Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Hacking and Types of Hacker.

2,809 views

Published on

In PPT u can learn about what is a hacker, types of a hacker, top hacker etc.

Thank u

If u like this ppt plz like and comment it

Published in: Education
  • Secrets To Making Up These secrets will help you get back together with your ex. ■■■ http://t.cn/R50e2MX
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • I sincerely didn’t like the idea, but this is my way of saying thank you to the Quora user that recommended a hacker ( PRIVATEJOSH3@GMAIL.COM) I hired him for a very private and difficult matter of helping me hack a my spouse’s phone and social networks and some other personal stuffs and he far exceeded my expectations. which Jeremie, helped me get the info(whatsapp, facebook, text messages, call logs etc) faster and cheaper than I had imagined. The first time we spoke, we had a very long phone consultation in he gave me all my options that he could think of to resolve my case, and he even recommended I try other options before hiring him, which shows that he is honest. I decided to hire him and I am glad I did. he is a fantastic investigator and a great person. If you need a professional, reliable and efficient hacker, then you should contact this guy ; PRIVATEJOSH3@GMAIL.COM You can also call him or send him a text: +1 908 693 9476
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Hacking and Types of Hacker.

  1. 1. HACKING
  2. 2. HISTORY OF HACKING: • THE FIRST HACKER WAS APPEARED IN 1960’S AT THE MASSACHUSETTS INSTITUTE OF TECHNOLOGY(MIT) • DURING THE 1970’S, A DIFFERENT KIND OF HACKER APPEARED: PHONE PHREAKER OR PHONE HACKER
  3. 3. WHAT IS HACKING: • IN COMPUTING, A HACKER IS ANY SKILLED COMPUTER EXPERT THAT USES THEIR TECHNICAL KNOWLEDGE TO OVERCOME A PROBLEM. WHILE "HACKER" CAN REFER TO ANY COMPUTER PROGRAMMER, THE TERM HAS BECOME ASSOCIATED IN POPULAR CULTURE WITH A "SECURITY HACKER", SOMEONE WHO, WITH THEIR TECHNICAL KNOWLEDGE, USES BUGS OR EXPLOITS TO BREAK INTO COMPUTER SYSTEMS.
  4. 4. TYPES OF HACKER: Hacker Ethical Hacker (White hat) Cracker (Black hat) Grey hat (Both)
  5. 5. Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration Testing and vulnerability assessments. Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
  6. 6. HACKING TECHNIQUES: 1. KEYLOGGER 2. DENIAL OF SERVICE (DOSDDOS) 3. WATERHOLE ATTACKS 4. FAKE WAP 5. EAVESDROPPING (PASSIVE ATTACKS) 6. PHISHING 7. VIRUS, TROJEN ETC. 8. CLICKJACKING ATTACKS 9. COOKIE THEFT 10. BAIT AND SWITCH
  7. 7. KEYLOGGER: • KEYLOGGER IS A SIMPLE SOFTWARE THAT RECORDS THE KEY SEQUENCE AND STROKES OF YOUR KEYBOARD INTO A LOG FILE ON YOUR MACHINE. THESE LOG FILES MIGHT EVEN CONTAIN YOUR PERSONAL EMAIL IDS AND PASSWORDS. • KEYLOGGER IS ONE OF THE MAIN REASONS WHY ONLINE BANKING SITES GIVE YOU AN OPTION TO USE THEIR VIRTUAL KEYBOARDS.
  8. 8. DENIAL OF SERVICE ATTACK: • A DENIAL OF SERVICE ATTACK IS A HACKING TECHNIQUE TO TAKE DOWN A SITE OR SERVER BY FLOODING THAT SITE OR SERVER WITH A LOT OF TRAFFIC THAT THE SERVER IS UNABLE TO PROCESS ALL THE REQUESTS IN THE REAL TIME AND FINALLY CRASHES DOWN. • FOR DDOS ATTACKS, HACKERS OFTEN DEPLOY BOTNETS OR ZOMBIE COMPUTERS WHICH HAVE GOT THE ONLY WORK TO FLOOD YOUR SYSTEM WITH REQUEST PACKETS.
