Beyond the EU: DORA and NIS 2 Directive's Global Impact
hackers.pptx
1.
2. Hacking is identifying weakness in computers system or networks to exploit its weakness to gain
access.
Example of Hacking: Using password cracking algorithm to gain access to a system.
Hackers are usually skilled computer programmers with knowledge of Hackers are usually skilled
computer programmers with knowledge of computer security.
Hackers are classified according to the intent of their actions. The following list classifies hackers
according to their intent.
3. Hacking
Advantages
• To recover lost information, especially in
case you lost your password.
• To perform penetration testing to strengthen
computer and network security.
• To put adequate preventative measures in
place to prevent security breaches.
• To have a computer system that prevents
malicious hackers from gaining access.
Disadvantages
• Massive security breach.
• Unauthorized system access on private information.
• Privacy violation.
• Hampering system operation.
• Denial of service attacks.
• Malicious attack on the system
Purpose
• Just for fun
• Show-off
• Steal important information
• Damaging the system
• Hampering privacy
• Money extortion
• System security testing
• To break policy compliance
4. 01
02
03
06
04
05
Websites Hacking
Hacking a website means taking unauthorized
control over a web server and its associated
software such as database and other interference
Network Hacking
Hacking a Network means gathering information
about Network by using tools like Telnet, NS
Lookup, Ping, Tracert, Netstat, etc with the intent
to harm the network system and hamper its
operation.
E- mail Hacking
It includes getting unauthorized access on an Email
account and using it without taking the consent of its
owner..
Computer Hacking
This is the process of stealing computer ID and password
by applying hacking methods and getting unauthorized
access to a computer system.
Password Hacking
This is the process of recovering secret passwords
from data that has been stored in or transmitted
by a computer system.
Ethical Hacking
Ethical hacking involves finding weaknesses in a
computer or network system for testing purpose and
finally getting them fixed.
Types of Hacking
5. White Hat Grey Hat Black Hat
• They never intent to harm a
system, rather they try to find
out weaknesses in a computer
or a network system as a part of
penetration testing and
vulnerability assessments.
• Ethical hacking is not illegal .
• Grey hat hackers are a blend of
both black hat and white hat
hackers.
• They act without malicious intent
but for their fun, they exploit a
security weakness in a computer
system or network without the
owner’s permission or
knowledge.
• those who hack in order to
gain unauthorized access to a
system and harm its
operations or steal sensitive
information.
• Black Hat hacking is always
illegal .
Types of Hackers
6. Red Hat hackers
Blue Hat hacker
Elite Hackers
Script Kiddie
Miscellaneous Hackers
8. An ethical hacker must be a computer systems expert and needs to have very strong programming
and computer networking skills.
An ethical hacker needs to have a lot of patience, persistence, and perseverance to try again and
again and wait for the required result.
9. Often referred to as “ethical hackers”, white-hat hackers make the choice the use their knowledge and abilities for good,
instead of evil.
In some cases, white-hat hackers are paid employees or contractors that are hired to work for companies as security
experts. This type of white-hat hackers is usually referred to as a penetration tester, whose job it is to find vulnerabilities
in the computer infrastructure by hacking into it.
Typically, white-hat hackers use the exact same hacking techniques that a black-hat hacker would; however, the main
difference between the two is that white-hats hack into computer systems with explicit permission from the system’s
owner, making the process legal.
Essentially, white-hat hackers test security systems that are already in place to see where they can be improved.
10. Malicious
Most common hackers related to recent cybercrime news.
Look for vulnerabilities.
• Individual PC
• Organization
• Bank System
Use loopholes and hack into network to get access to personal, business and financial information.
Agenda: Mostly monetary, but not always.
Illegal actions with bad intention.
11. White Hat
• Quality Content
• Guest blogging
• Link Baiting
• Improving Content
• Redesigning Websites
• Researching and Analyzing
• Rewriting
• Internal Linking
Black Hat
• Hidden Text
• Keyword Stuffing
• Duplicate Content
• Link Farming
• Doorway Page
• Cloaking
• Parasites Hosting
• Scraping
Difference between White Hat and Black Hat SEO
15. Raspberry Pi 3
Tools used for Ethical Hacking
Rubber Ducky
LAN Turtle
Wifi- Pineapple
16. • There’s no way around it: black hat hackers are criminals, and with damages mounting and these crimes
gaining increased attention, it won’t be long before cyber criminals are fully lumped in with your run-of-the-
mill criminals ranging from pickpockets and burglars to white collar fraudsters in the eyes of the public.
• Breaking the law, after all, is breaking the law, no matter how comfortable and convenient the internet has
made some of those illegal activities.But just because someone once dabbled (or more than dabbled) in black
hat hacking doesn’t mean he or she has to be considered a criminal for life.
• People with hacking skills – even those with black hat hacking pasts, like infamous Anonymous hacker Hector
Monsegur – are being fervently sought by businesses and organizations who want to put those skills to use in
securing their own networks and systems.
• Hackers using their powers for good to try and break into target systems in order to better secure those systems
are considered white hat hackers or ethical hackers, and with an ethical hacker
17. You need to stay as a White Hat Hacker which means you need to work within given boundaries.
Never intrude or attack any computer or network without a required permission from the authorities.
As a final note, it is highly recommended that you refrain from engaging yourself in black hat
hacking which may spoil your entire career.
20. Most Wanted Black Hat Hackers in FBI
Fu j ie Wan g
H o s s e i n P a r v a r
I g o r O l e g o v i n c h
Tu r a s h e v
Maksim Viktorovich
Yakubets