SlideShare a Scribd company logo
1 of 20
Hackers!
 Hacker (Cracker) word that describe person who
have special skills in the field of computer and
information security.
 Hacking means that a set of clever programmers
who challenge the different systems and try to
storm it and not necessarily to commit a crime ,
but their success in penetration is considered a
success for their abilities and skills.
 Many companies like Microsoft needs to protect
their systems so they found the best method to
protect their system is to hire hackers with high
salaries their mission is attempt to penetrate
their different systems and find the points of
weakness and try to fix these problems
The law considered outsiders who enter the default
place should not be in it. And to do this optional
process in which the programmer tested his
abilities without knowing his real name or declare
himself. But some of them are exploited by
criminal who clear information and others are
commercially exploited for the purposes of spying
and to steal some money.
the classification of hackers
morally
 1: White hat hacker :a computer hackers intending
to improve computer security
 2: Black hat hacker: a computer hackers intending
to storm the computer or Internet security for
illegal personal gain
 3: Grey hat hacker: a computer hackers lies
between a black hat and a white hat hacker
Hacker attack techniques
 Hacker have many attack techniques but the most
common technique: is by using Trojan horses and
this technique mostly used when hackers need to
storm a personal computer
 example shows you how Trojan technique works :
 if you will download a program but this program
have virus
 this virus will open a hidden secret hole through
your computer firewall when the virus reached to
your computer it will delete any information or it
will harm the host computer systems their is a
ratio 50% if you will scan your computer by using
antivirus and you have many viruses in your
computer you will find Trojan horse virus at your
computer
Sony attacked by North Korea
 Five months ago, hackers sneaked to the
computer network of Sony Pictures
entertainment
 The attackers stole a large number of secret
documents, which is currently being loaded (in the
first place by journalists) from file-sharing
networks
 It is believed widely hackers to be supported by
the government of North Korea
 which is angry at Sony to produce the interview, a
film which describe the assassination
of North Korean leader Kim jong-un. the threat of
terrorism against the movie theaters offer caused
Sony to cancel the planned release of her
Christmas Day holiday.
 on Monday, November 24th Sony discovered that
their own company's network has been hacked.
 The attackers took terabytes of data, delete the
original copies of Sony computers, leaving the
threat to release the information messages if Sony
did not respond to the demands of the strikers
 . this image, shows the message that appeared on
the computer screens at Sony companies
Lizard squad
 lizard squad is a black hat hacking group !
 They attacked facebook before but facebook
denied it was hacked and said that the access issues
earlier were "not the result of a third party attack“.
so Lizard Squad stated that it was responsible for
the site, and Instagram going down.
Security breach in Microsoft and
Sony system
 Lizard Squad also claimed to be behind a series
hacks of Microsoft and Sony gaming networks over
Christmas as well.
 lizard squad made their own channel in Sony and
Microsoft servers
 A hacker claiming to be from Lizard Squad - a 22-
year-old calling himself Member Two - said the
group had hacked the sites "because we can“.
 He also suggested the motive was to demonstrate
weaknesses in the Microsoft and Sony systems.
"It's just such a huge company Microsoft... Do you
not think they should be able to prevent such an
attack?"
 he told BBC Radio !
 "Is Christmas really about children playing with
their new consoles, or playing with their new toys,
or is it about them spending time with their
families and celebrating Christmas?" he added. "I
think everyone's just taking it all out of the
ordinary and Microsoft will receive a wonderful
Christmas present from us
 The name Lizard Squad is generally used as a
signature on a site that the group has taken
responsibility for hacking and they left their
signature after hacking the websites or software
Lizard squad pictureLizard squad signature

More Related Content

What's hot

What's hot (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Viewers also liked

Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
Bala Ganesh
 

Viewers also liked (14)

Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
EVALUACIÓN
EVALUACIÓNEVALUACIÓN
EVALUACIÓN
 
Cookies and Session
Cookies and SessionCookies and Session
Cookies and Session
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Hackers ESP
Hackers ESPHackers ESP
Hackers ESP
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 

Similar to Hackers

Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
Mahmoud Saeed
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
ravikanthh
 

Similar to Hackers (20)

Hacker !
Hacker !Hacker !
Hacker !
 