  9. 9. WATERHOLE ATTACKS: • IF YOU ARE A BIG FAN OF DISCOVERY OR NATIONAL GEOGRAPHIC CHANNELS, YOU COULD RELATE EASILY WITH THE WATERHOLE ATTACKS. TO POISON A PLACE, IN THIS CASE, THE HACKER HITS THE MOST ACCESSIBLE PHYSICAL POINT OF THE VICTIM. • FOR EXAMPLE, IF THE SOURCE OF A RIVER IS POISONED, IT WILL HIT THE ENTIRE STRETCH OF ANIMALS DURING SUMMER. IN THE SAME WAY, HACKERS TARGET THE MOST ACCESSED PHYSICAL LOCATION TO ATTACK THE VICTIM. THAT POINT COULD BE A COFFEE SHOP, A CAFETERIA ETC. • ONCE HACKERS ARE AWARE OF YOUR TIMINGS, THEY MIGHT CREATE A FAKE WI-FI ACCESS POINT AND MODIFY YOUR MOST VISITED WEBSITE TO REDIRECT THEM TO YOU TO GET YOUR PERSONAL INFORMATION.
  10. 10. FAKE WAP: • EVEN JUST FOR FUN, A HACKER CAN USE SOFTWARE TO FAKE A WIRELESS ACCESS POINT. THIS WAP CONNECTS TO THE OFFICIAL PUBLIC PLACE WAP. ONCE YOU GET CONNECTED THE FAKE WAP, A HACKER CAN ACCESS YOUR DATA, JUST LIKE IN THE ABOVE CASE. • EX: • TOOL: WI-FI PUMPKIN
  11. 11. EAVESDROPPING (PASSIVE ATTACKS): • UNLIKE OTHER ATTACKS WHICH ARE ACTIVE IN NATURE, USING A PASSIVE ATTACK, A HACKER JUST MONITORS THE COMPUTER SYSTEMS AND NETWORKS TO GAIN SOME UNWANTED INFORMATION. • THE MOTIVE BEHIND EAVESDROPPING IS NOT TO HARM THE SYSTEM BUT TO GET SOME INFORMATION WITHOUT BEING IDENTIFIED.
  12. 12. PHISHING: • PHISHING IS A HACKING TECHNIQUE USING WHICH A HACKER REPLICATES THE MOST-ACCESSED SITES AND TRAPS THE VICTIM BY SENDING THAT SPOOFED LINK. • ONCE THE VICTIM TRIES TO LOGIN OR ENTER SOME DATA, THE HACKER GETS THAT PRIVATE INFORMATION OF THE TARGET VICTIM USING THE TROJAN RUNNING ON THE FAKE SITE.
  13. 13. VIRUS OR TROJANS ETC. : • VIRUS OR TROJANS ARE MALICIOUS SOFTWARE PROGRAMS WHICH GET INSTALLED INTO THE VICTIM’S SYSTEM AND KEEPS SENDING THE VICTIMS DATA TO THE HACKER.
  14. 14. CLICKJACKING: • CLICKJACKING IS ALSO KNOWN BY A DIFFERENT NAME, UI REDRESS. IN THIS ATTACK, THE HACKER HIDES THE ACTUAL UI WHERE THE VICTIM IS SUPPOSED TO CLICK. • IN ANOTHER WORD, THE ATTACKER HIJACKS THE CLICKS OF THE VICTIM THAT AREN’T MEANT FOR THE EXACT PAGE, BUT FOR A PAGE WHERE THE HACKER WANTS YOU TO BE.
  15. 15. COOKIE THEFT: • THE COOKIES OF A BROWSER KEEP OUR PERSONAL DATA SUCH AS BROWSING HISTORY, USERNAME, AND PASSWORDS FOR DIFFERENT SITES THAT WE ACCESS. ONCE THE HACKER GETS THE ACCESS TO YOUR COOKIE, HE CAN EVEN AUTHENTICATE HIMSELF AS YOU ON A BROWSER.
  16. 16. BAIT AND SWITCH: • USING BAIT AND SWITCH HACKING TECHNIQUE, THE HACKER RUNS A MALICIOUS PROGRAM WHICH THE USER BELIEVES TO BE AUTHENTIC. THIS WAY, AFTER INSTALLING THE MALICIOUS PROGRAM ON YOUR COMPUTER, THE HACKER GETS UNPRIVILEGED ACCESS TO YOUR COMPUTER.
