is important to be prevented than cured.
And Ethical Hacking helps to solve many problems
through providing security.
There are community of hackers available.
Help others by providing security
To catch criminal only think like a criminal don’t be a
criminal
18
Conclusion
Noble Group of Institutions, Junagadh