SlideShare a Scribd company logo
1 of 32
Overview of Hacking
By
T.RajaSekhara Reddy
11JN1A04512/26/2015
Over View Of Hacking
1
CONTENTS
• Introduction to Hacking
• Historical events of Hacking
• Types of Hackers
• Hacktivism
• World famous Hacker Groups
2/26/2015Over View Of Hacking 2
CONTENTS
•Some commonly used Hacking Techniques &
Tools
•How to Secure your online Accounts
•Did you know, you’re under surveillance?
•Maintaining Anonymity in online
2/26/2015Over View Of Hacking 3
INTRODUCTION
According to old-school definition of hackers “everyone
has a right to think differently”, from that thought
process the art of creativity starts exploring.
But generally the idea of hacking is that
2/26/2015Over View Of Hacking 4
MISCONCEPTION OF HACKING …!
• Illegally entering into public computers
• Crashing the popular websites
• Steeling Confidential Data
• Creating malicious viruses & infecting people
computers
2/26/2015Over View Of Hacking 5
WHAT TELLS ABOUT
The word “hacker” was used to describe a
, someone who was able
to build
2/26/2015Over View Of Hacking 6
WHAT TELLS ABOUT
who discovers new ways of hacking into a system.
Someone who is capable of hacking into banks,
stealing credit card information, etc……
2/26/2015Over View Of Hacking 7
HISTORICAL EVENTS OF HACKING
In 1878, just two years after the telephone was
invented by Alexander Graham Bell, a group of
teenage boys hired to run the switchboards were
kicked off of a telephone system in New York.
The reason?
2/26/2015Over View Of Hacking 8
HISTORICAL EVENTS OF HACKING
In1960’s
MIT's artificial intelligence lab, become staging
grounds for hackers.
2/26/2015Over View Of Hacking 9
HISTORICAL EVENTS OF HACKING
In1971
Computer hobbyist John Draper discovers that a
toy whistle reproduces exactly the 2600-hertz
audio tone.
2/26/2015Over View Of Hacking 10
HISTORICAL EVENTS OF HACKING
In1975
Steve Wozniak and Steve Jobs begin making
“ “.
In 1987
, the first known MS-DOS computer virus,
is released on the internet.
2/26/2015Over View Of Hacking 11
•White Hat Hackers
• Black Hat Hackers
•Grey Hat Hackers
Script Kiddies ( are they ?)
Types of Hackers
2/26/2015Over View Of Hacking 12
“legal and/or illegal digital tools in pursuit of
political ends“
promoting free speech, human rights, and
information ethics etc.
Hacktivism
2/26/2015Over View Of Hacking 13
World Famous Hacking Groups
2/26/2015Over View Of Hacking 14
World Famous Hacking Groups
Milw0rm
2/26/2015Over View Of Hacking 15
World Famous Hacking Groups
LulzSec
2/26/2015Over View Of Hacking 16
World Famous Hacking Groups
2/26/2015Over View Of Hacking 17
World Famous Hacking Groups
2/26/2015Over View Of Hacking 18
6. Some commonly used Hacking Techniques & Tools:
• Denial of service Attack
• Distributed Denial of service Attack
We use a tool called “LOIC”
2/26/2015Over View Of Hacking 19
6. Some commonly used Hacking Techniques & Tools:
2/26/2015Over View Of Hacking 20
6. Some commonly used Hacking Techniques & Tools:
• Phishing Attack
2/26/2015Over View Of Hacking 21
6. Some commonly used Hacking Techniques & Tools:
2/26/2015Over View Of Hacking 22
• Brute Force Attack
• Cross Site Scripting
6. Some commonly used Hacking Techniques & Tools:
2/26/2015Over View Of Hacking 23
• Privilege escalation
6. Some commonly used Hacking Techniques & Tools:
2/26/2015Over View Of Hacking 24
• Network Scanning
6. Some commonly used Hacking Techniques & Tools:
• Sniffing
2/26/2015Over View Of Hacking 25
6. Some commonly used Hacking Techniques & Tools:
• Reverse Engineering
• Social Engineering
2/26/2015Over View Of Hacking 26
2/26/2015Over View Of Hacking 27
HOW TO SECURE YOUR ONLINE ACCOUNTS
• Always use https & avoid using http (until
updated)
• Use strong Passwords
• Never try to use same passwords for multiple
• Use multi stage verification.
2/26/2015Over View Of Hacking 28
NatGrid
Bank Acconts
Travel
reservations
Internet
Browsing
history
Voice comm.
Online shopping
& transactions
Did you know, you’re under surveillance?
2/26/2015Over View Of Hacking 29
Use
• Virtual Private Networks (vpn’s)
• Top Onion Router
• Proxy
• Ssh tunnels
• Use Encrypted e-mails
Maintaining Anonymity in online
“Everyone has a right to think differently”,
Freedom of speech is aim of hacking
conclusion
2/26/2015Over View Of Hacking 30
Thank you..!
2/26/2015Over View Of Hacking 31
REFERENCES
Ebooks:
• Black book of hacking
• Hackers underground
• Network security
websites
• www.insecure.org
• www.sourceforge.net
• www.backtrack.org
2/26/2015Over View Of Hacking 32

More Related Content

What's hot

osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source IntelligenceOsama Ellahi
 
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric VanderburgInformation Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric VanderburgEric Vanderburg
 
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)mysociety
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringJeremiah Tillman
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James EC-Council
 
Introduction to Threat Sharing
Introduction to Threat SharingIntroduction to Threat Sharing
Introduction to Threat SharingDavid Sweigert
 

What's hot (9)

Hacking
HackingHacking
Hacking
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric VanderburgInformation Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
 
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
 
Osint
OsintOsint
Osint
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Introduction to Threat Sharing
Introduction to Threat SharingIntroduction to Threat Sharing
Introduction to Threat Sharing
 

