SlideShare a Scribd company logo
1 of 9
The definition of hacker.
Cracker.
Rating hackers morally.
Information gathering methods.
How hacker penetrates sites.
Hacker:
• Hacker generally is described as the word of person who has specialist skills in
the field of computer and information security. It is launched essentially on a set
of clever programmers who defies the different systems and try to storm, but
not necessarily to commit a crime, but their success in penetration is considered
a success of their abilities and skills. And to do this optional process in which the
programmer tested his abilities without knowing his real name or declaring
himself. But some of them are exploiting for criminal sabotage to clear
information and others are exploiting commercially for the purposes of
espionage and to steal some money.
• A lot of companies like Microsoft needs to protect their systems, and it found
that the best method is to set high salaries for hackers whose mission is to
attempt to penetrate the various systems and find places weaknesses, and
suggest ways for prevention from damage caused by computer hackers. In this
case hacker image began to gain a lot of positives.
Cracker:
• Cracker term was later to distinguish between good hacker and
spoiler hacker. Despite both have the intelligence and spirit of
challenge and lack of fear of facing the unknown, but the cracker
always acts in sabotage and intrusion for reasons are not positive; and
this person is the one who deserves naming computer pirate. While
the hacker devises solutions to the problems and , he is trying to
innovate in his work.
• But the ways of the media speak generally "hacker”, and confused the
reformer and the spoiler, and the passage of time, the hacker name
has been associated with the spoiler person.
Rating hackers morally:
• (Awhitehathacker),calledonthehackerreformer.
• (Ablackhathacker),calledonthehackerspoiler,whichisCracker.
• (Agreyhathacker),calledontotteringbetweenreformandtampering.
• Thehatstermlinkedwithcinema,wherethegoodguywaswearingawhitehat
whileevilmanwaswearingblackhatandgrayforthoselocatedrolebetween
thesetwocases.
Information gathering methods:
• Eavesdropping: sensor and take data from the network through the sniffer
programs that record everything that goes on between the computers.
• Social Engineering : is method to impersonating character style that serves
a hacker to obtain required information where the hacker persuades the
person that he is his friend, or one of the persons who have entitled to
access to information.
• Wireless networks: the search process spatially on the presence of wireless
networks and usually hacker wanders between regions searching for Wi-Fi
networks or hotspots where they exploit a common data between users of
these networks and gaps in the connected devices to the network , that
will enable the hacker to penetrate.
How hacker penetrates sites:
• This is done through two phases:1) the collection of information; the
most important information are the target network address and
knowing the operating system on that goals and scripts System to
examine them if it had gaps software and these gaps allow a hacker
does several things forbidden. 2)The attack phase; it is exploiting the
gaps . These hackers enter the control panel, apply commands on the
server or raising malicious files.
Done by : MARYAM ALKHABBAZ

More Related Content

What's hot (19)

Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
Ethical_Hacking
Ethical_HackingEthical_Hacking
Ethical_Hacking
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3rEthical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3r
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Viewers also liked (17)

EVALUACIÓN
EVALUACIÓNEVALUACIÓN
EVALUACIÓN
 
Cookies and Session
Cookies and SessionCookies and Session
Cookies and Session
 
Hackers
HackersHackers
Hackers
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
07- sample work
07- sample work07- sample work
07- sample work
 
Long Island Smart Energy Corridor Project
Long Island Smart Energy Corridor ProjectLong Island Smart Energy Corridor Project
Long Island Smart Energy Corridor Project
 
Endocarditis2 copy
Endocarditis2 copyEndocarditis2 copy
Endocarditis2 copy
 
ahmed el-nhass c.v - new
ahmed el-nhass c.v - newahmed el-nhass c.v - new
ahmed el-nhass c.v - new
 
RESUME_Nashine_-LINK
RESUME_Nashine_-LINKRESUME_Nashine_-LINK
RESUME_Nashine_-LINK
 
Question 6
Question 6Question 6
Question 6
 
Patti
PattiPatti
Patti
 

Similar to Hackers ESP

Similar to Hackers ESP (20)

Hacking
HackingHacking
Hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hackers final
Hackers finalHackers final
Hackers final
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
hackers
hackershackers
hackers
 
Hacking
HackingHacking
Hacking
 

Hackers ESP

  • 1.
  • 2. The definition of hacker. Cracker. Rating hackers morally. Information gathering methods. How hacker penetrates sites.
  • 3. Hacker: • Hacker generally is described as the word of person who has specialist skills in the field of computer and information security. It is launched essentially on a set of clever programmers who defies the different systems and try to storm, but not necessarily to commit a crime, but their success in penetration is considered a success of their abilities and skills. And to do this optional process in which the programmer tested his abilities without knowing his real name or declaring himself. But some of them are exploiting for criminal sabotage to clear information and others are exploiting commercially for the purposes of espionage and to steal some money. • A lot of companies like Microsoft needs to protect their systems, and it found that the best method is to set high salaries for hackers whose mission is to attempt to penetrate the various systems and find places weaknesses, and suggest ways for prevention from damage caused by computer hackers. In this case hacker image began to gain a lot of positives.
  • 4.
  • 5. Cracker: • Cracker term was later to distinguish between good hacker and spoiler hacker. Despite both have the intelligence and spirit of challenge and lack of fear of facing the unknown, but the cracker always acts in sabotage and intrusion for reasons are not positive; and this person is the one who deserves naming computer pirate. While the hacker devises solutions to the problems and , he is trying to innovate in his work. • But the ways of the media speak generally "hacker”, and confused the reformer and the spoiler, and the passage of time, the hacker name has been associated with the spoiler person.
  • 6. Rating hackers morally: • (Awhitehathacker),calledonthehackerreformer. • (Ablackhathacker),calledonthehackerspoiler,whichisCracker. • (Agreyhathacker),calledontotteringbetweenreformandtampering. • Thehatstermlinkedwithcinema,wherethegoodguywaswearingawhitehat whileevilmanwaswearingblackhatandgrayforthoselocatedrolebetween thesetwocases.
  • 7. Information gathering methods: • Eavesdropping: sensor and take data from the network through the sniffer programs that record everything that goes on between the computers. • Social Engineering : is method to impersonating character style that serves a hacker to obtain required information where the hacker persuades the person that he is his friend, or one of the persons who have entitled to access to information. • Wireless networks: the search process spatially on the presence of wireless networks and usually hacker wanders between regions searching for Wi-Fi networks or hotspots where they exploit a common data between users of these networks and gaps in the connected devices to the network , that will enable the hacker to penetrate.
  • 8. How hacker penetrates sites: • This is done through two phases:1) the collection of information; the most important information are the target network address and knowing the operating system on that goals and scripts System to examine them if it had gaps software and these gaps allow a hacker does several things forbidden. 2)The attack phase; it is exploiting the gaps . These hackers enter the control panel, apply commands on the server or raising malicious files.
  • 9. Done by : MARYAM ALKHABBAZ