SlideShare a Scribd company logo
Hackers!
 Hacker (Cracker) word that describe person who
have special skills in the field of computer and
information security.
 Hacking means that a set of clever programmers
who challenge the different systems and try to
storm it and not necessarily to commit a crime ,
but their success in penetration is considered a
success for their abilities and skills.
 Many companies like Microsoft needs to protect
their systems so they found the best method to
protect their system is to hire hackers with high
salaries their mission is attempt to penetrate
their different systems and find the points of
weakness and try to fix these problems
The law considered outsiders who enter the default
place should not be in it. And to do this optional
process in which the programmer tested his
abilities without knowing his real name or declare
himself. But some of them are exploited by
criminal who clear information and others are
commercially exploited for the purposes of spying
and to steal some money.
the classification of hackers
morally
 1: White hat hacker :a computer hackers intending
to improve computer security
 2: Black hat hacker: a computer hackers intending
to storm the computer or Internet security for
illegal personal gain
 3: Grey hat hacker: a computer hackers lies
between a black hat and a white hat hacker
Hacker attack techniques
 Hacker have many attack techniques but the most
common technique: is by using Trojan horses and
this technique mostly used when hackers need to
storm a personal computer
 example shows you how Trojan technique works :
 if you will download a program but this program
have virus
 this virus will open a hidden secret hole through
your computer firewall when the virus reached to
your computer it will delete any information or it
will harm the host computer systems their is a
ratio 50% if you will scan your computer by using
antivirus and you have many viruses in your
computer you will find Trojan horse virus at your
computer
Sony attacked by North Korea
 Five months ago, hackers sneaked to the
computer network of Sony Pictures
entertainment
 The attackers stole a large number of secret
documents, which is currently being loaded (in the
first place by journalists) from file-sharing
networks
 It is believed widely hackers to be supported by
the government of North Korea
 which is angry at Sony to produce the interview, a
film which describe the assassination
of North Korean leader Kim jong-un. the threat of
terrorism against the movie theaters offer caused
Sony to cancel the planned release of her
Christmas Day holiday.
 on Monday, November 24th Sony discovered that
their own company's network has been hacked.
 The attackers took terabytes of data, delete the
original copies of Sony computers, leaving the
threat to release the information messages if Sony
did not respond to the demands of the strikers
 . this image, shows the message that appeared on
the computer screens at Sony companies
Lizard squad
 lizard squad is a black hat hacking group !
 They attacked facebook before but facebook
denied it was hacked and said that the access issues
earlier were "not the result of a third party attack“.
so Lizard Squad stated that it was responsible for
the site, and Instagram going down.
Security breach in Microsoft and
Sony system
 Lizard Squad also claimed to be behind a series
hacks of Microsoft and Sony gaming networks over
Christmas as well.
 lizard squad made their own channel in Sony and
Microsoft servers
 A hacker claiming to be from Lizard Squad - a 22-
year-old calling himself Member Two - said the
group had hacked the sites "because we can“.
 He also suggested the motive was to demonstrate
weaknesses in the Microsoft and Sony systems.
"It's just such a huge company Microsoft... Do you
not think they should be able to prevent such an
attack?"
 he told BBC Radio !
 "Is Christmas really about children playing with
their new consoles, or playing with their new toys,
or is it about them spending time with their
families and celebrating Christmas?" he added. "I
think everyone's just taking it all out of the
ordinary and Microsoft will receive a wonderful
Christmas present from us
 The name Lizard Squad is generally used as a
signature on a site that the group has taken
responsibility for hacking and they left their
signature after hacking the websites or software
Lizard squad pictureLizard squad signature

More Related Content

What's hot

What's hot (20)

Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Sony Playstation Hack Presentation
Sony Playstation Hack PresentationSony Playstation Hack Presentation
Sony Playstation Hack Presentation
 
Hacking
HackingHacking
Hacking
 

Viewers also liked

Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
Bala Ganesh
 

Viewers also liked (14)

Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
EVALUACIÓN
EVALUACIÓNEVALUACIÓN
EVALUACIÓN
 
Cookies and Session
Cookies and SessionCookies and Session
Cookies and Session
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Hackers ESP
Hackers ESPHackers ESP
Hackers ESP
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 

Similar to Hackers

Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
Mahmoud Saeed
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
ravikanthh
 

Similar to Hackers (20)

Hacker !
Hacker !Hacker !
Hacker !
 