Hacker !
Hacker !Hacker !
Hacker !
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
File000145
File000145File000145
File000145
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Presentation
PresentationPresentation
Presentation
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Unit 1
Unit 1Unit 1
Unit 1
 

Recently uploaded

Recently uploaded (20)

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 

Hackers

  • 2.  Hacker (Cracker) word that describe person who have special skills in the field of computer and information security.  Hacking means that a set of clever programmers who challenge the different systems and try to storm it and not necessarily to commit a crime , but their success in penetration is considered a success for their abilities and skills.
  • 3.  Many companies like Microsoft needs to protect their systems so they found the best method to protect their system is to hire hackers with high salaries their mission is attempt to penetrate their different systems and find the points of weakness and try to fix these problems
  • 4. The law considered outsiders who enter the default place should not be in it. And to do this optional process in which the programmer tested his abilities without knowing his real name or declare himself. But some of them are exploited by criminal who clear information and others are commercially exploited for the purposes of spying and to steal some money.
  • 5. the classification of hackers morally  1: White hat hacker :a computer hackers intending to improve computer security  2: Black hat hacker: a computer hackers intending to storm the computer or Internet security for illegal personal gain  3: Grey hat hacker: a computer hackers lies between a black hat and a white hat hacker
  • 6. Hacker attack techniques  Hacker have many attack techniques but the most common technique: is by using Trojan horses and this technique mostly used when hackers need to storm a personal computer  example shows you how Trojan technique works :  if you will download a program but this program have virus
  • 7.  this virus will open a hidden secret hole through your computer firewall when the virus reached to your computer it will delete any information or it will harm the host computer systems their is a ratio 50% if you will scan your computer by using antivirus and you have many viruses in your computer you will find Trojan horse virus at your computer
  • 8. Sony attacked by North Korea  Five months ago, hackers sneaked to the computer network of Sony Pictures entertainment  The attackers stole a large number of secret documents, which is currently being loaded (in the first place by journalists) from file-sharing networks  It is believed widely hackers to be supported by the government of North Korea
  • 9.  which is angry at Sony to produce the interview, a film which describe the assassination of North Korean leader Kim jong-un. the threat of terrorism against the movie theaters offer caused Sony to cancel the planned release of her Christmas Day holiday.
  • 10.
  • 11.  on Monday, November 24th Sony discovered that their own company's network has been hacked.  The attackers took terabytes of data, delete the original copies of Sony computers, leaving the threat to release the information messages if Sony did not respond to the demands of the strikers  . this image, shows the message that appeared on the computer screens at Sony companies
  • 12.
  • 13. Lizard squad  lizard squad is a black hat hacking group !  They attacked facebook before but facebook denied it was hacked and said that the access issues earlier were "not the result of a third party attack“. so Lizard Squad stated that it was responsible for the site, and Instagram going down.
  • 14.
  • 15. Security breach in Microsoft and Sony system  Lizard Squad also claimed to be behind a series hacks of Microsoft and Sony gaming networks over Christmas as well.  lizard squad made their own channel in Sony and Microsoft servers
  • 16.
  • 17.  A hacker claiming to be from Lizard Squad - a 22- year-old calling himself Member Two - said the group had hacked the sites "because we can“.  He also suggested the motive was to demonstrate weaknesses in the Microsoft and Sony systems. "It's just such a huge company Microsoft... Do you not think they should be able to prevent such an attack?"  he told BBC Radio !
  • 18.  "Is Christmas really about children playing with their new consoles, or playing with their new toys, or is it about them spending time with their families and celebrating Christmas?" he added. "I think everyone's just taking it all out of the ordinary and Microsoft will receive a wonderful Christmas present from us
  • 19.  The name Lizard Squad is generally used as a signature on a site that the group has taken responsibility for hacking and they left their signature after hacking the websites or software
  • 20. Lizard squad pictureLizard squad signature