What is 
“HACKING”
Its just breaking the 
computer security system to 
access computer network 
legally or illegally.
Methods of hacking
PHISHING 
BRUTE FORCE POWER ATTACK 
SQL INJECTION 
SOCIAL ENGINEERING 
APPLICATION BASE ATTACK 
MISCONFIGURATION ATTACK
PHISHING 
1
Phishing is the most 
simplest way the hacker 
can access your 
personal Information.
Beware 
• ALWAYS CHECK THE ADDRESS BAR OF 
THE BROWSER AND THEN ENTER THE 
DETAILS.
BRUTE FORCE 
POWER ATTACK 
2
In this process, an 
application is used which 
literally guesses passwords 
and ultimately tries to crack 
the actual password.
3 
SQL INJECTION
It’s the most 
commonest method 
to hack websites..
In order to protect yourselves this 
type of attack, you need to secure 
your website programmatically. 
This technique is also used for 
penetration testing.
SOCIAL 
ENGINEERING 
4
It is mainly used for 
hacking social 
networking sites.
DO NOT EVER SHARE 
ANY INFORMATION 
ABOUT YOUR SOCIAL 
NETWORKING ACCOUNT 
WITH ANYONE.
5 
APPLICATION 
BASE ATTACK
In this method normally an 
application is used for either creating 
a phishing page or a brute force 
power attack. 
In simple words there are 
typically MALWARE.
MISCONFIGURATION 
ATTACK 
6
This usually occurs if you 
have misconfigured your 
system such that the 
valuable information gets 
exposed.
TYPES OF 
HACKERS!!!
WHITE HAT HACKER. 
BLACK HAT HACKER. 
GREY HAT HACKER. 
ELITE HACKER. 
SCRIPT KIDDIE.
They use their skills for good purposes. 
They work for organizations to stop the illegal 
activities through black hat hackers.
A white hat hacker breaks security 
for non-malicious reasons, perhaps 
to test their own security system. 
The term "white hat" in 
Internet slang refers to an Ethical 
Hacker.
A Black Hat 
Hacker is a hacker who violates computer security foR 
little reason beyond maliciousness or for personal 
gain.
BLACK HAT HACKERS ALWAYS DO ILLEGAL WORK. 
THEY ARE PROFESSIONALS IN THEIR FIELDS.
GREY HAT HACKERS HAVE BOTH QUALITIES LIKE BLACK HAT 
HACKERS AND WHITE HAT HACKERS . 
THEY USE THEIR KNOWLEDGE FOR BAD PURPOSES AND GOOD 
PURPOSES TOO.
A SOCIAL STATUS AMONG 
HACKERS, ELITE IS USED TO 
DESCRIBE THE MOST SKILLED. 
NEWLY 
DISCOVERED EXPLOITS CIRCULATE 
AMONG THESE HACKERS. 
ELITE GROUPS SUCH AS MASTERS OF 
DECEPTIONCONFERRED A KIND OF 
CREDIBILITY ON THEIR MEMBERS.
A script kiddie is a non-expert who breaks into computer 
systems by using pre-packaged automated tools written by 
others, hence the term script kiddie (i.e. kid, child—an 
individual lacking knowledge and experience, immature),usually 
with little understanding of the underlying concept.
SCRIPT KIDDIES HACKS INTO 
COMPUTER OR WEBSITES USING 
THE TOOLS AVAILABLE ON THE 
INTERNET . 
THEY DON’T HAVE KNOWLEDGE 
OF PROGRAMMING .
How to Hack??? 
Hacking = manipulating a system to 
do something it wasn’t designed to do. 
Like hot wiring a car. 
Hacking computers is 
often simple (once you 
know how computers work).
Thank 
you!

All About Hacking.!!

  • 2.
  • 3.
    Its just breakingthe computer security system to access computer network legally or illegally.
  • 4.
  • 5.
    PHISHING BRUTE FORCEPOWER ATTACK SQL INJECTION SOCIAL ENGINEERING APPLICATION BASE ATTACK MISCONFIGURATION ATTACK
  • 6.
  • 7.
    Phishing is themost simplest way the hacker can access your personal Information.
  • 8.
    Beware • ALWAYSCHECK THE ADDRESS BAR OF THE BROWSER AND THEN ENTER THE DETAILS.
  • 9.
  • 10.
    In this process,an application is used which literally guesses passwords and ultimately tries to crack the actual password.
  • 12.
  • 13.
    It’s the most commonest method to hack websites..
  • 14.
    In order toprotect yourselves this type of attack, you need to secure your website programmatically. This technique is also used for penetration testing.
  • 15.
  • 16.
    It is mainlyused for hacking social networking sites.
  • 17.
    DO NOT EVERSHARE ANY INFORMATION ABOUT YOUR SOCIAL NETWORKING ACCOUNT WITH ANYONE.
  • 18.
  • 19.
    In this methodnormally an application is used for either creating a phishing page or a brute force power attack. In simple words there are typically MALWARE.
  • 20.
  • 21.
    This usually occursif you have misconfigured your system such that the valuable information gets exposed.
  • 22.
  • 23.
    WHITE HAT HACKER. BLACK HAT HACKER. GREY HAT HACKER. ELITE HACKER. SCRIPT KIDDIE.
  • 25.
    They use theirskills for good purposes. They work for organizations to stop the illegal activities through black hat hackers.
  • 26.
    A white hathacker breaks security for non-malicious reasons, perhaps to test their own security system. The term "white hat" in Internet slang refers to an Ethical Hacker.
  • 28.
    A Black Hat Hacker is a hacker who violates computer security foR little reason beyond maliciousness or for personal gain.
  • 29.
    BLACK HAT HACKERSALWAYS DO ILLEGAL WORK. THEY ARE PROFESSIONALS IN THEIR FIELDS.
  • 31.
    GREY HAT HACKERSHAVE BOTH QUALITIES LIKE BLACK HAT HACKERS AND WHITE HAT HACKERS . THEY USE THEIR KNOWLEDGE FOR BAD PURPOSES AND GOOD PURPOSES TOO.
  • 33.
    A SOCIAL STATUSAMONG HACKERS, ELITE IS USED TO DESCRIBE THE MOST SKILLED. NEWLY DISCOVERED EXPLOITS CIRCULATE AMONG THESE HACKERS. ELITE GROUPS SUCH AS MASTERS OF DECEPTIONCONFERRED A KIND OF CREDIBILITY ON THEIR MEMBERS.
  • 35.
    A script kiddieis a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, hence the term script kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature),usually with little understanding of the underlying concept.
  • 36.
    SCRIPT KIDDIES HACKSINTO COMPUTER OR WEBSITES USING THE TOOLS AVAILABLE ON THE INTERNET . THEY DON’T HAVE KNOWLEDGE OF PROGRAMMING .
  • 37.
    How to Hack??? Hacking = manipulating a system to do something it wasn’t designed to do. Like hot wiring a car. Hacking computers is often simple (once you know how computers work).
  • 38.