SlideShare a Scribd company logo
Differentiation Between Hacker And Cracker
Hacker Cracker
DEFINITION: DEFINITION:
Differentiation BetweenHacker And Cracker
1. A person who
illegally breaks into
other’s computer
system’s known as
hacker. Hacking is a
cybercrime
1.Cracker is a
computer user who
breaks into
computer system
without permission
using hacking tools
for personal gain or
damage and
commits
cybercrimes.
2. Hackers are
computer experts
who try to gain
unauthorized access
to computer system
for stealing and
corrupting
information.
3. Most of the hackers
break into computers
for financial benefits.
They try to get credit
card details or bank
account information
so that they can steal
money.
4. Hackers have in-
depth knowledge on
network
programming and can
create tools and
malicious software for
others to break into
2. Most of the crackers
does not have
professional computer
skill to hack computer
system but they have
knowledge about using
hacking tools
3. Crackers break into
computers and cause
serious damage. They
also break into Web
server and replace the
home page of a website
with a page of their own
design.
4. Cracker doesnot have
indepth knowledge on
network programming.
Example:
A hacker can develop
software in which all
the dictionary file is
loaded that contains
all the dictionary
words. When the
software is run it tries
all the dictionary
wordsone by one as
password to hack a
computer. This
methodworks if the
user is having a simple
password that exists a
dictionary.
Example:
A cracker can install a key
logger on another user’s
computer through
internet. A key-logger is a
software that records
every letter typed on
keyboard. When the user
uses Facebook and enters
the Facebook account
details, it will be recorded
in the cracker’s
computer. Now, he can
easily hack the Facebook
account.

More Related Content

What's hot

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
zing12345
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
hamza javed
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
leet detected
 
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
Hariharan Sivadasan
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Adnan Mansha
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
Neel Kamal
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
Arjun Tomar
 
Hacking
HackingHacking
Hacking
Asma Khan
 
Hacking
HackingHacking
Hacking
Virus
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
balti13
 
Attack chaining for web exploitation #c0c0n2015
Attack chaining for web exploitation #c0c0n2015Attack chaining for web exploitation #c0c0n2015
Attack chaining for web exploitation #c0c0n2015
Abhijeth D
 
my new HACKING
my new HACKINGmy new HACKING
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
Ashish Chandurkar
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email Hacking
Usman Khan
 
Web defacement
Web defacementWeb defacement
Web defacement
student
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
Alex Havaianas
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Michael Asres
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
ABIN VARGHESE
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Attack chaining for web exploitation #c0c0n2015
Attack chaining for web exploitation #c0c0n2015Attack chaining for web exploitation #c0c0n2015
Attack chaining for web exploitation #c0c0n2015
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email Hacking
 
Web defacement
Web defacementWeb defacement
Web defacement
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 

Similar to Assignment 4

Ethical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3rEthical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3r
Tausif Patel
 
Hacking
HackingHacking
Hacking
Nadeem Ahmad
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
Athina MINAIDI
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
vinsys2
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
ShouaQureshi
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
ShahrabanAbdullah2
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
Naren Naren
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
RAKESH SHARMA
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
Klaus Drosch
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
Sumit Satam
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
shreyas dani
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Armand Hacking
Armand HackingArmand Hacking
Armand Hacking
armand
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
RitikaSharma238
 

Similar to Assignment 4 (20)

Ethical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3rEthical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3r
 
Hacking
HackingHacking
Hacking
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Hacking
HackingHacking
Hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Armand Hacking
Armand HackingArmand Hacking
Armand Hacking
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Recently uploaded

Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 

Recently uploaded (12)

Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 

Assignment 4

  • 1. Differentiation Between Hacker And Cracker Hacker Cracker DEFINITION: DEFINITION: Differentiation BetweenHacker And Cracker 1. A person who illegally breaks into other’s computer system’s known as hacker. Hacking is a cybercrime 1.Cracker is a computer user who breaks into computer system without permission using hacking tools for personal gain or damage and commits cybercrimes.
  • 2. 2. Hackers are computer experts who try to gain unauthorized access to computer system for stealing and corrupting information. 3. Most of the hackers break into computers for financial benefits. They try to get credit card details or bank account information so that they can steal money. 4. Hackers have in- depth knowledge on network programming and can create tools and malicious software for others to break into 2. Most of the crackers does not have professional computer skill to hack computer system but they have knowledge about using hacking tools 3. Crackers break into computers and cause serious damage. They also break into Web server and replace the home page of a website with a page of their own design. 4. Cracker doesnot have indepth knowledge on network programming.
  • 3. Example: A hacker can develop software in which all the dictionary file is loaded that contains all the dictionary words. When the software is run it tries all the dictionary wordsone by one as password to hack a computer. This methodworks if the user is having a simple password that exists a dictionary. Example: A cracker can install a key logger on another user’s computer through internet. A key-logger is a software that records every letter typed on keyboard. When the user uses Facebook and enters the Facebook account details, it will be recorded in the cracker’s computer. Now, he can easily hack the Facebook account.