  17. 17. HACKING LANGUAGE: 1. WEB HACKING: SINCE MOST OF THE TECH IS BUILD AROUND WORLD WIDE WEB, IT IS IMPORTANT TO LEARN WEB HACKING TO BE A GOOD HACKER. LET’S SAY YOU ARE INTERESTED IN HACKING WEB APPS AND/OR WEBSITES THEN YOU WILL NEED TO LEARN WEB CODING. WEBSITES USE MOSTLY HTML, PHP AND JAVASCRIPT SO IT IS IMPORTANT TO LEARN THESE THREE. • HTML: ONE OF THE EASIEST AND WIDELY USED STATIC MARKUP WEB LANGUAGE PRESENT IN EACH AND EVERY WEBSITE YOU SEE IN YOUR BROWSER. IT’S RECOMMENDED TO LEARN HTML BECAUSE IT HELPS UNDERSTANDING WEB ACTIONS, RESPONSE, AND LOGIC. • JAVASCRIPT: JS IS A CLIENT-SIDE WEB PROGRAMMING MOSTLY USED IN WEB SITES FOR BETTER USER INTERFACE AND QUICK RESPONSE. IF YOU ARE INTERESTED IN A HACKING CAREER YOU NEED TO LEARN JAVASCRIPT BECAUSE IT HELPS TO UNDERSTAND CLIENT-SIDE MECHANISM WHICH IS ESSENTIAL FOR FINDING CLIENT-SIDE FLAWS.
  18. 18. CONT.…. • PHP: A DYNAMIC SERVER-SIDE LANGUAGE WHICH IS RESPONSIBLE FOR MANAGING WEB-APPS AND DATABASE. PHP IS CONSIDERED ONE OF THE MOST ESSENTIAL LANGUAGE BECAUSE IT CONTROLS EVERYTHING ON SITE AND SERVER, LIKE A CAPTAIN OF A SHIP. IT IS ADVISED TO LEARN PHP NICELY. • SQL: SQL IS RESPONSIBLE FOR STORING AND MANAGING SENSITIVE AND CONFIDENTIAL DATA SUCH AS USER CREDENTIALS, BANK AND PERSONAL INFORMATION ABOUT THE WEBSITE VISITORS. BLACK HAT HACKERS MOSTLY TARGET SQL DATABASE AND STEAL INFORMATION WHICH IS LATER SOLD ON UNDERGROUND DARK WEB FORUM. IF YOU WANT TO BE GOOD SECURITY RESEARCHER, YOU SHOULD LEARN SQL SO THAT YOU CAN FIND FLAWS IN A WEBSITE AND REPORT THEM.
  19. 19. CONT... 2. EXPLOIT WRITING AFTER WEB HACKING, ANOTHER MOST IMPORTANT FEATURE OF HACKING IS EXPLOITS. YOU CAN CRACK A PARTICULAR SOFTWARE BY WRITING A EXPLOIT. BUT TO WRITE A EXPLOIT YOU NEED TO LEARN EITHER PYTHON OR RUBY. • PYTHON: IT IS SAID THAT A SECURITY RESEARCHER OR HACKER SHOULD KNOW PYTHON BECAUSE IT THE CORE LANGUAGE FOR CREATING EXPLOITS AND TOOLS. SECURITY EXPERTS AND EVEN PRO HACKERS SUGGEST THAT MASTER PYTHON IS THE BEST WAY TO LEARN HACKING. PYTHON OFFERS WIDER FLEXIBILITY AND YOU CAN CREATE EXPLOITS ONLY IF YOU ARE GOOD IN PYTHON. • RUBY: RUBY IS A SIMPLE YET COMPLICATED OBJECT-ORIENTED LANGUAGE. RUBY IS VERY USEFUL WHEN IT COMES TO EXPLOIT WRITING. IT IS USED FOR METERPRETER SCRIPTING BY HACKERS. THE MOST FAMOUS HACKER TOOL, METASPLOIT FRAMEWORK IS PROGRAMMED IN RUBY. THOUGH RUBY MAY NOT BE AS VERSATILE AS PYTHON, KNOWLEDGE OF RUBY IS MUST IN UNDERSTANDING EXPLOITS.
  20. 20. CONT.… • REVERSE ENGINEERING: • REVERSE ENGINEERING, THE PROCESS OF TAKING A SOFTWARE PROGRAM’S BINARY CODE AND RECREATING IT SO AS TO TRACE IT BACK TO THE ORIGINAL SOURCE CODE. IF YOU KNOW REVERSE ENGINEERING YOU CAN FIND FLAWS AND BUGS EASILY. IF YOU WANT TO LEARN REVERSE ENGINEERING YOU NEED TO KNOW C, C++ AND JAVA. THE PROCESS OF CONVERTING THE CODE WRITTEN IN HIGH LEVEL LANGUAGE INTO A LOW LEVEL LANGUAGE WITHOUT CHANGING THE ORIGINAL PROGRAM IS KNOWN AS REVERSE ENGINEERING.
  21. 21. HOW TO TRANSLATE THE HACKERS’ LANGUAGE 1 -> I OR L 3 -> E 4 -> A 7 -> T 9 -> G 0 -> O $ -> S | -> I OR L || -> N |/| -> M S -> Z Z -> S F -> PH PH -> F X -> CK CK -> X
  22. 22. HOW TO TRANSLATE THE HACKERS’ LANGUAGE • EX) • 1 D1D N0T H4CK TH1S P4G3, 1T W4S L1K3 TH1S WH3N 1 H4CK3D 1N • I DID NOT HACK THIS PAGE, IT WAS LIKE THIS WHEN I HACKED IN
  23. 23. TOP 10 ETHICAL HACKER: 1) RAHUL TYAGI 2) PRANAV MISTRY 3) ANKIT FADIA 4) KOUSHIK DUTTA 5) VIVEK RAMACHANDRAN 6) TRISHNEET ARORA 7) SUNNY VAGHELA 8) BENILD JOSEPH 9) FALGUN RATHOD 10) JAYANT KRISHNAMURTHY

×