2. WHAT IS HACKING ?
Hacking is the act of breaking in to a
computersystem and is a criminal offence under
the computer misuse.unauthorized access to
computer resources is called Hacking.
Computer hacking is the most popular form of
hacking now a days, especially in the field of
computer security, but hacking exists in many other
forms, such as phone hacking, brain hacking, etc.
and it's not limited to either of them.
4. TYPES OF HACKER WHITE HAT HACKERS = Who Specializes In Penetration
Testing And In Other Testing Methodologies To Ensure The
Sequrity Of An Organization’s Information Systems.(White
Hackers Save People By Blocking Black Hackers.)
BLACK HAT HACKERS = A Black Hat Is The Villan Or Bad
Guy, Especially In A Western Movie In Which Such A Character
Would Stereotypically Wear A Black Hat In Contrast To The Hero’s
White Hat.
GREY HAT HACKERS = A Grey, Hat Is The Hacking
Community, Refers To A Skilled Hacker Whose Activities Fall
Somewhere Between White And Black Hat Hackers On A Variety
Of Spectra.
5. In 1878, just two years after the telephone was invented by
Alexander Graham Bell, a group of teenage boys hired to run
the switchboards were kicked off of a telephone system in
NewYork.The reason? The boys were more interested in
knowing how the phone system worked than in making
proper connections and directing calls to the correct place. In
essence, they were trying to "hack" the system to see how it
worked.
Hacking has been a part of computing for 40 years.
The first computer hacker emerged at MIT.
Hacking is began in the 1960s at MIT , origin of the
term “hacker”.
MIT=Massachusetts Institute of Technology
6. ADVANTAGES DISADVANTAGES
1) Teaches you that no
technology is 100% secure.
Criminals can use it to their
advantage.
2) To test how good security is
on your own network.
It can harm someone's privacy
3) Can be used to recover lost
information where the computer
password has been lost.
It destroys other people work.
4) It provides security to banking
and financial establishments.
It's Illegal.
5) They call it white hat computer
hacking.
Hiring professional is expensive.
10. EXPLAINATION ON TYPES OF HACKING
WEBSITE HACKING = Hacking A Website Means Taking Control Form The Website
Owner To A Person Who Hacks The Website.
NETWORK HACKING =Generally Means Gathering Information About Domain
By Using Tools Like Telnet,nslookup,ping,tracert,netstat Etc.
ETHICAL HACKING --An ethical hacker is a computer and networking expert who
systematically attempts to penetrate a computer system or network on behalf of its
owners for the purpose of finding security vulnerabilities that a malicious hacker could
potentially exploit..
11. = Email hacker is a free Email hacking tool capable of hacking email
accounts of the most popular service provider. Email hacking is a illicit access to an
email account or email correspondence.
PASSWORD HACKING= A password can be secret word,pharase or string of character used to
gain access to secured data.password hacking is sometimes password sometimes referred to as a
password cracking is a method of recovering passwords from data transmitted by or stored on a
computer.
COMPUTER HACKING = is the practice of modifying computer hardware and
software to accomplish a goal outside of the creator’s original purpose. People
who engage in computer hacking activities are often called hackers.
12.
13. Ian Murphy Kevin Mitnick
Johan HelsinguisLinusTorvalds Mark Abene
Robert Morris
14. WHY DO HACKERS HACK ?
Just for fun.
Show off.
Hack other system
secretly.
Notice many people their
thought.
Steal important
information.
Destroy’s enemy’s
computer network during
the war.
15. 92%
7% 1%
HACKERS
1st Qtr 2nd Qtr 3th Qtr
Amateurs (cyber
joy riders).
■ Potential
professional
hackers for hire
(corporate spies).
■ World-class cyber
criminals.
BASE=ABOUT 100,000
HACKERS WORLDWIDE.
16.
17. WHAT TO DO AFTERYOU'VE BEENHACKED
1) SHUT DOWN THE
SYSTEM.
OR Turn off the system.
2) SEPRATE THE SYSTEM FROM NETWORK.
3) RESTORE THE SYSTEM WITH
THE BACKUP.
OR Shutdown the system .
4) IT CAN BE GOOD TO CALL THE CYBER CRIME POLICE.
5) RESET YOUR PASSWORDS.
6) LET YOUR OTHER CONTACTS KNOW ABOUT THE HACK.
7) MAKE SURE YOU WERE HACKED.
8) FORENSIC RECOVERY.
18. ANDROID MOBILE PHONE COMMAND PROMPT EMULATOR
Android Emulator = The Android SDK includes a mobile device emulator — a virtual mobile
device that runs on your computer.
The emulator lets you develop and test Android applications without using a physical device.
The Android emulator mimics all of the hardware and software features of a typical mobile
device, except that it cannot place actual phone calls.
It provides a variety of navigation and control keys, which you can "press" using your mouse or
keyboard to generate events for your application.
It also provides a screen in which your application is displayed, together with any other active
Android applications.
19.
20. ANONYMOUS
Anonymous Originated In 2003 On The Imageboard 4chan, Representing The
Concept Of Many Online And Offline Community Users Simultaneously Existing
As An Anarchic, Digitized Global Brain.
Anonymous Is A Lossely Associated Hacking Organization. It Was Formed On
“4chan” To Represent The Idea Of Many Online And Offline Community Users.
Anonymous Strongly Opposes Internet Censorship And Surveillance, And Have
Shutdown Multiple Government Website.
Their Member Can Be Recognized Ny Their “Guy Fawkes“ Mask In Public.
Anonymous is the first internet-based super-consciousness. Anonymous is a
group, in the sense that a flock of birds is a group.
Dozens of people have been arrested for involvement in Anonymous cyber
attacks, in countries including the US, UK, Australia, the Netherlands, Spain,
and Turkey.
Supporters have called the group "freedom fighters” and digital Robin Hoods
while critics have described them as "a cyber lynch-mob "or “ cyber terrorists".
In 2012, Time called Anonymous one of the "100 most influential people" in
the world.
22. Watch Dogs is an open world vigilante action-adventure stealth video game developed by
Ubisoft Montreal and published by Ubisoft.
A third-person open-world game from Ubisoft, set in a dark alternate version of the US
where corporations track and catalog all online behavior over a vast data network. A
vigilante group called the Watch_Dogs hacks into this data, using it to hunt criminals.
23. THIS HACKING PROJECT IS DONE BY = MUBEEN MOMIN,SWAPNIL
LAVAHARE,PRATAMESH KHEDEKAR,PRIYANKA MALI,SUYASH BHADEKAR.