Similar to Over View of Hacking by Rajasekhara reddy

Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Hacking
HackingHacking
HackingVirus
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesMaxime ALAY-EDDINE
 
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...North Texas Chapter of the ISSA
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 

Similar to Over View of Hacking by Rajasekhara reddy (20)

Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Hacking
HackingHacking
Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Hacking
HackingHacking
Hacking
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Over View of Hacking by Rajasekhara reddy

  • 1. Overview of Hacking By T.RajaSekhara Reddy 11JN1A04512/26/2015 Over View Of Hacking 1
  • 2. CONTENTS • Introduction to Hacking • Historical events of Hacking • Types of Hackers • Hacktivism • World famous Hacker Groups 2/26/2015Over View Of Hacking 2
  • 3. CONTENTS •Some commonly used Hacking Techniques & Tools •How to Secure your online Accounts •Did you know, you’re under surveillance? •Maintaining Anonymity in online 2/26/2015Over View Of Hacking 3
  • 4. INTRODUCTION According to old-school definition of hackers “everyone has a right to think differently”, from that thought process the art of creativity starts exploring. But generally the idea of hacking is that 2/26/2015Over View Of Hacking 4
  • 5. MISCONCEPTION OF HACKING …! • Illegally entering into public computers • Crashing the popular websites • Steeling Confidential Data • Creating malicious viruses & infecting people computers 2/26/2015Over View Of Hacking 5
  • 6. WHAT TELLS ABOUT The word “hacker” was used to describe a , someone who was able to build 2/26/2015Over View Of Hacking 6
  • 7. WHAT TELLS ABOUT who discovers new ways of hacking into a system. Someone who is capable of hacking into banks, stealing credit card information, etc…… 2/26/2015Over View Of Hacking 7
  • 8. HISTORICAL EVENTS OF HACKING In 1878, just two years after the telephone was invented by Alexander Graham Bell, a group of teenage boys hired to run the switchboards were kicked off of a telephone system in New York. The reason? 2/26/2015Over View Of Hacking 8
  • 9. HISTORICAL EVENTS OF HACKING In1960’s MIT's artificial intelligence lab, become staging grounds for hackers. 2/26/2015Over View Of Hacking 9
  • 10. HISTORICAL EVENTS OF HACKING In1971 Computer hobbyist John Draper discovers that a toy whistle reproduces exactly the 2600-hertz audio tone. 2/26/2015Over View Of Hacking 10
  • 11. HISTORICAL EVENTS OF HACKING In1975 Steve Wozniak and Steve Jobs begin making “ “. In 1987 , the first known MS-DOS computer virus, is released on the internet. 2/26/2015Over View Of Hacking 11
  • 12. •White Hat Hackers • Black Hat Hackers •Grey Hat Hackers Script Kiddies ( are they ?) Types of Hackers 2/26/2015Over View Of Hacking 12
  • 13. “legal and/or illegal digital tools in pursuit of political ends“ promoting free speech, human rights, and information ethics etc. Hacktivism 2/26/2015Over View Of Hacking 13
  • 14. World Famous Hacking Groups 2/26/2015Over View Of Hacking 14
  • 15. World Famous Hacking Groups Milw0rm 2/26/2015Over View Of Hacking 15
  • 16. World Famous Hacking Groups LulzSec 2/26/2015Over View Of Hacking 16
  • 17. World Famous Hacking Groups 2/26/2015Over View Of Hacking 17
  • 18. World Famous Hacking Groups 2/26/2015Over View Of Hacking 18
  • 19. 6. Some commonly used Hacking Techniques & Tools: • Denial of service Attack • Distributed Denial of service Attack We use a tool called “LOIC” 2/26/2015Over View Of Hacking 19
  • 20. 6. Some commonly used Hacking Techniques & Tools: 2/26/2015Over View Of Hacking 20
  • 21. 6. Some commonly used Hacking Techniques & Tools: • Phishing Attack 2/26/2015Over View Of Hacking 21
  • 22. 6. Some commonly used Hacking Techniques & Tools: 2/26/2015Over View Of Hacking 22 • Brute Force Attack • Cross Site Scripting
  • 23. 6. Some commonly used Hacking Techniques & Tools: 2/26/2015Over View Of Hacking 23 • Privilege escalation
  • 24. 6. Some commonly used Hacking Techniques & Tools: 2/26/2015Over View Of Hacking 24 • Network Scanning
  • 25. 6. Some commonly used Hacking Techniques & Tools: • Sniffing 2/26/2015Over View Of Hacking 25
  • 26. 6. Some commonly used Hacking Techniques & Tools: • Reverse Engineering • Social Engineering 2/26/2015Over View Of Hacking 26
  • 27. 2/26/2015Over View Of Hacking 27 HOW TO SECURE YOUR ONLINE ACCOUNTS • Always use https & avoid using http (until updated) • Use strong Passwords • Never try to use same passwords for multiple • Use multi stage verification.
  • 28. 2/26/2015Over View Of Hacking 28 NatGrid Bank Acconts Travel reservations Internet Browsing history Voice comm. Online shopping & transactions Did you know, you’re under surveillance?
  • 29. 2/26/2015Over View Of Hacking 29 Use • Virtual Private Networks (vpn’s) • Top Onion Router • Proxy • Ssh tunnels • Use Encrypted e-mails Maintaining Anonymity in online
  • 30. “Everyone has a right to think differently”, Freedom of speech is aim of hacking conclusion 2/26/2015Over View Of Hacking 30
  • 32. REFERENCES Ebooks: • Black book of hacking • Hackers underground • Network security websites • www.insecure.org • www.sourceforge.net • www.backtrack.org 2/26/2015Over View Of Hacking 32