SlideShare a Scribd company logo
1 of 23
A Presentation on
Hacking

Group Name:- G3
Group Members :-

Ravikant Verma
Rahul Sisodiya
Sanjay Kumar
Jugendra Singh
Hacking
Authorized or unauthorized
attempts to bypass the security
mechanisms of an information
system or network.
Types of Hacking
•Website Hacking.
•E-mail Hacking.
•Network Hacking.
•Password Hacking.
•Online Banking Hacking.
•Computer Hacking.
Website Hacking..
E-mail Hacking…
Network Hacking...
Password Hacking..
Online Banking Hacking..
Computer Hacking..
Who is a “HACKER” ?
Someone who bypasses the
system‟s access controls by taking
advantage of security weaknesses
left in the system by developers.
Types of Hackers
White-Hat Hackers
The good guys who identify the
security weakness of the system or
network and inform the owner about
them.
Black Hat Hackers
A black hat is the villain or bad guy,
who crash into victim‟s security to
steal information and destroy the
victims security network.
Also known as „cracker‟.
Grey Hat Hackers
A grey hat, in the hacking
community, refers to a skilled
hacker who is somewhere in
between white and black hat
hackers.
Why do people hack ?
•To make security stronger ( Ethical
Hacking ).
•Just for fun.
•Show off.
•Hack other systems secretly.
•Notify many people their thought.
•For money purpose.
Random Fact !!!!
The average age group of hackers
are aged between 14-24 yrs. …
Did you know ?
Social networking sites like
„FACEBOOK‟,‟GMAIL‟,‟YAHOO”
comprised of 60% of direct or
indirect hacking incidents.
Popular Hacked sites
www.jntu.ac.in was hacked on 7 Nov
2010.
www.songs.pk was hacked on 15 July
2011.

Songs.pk

JNTUhomepage after it was hcked
Preventive measures
•Install a strong anti-virus.
•Always run a anti-virus check before
you download a program or a file
from the internet.
•Avoid disclosing personal details like
phone number, credit card details
to strangers.
Any Queries ??

More Related Content

What's hot (19)

Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 
Hackers final
Hackers finalHackers final
Hackers final
 
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And Hackers
 
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threats
 
Hackers
HackersHackers
Hackers
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
Final ethical hacking
Final ethical hackingFinal ethical hacking
Final ethical hacking
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Hacking
HackingHacking
Hacking
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Viewers also liked

Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...BAgobcamp
 
Hacking the Public Presentation
Hacking the Public PresentationHacking the Public Presentation
Hacking the Public PresentationSpicer Group, Inc.
 
Martie star wars birthday
Martie star wars birthdayMartie star wars birthday
Martie star wars birthdayksmith9
 
Outlook configuration in Microsoft Office
Outlook configuration in Microsoft OfficeOutlook configuration in Microsoft Office
Outlook configuration in Microsoft OfficeFreeKaaMaal
 

Viewers also liked (6)

Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
 
Datateknik
DatateknikDatateknik
Datateknik
 
Hacking the Public Presentation
Hacking the Public PresentationHacking the Public Presentation
Hacking the Public Presentation
 
Martie star wars birthday
Martie star wars birthdayMartie star wars birthday
Martie star wars birthday
 
Outlook configuration in Microsoft Office
Outlook configuration in Microsoft OfficeOutlook configuration in Microsoft Office
Outlook configuration in Microsoft Office
 
Dhtic expo
Dhtic expoDhtic expo
Dhtic expo
 

Similar to Hacking (20)

hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Hacking
HackingHacking
Hacking
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
HACKING
HACKINGHACKING
HACKING
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Hacking-coffee and latte
Hacking-coffee and latteHacking-coffee and latte
Hacking-coffee and latte
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking
HackingHacking
Hacking
 

More from Rahul Baghla

More from Rahul Baghla (10)

Holography
HolographyHolography
Holography
 
Sensor technology
Sensor technologySensor technology
Sensor technology
 
Lifi technology
Lifi technologyLifi technology
Lifi technology
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Computer virus
Computer virusComputer virus
Computer virus
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Hacking