Hacker !
Hacker !Hacker !
Hacker !
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
File000145
File000145File000145
File000145
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Presentation
PresentationPresentation
Presentation
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Hackers

  • 2.  Hacker (Cracker) word that describe person who have special skills in the field of computer and information security.  Hacking means that a set of clever programmers who challenge the different systems and try to storm it and not necessarily to commit a crime , but their success in penetration is considered a success for their abilities and skills.
  • 3.  Many companies like Microsoft needs to protect their systems so they found the best method to protect their system is to hire hackers with high salaries their mission is attempt to penetrate their different systems and find the points of weakness and try to fix these problems
  • 4. The law considered outsiders who enter the default place should not be in it. And to do this optional process in which the programmer tested his abilities without knowing his real name or declare himself. But some of them are exploited by criminal who clear information and others are commercially exploited for the purposes of spying and to steal some money.
  • 5. the classification of hackers morally  1: White hat hacker :a computer hackers intending to improve computer security  2: Black hat hacker: a computer hackers intending to storm the computer or Internet security for illegal personal gain  3: Grey hat hacker: a computer hackers lies between a black hat and a white hat hacker
  • 6. Hacker attack techniques  Hacker have many attack techniques but the most common technique: is by using Trojan horses and this technique mostly used when hackers need to storm a personal computer  example shows you how Trojan technique works :  if you will download a program but this program have virus
  • 7.  this virus will open a hidden secret hole through your computer firewall when the virus reached to your computer it will delete any information or it will harm the host computer systems their is a ratio 50% if you will scan your computer by using antivirus and you have many viruses in your computer you will find Trojan horse virus at your computer
  • 8. Sony attacked by North Korea  Five months ago, hackers sneaked to the computer network of Sony Pictures entertainment  The attackers stole a large number of secret documents, which is currently being loaded (in the first place by journalists) from file-sharing networks  It is believed widely hackers to be supported by the government of North Korea
  • 9.  which is angry at Sony to produce the interview, a film which describe the assassination of North Korean leader Kim jong-un. the threat of terrorism against the movie theaters offer caused Sony to cancel the planned release of her Christmas Day holiday.
  • 10.
  • 11.  on Monday, November 24th Sony discovered that their own company's network has been hacked.  The attackers took terabytes of data, delete the original copies of Sony computers, leaving the threat to release the information messages if Sony did not respond to the demands of the strikers  . this image, shows the message that appeared on the computer screens at Sony companies
  • 12.
  • 13. Lizard squad  lizard squad is a black hat hacking group !  They attacked facebook before but facebook denied it was hacked and said that the access issues earlier were "not the result of a third party attack“. so Lizard Squad stated that it was responsible for the site, and Instagram going down.
  • 14.
  • 15. Security breach in Microsoft and Sony system  Lizard Squad also claimed to be behind a series hacks of Microsoft and Sony gaming networks over Christmas as well.  lizard squad made their own channel in Sony and Microsoft servers
  • 16.
  • 17.  A hacker claiming to be from Lizard Squad - a 22- year-old calling himself Member Two - said the group had hacked the sites "because we can“.  He also suggested the motive was to demonstrate weaknesses in the Microsoft and Sony systems. "It's just such a huge company Microsoft... Do you not think they should be able to prevent such an attack?"  he told BBC Radio !
  • 18.  "Is Christmas really about children playing with their new consoles, or playing with their new toys, or is it about them spending time with their families and celebrating Christmas?" he added. "I think everyone's just taking it all out of the ordinary and Microsoft will receive a wonderful Christmas present from us
  • 19.  The name Lizard Squad is generally used as a signature on a site that the group has taken responsibility for hacking and they left their signature after hacking the websites or software
  • 20. Lizard squad pictureLizard squad signature