2. CONTENTS
• Introduction to Hacking
• Historical events of Hacking
• Types of Hackers
• Hacktivism
• World famous Hacker Groups
2/26/2015Over View Of Hacking 2
3. CONTENTS
•Some commonly used Hacking Techniques &
Tools
•How to Secure your online Accounts
•Did you know, you’re under surveillance?
•Maintaining Anonymity in online
2/26/2015Over View Of Hacking 3
4. INTRODUCTION
According to old-school definition of hackers “everyone
has a right to think differently”, from that thought
process the art of creativity starts exploring.
But generally the idea of hacking is that
2/26/2015Over View Of Hacking 4
5. MISCONCEPTION OF HACKING …!
• Illegally entering into public computers
• Crashing the popular websites
• Steeling Confidential Data
• Creating malicious viruses & infecting people
computers
2/26/2015Over View Of Hacking 5
6. WHAT TELLS ABOUT
The word “hacker” was used to describe a
, someone who was able
to build
2/26/2015Over View Of Hacking 6
7. WHAT TELLS ABOUT
who discovers new ways of hacking into a system.
Someone who is capable of hacking into banks,
stealing credit card information, etc……
2/26/2015Over View Of Hacking 7
8. HISTORICAL EVENTS OF HACKING
In 1878, just two years after the telephone was
invented by Alexander Graham Bell, a group of
teenage boys hired to run the switchboards were
kicked off of a telephone system in New York.
The reason?
2/26/2015Over View Of Hacking 8
9. HISTORICAL EVENTS OF HACKING
In1960’s
MIT's artificial intelligence lab, become staging
grounds for hackers.
2/26/2015Over View Of Hacking 9
10. HISTORICAL EVENTS OF HACKING
In1971
Computer hobbyist John Draper discovers that a
toy whistle reproduces exactly the 2600-hertz
audio tone.
2/26/2015Over View Of Hacking 10
11. HISTORICAL EVENTS OF HACKING
In1975
Steve Wozniak and Steve Jobs begin making
“ “.
In 1987
, the first known MS-DOS computer virus,
is released on the internet.
2/26/2015Over View Of Hacking 11
12. •White Hat Hackers
• Black Hat Hackers
•Grey Hat Hackers
Script Kiddies ( are they ?)
Types of Hackers
2/26/2015Over View Of Hacking 12
13. “legal and/or illegal digital tools in pursuit of
political ends“
promoting free speech, human rights, and
information ethics etc.
Hacktivism
2/26/2015Over View Of Hacking 13
19. 6. Some commonly used Hacking Techniques & Tools:
• Denial of service Attack
• Distributed Denial of service Attack
We use a tool called “LOIC”
2/26/2015Over View Of Hacking 19
20. 6. Some commonly used Hacking Techniques & Tools:
2/26/2015Over View Of Hacking 20
21. 6. Some commonly used Hacking Techniques & Tools:
• Phishing Attack
2/26/2015Over View Of Hacking 21
22. 6. Some commonly used Hacking Techniques & Tools:
2/26/2015Over View Of Hacking 22
• Brute Force Attack
• Cross Site Scripting
23. 6. Some commonly used Hacking Techniques & Tools:
2/26/2015Over View Of Hacking 23
• Privilege escalation
24. 6. Some commonly used Hacking Techniques & Tools:
2/26/2015Over View Of Hacking 24
• Network Scanning
25. 6. Some commonly used Hacking Techniques & Tools:
• Sniffing
2/26/2015Over View Of Hacking 25
26. 6. Some commonly used Hacking Techniques & Tools:
• Reverse Engineering
• Social Engineering
2/26/2015Over View Of Hacking 26
27. 2/26/2015Over View Of Hacking 27
HOW TO SECURE YOUR ONLINE ACCOUNTS
• Always use https & avoid using http (until
updated)
• Use strong Passwords
• Never try to use same passwords for multiple
• Use multi stage verification.
28. 2/26/2015Over View Of Hacking 28
NatGrid
Bank Acconts
Travel
reservations
Internet
Browsing
history
Voice comm.
Online shopping
& transactions
Did you know, you’re under surveillance?
29. 2/26/2015Over View Of Hacking 29
Use
• Virtual Private Networks (vpn’s)
• Top Onion Router
• Proxy
• Ssh tunnels
• Use Encrypted e-mails
Maintaining Anonymity in online
30. “Everyone has a right to think differently”,
Freedom of speech is aim of hacking
conclusion
2/26/2015Over View Of Hacking 30