SlideShare a Scribd company logo
1 of 29
Download to read offline
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
.
PROJECT BY HARSH & RAVI
Hackers are the person who unkindly breaks into systems for
personal gain. Technically, these criminals are crackers
PROJECT BY HARSH & RAVI
Black hats – highly skilled,
malicious, destructive “crackers”
White hats – skills used for
defensive security analysts
Gray hats – offensively and
defensively; will hack for different
reasons, depends on situation.
PROJECT BY HARSH & RAVI
Reset the Password
Use a Key logger
Command prompt (Linux based)
Phishing
PROJECT BY HARSH & RAVI
The easiest way to "hack" into someone's Facebook is through resetting the
password. This could be easier done by people who are friends with the person
they're trying to hack.
Steps:-
 The first step would be to get your friend's Facebook email login.
 Next, enter victim's email then click on Forgotten your password?
 It will ask if you would like to reset the password via the victim's emails. This
doesn't help, so press No longer have access to these?
 It will now ask you a question.
 If you don't figure out the question, you can click on Recover your account with
help from friends. This allows you to choose between three - five friends.
 It will send them passwords.
PROJECT BY HARSH & RAVI
SOFTWARE
BASED
HARDWARE
BASED
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
Phishing is the most widely used
hacking method for hacking Facebook
passwords. The most widely used
technique in phishing is the use of
Fake Login Pages, also known as
spoofed pages. These fake login
pages resemble the original login
pages of sites like Yahoo , Gmail,
MySpace etc.
PROJECT BY HARSH & RAVI
STEP1:- Go to facebook homepage the right it save webpage as
HTML only by name “INDEX”
STEP2:- create a notepad file for entering following code & saveas
“next.php”
STEP3:- create text file & save as “password”
STEP4:- open INDEX file in notepad press ctrl+F search for action,
now change webpage to next.php and save it
STEP5:- go to www.************.com and log in to your account
STEP6:- upload all the 3 file to website in public directory folder
STEP7:- now ask the person to log in to dummy page of facebook
as he log in its password would be mailed to id or saved to
password.txt
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI
 Hacking is the most dangerous enemy of the company
because most of the companies work is done through online.
 If companies a/c or website is hacked then its all private data
may be leaked and competitors may take advantages of that
data.
 Our company’s monopoly product is Faluda syrup all over
Gujarat. So, after being hacked the secret ingredients of
Faluda syrup may revealed. PROJECT BY HARSH & RAVI
MAIN THREATS OF THE COMPANY AFTER BEING HACKED
Account details
Company details
payment structures
Secret ingredients of their products
List of suppliers and its details
List of bulk purchase customers and its details etc..
PROJECT BY HARSH & RAVI
Use an email address specifically for your Facebook
and don't put that email address on your profile.
When choosing a security question and answer,
make it difficult.
Don’t log on an unknown/unsecured pc’s
PROJECT BY HARSH & RAVI
Don’t give access of professional a/c to any
employees or any other person
Try to access your professional a/c on your pcs or
laptop only
Upload less personal information on social hubs
Use anti-phishing feature in anti virus (Avast-Anti-
Phishing)
PROJECT BY HARSH & RAVI
Don’t click on unknown pop-ups
Frequently change your password
Use security features in email server and make mobile no. protection
PROJECT BY HARSH & RAVI
PROJECT BY HARSH & RAVI

More Related Content

What's hot

Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conferencecetechservices
 
How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?paula_bolivar
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conferenceMolly Immendorf
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Esteban Bedoya
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeJeremiah Grossman
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Celia Bandelier
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001Miguel Ibarra
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011Samvel Gevorgyan
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityPanda Security
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri
 
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANSamvel Gevorgyan
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessmentsJEBARAJM
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550Liberteks
 

What's hot (20)

Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conference
 
How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?How to remove isearch.omiga-plus.com?
How to remove isearch.omiga-plus.com?
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
 
Sucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromiseSucuri Webinar: Impacts of a website compromise
Sucuri Webinar: Impacts of a website compromise
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 
security procedures
security procedures
security procedures
security procedures
 
Hacker halted2
Hacker halted2Hacker halted2
Hacker halted2
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
 
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessments
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 

Viewers also liked

Responsive: From Design to Philosophy
Responsive: From Design to PhilosophyResponsive: From Design to Philosophy
Responsive: From Design to PhilosophyMozu
 
โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์noeiinoii
 
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIAEVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIApratik swarup das
 
Fb calendar images
Fb calendar imagesFb calendar images
Fb calendar imageswilsonrd1987
 
MCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberMCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberRakhi Tips Provider
 
E tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonE tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonBernadette Gelsei
 
Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Anatoliy Arkhipov
 
Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Rakhi Tips Provider
 
Daily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberDaily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberRakhi Tips Provider
 
งานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วงานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วnoeiinoii
 
Together as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationTogether as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationPrimary Care Commissioning (PCC)
 

Viewers also liked (15)

Responsive: From Design to Philosophy
Responsive: From Design to PhilosophyResponsive: From Design to Philosophy
Responsive: From Design to Philosophy
 
โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์โครงร่างโครงงานคอมพิวเตอร์
โครงร่างโครงงานคอมพิวเตอร์
 
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIAEVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS     LAVANDULIFOLIA
EVALUATION OF ANTIFUNGAL POTENTIAL OF LEUCAS LAVANDULIFOLIA
 
Paradigm created
Paradigm createdParadigm created
Paradigm created
 
Fb calendar images
Fb calendar imagesFb calendar images
Fb calendar images
 
September 13- Letter by Dominican Hotelier Gregor Nassief
September 13- Letter by Dominican Hotelier Gregor NassiefSeptember 13- Letter by Dominican Hotelier Gregor Nassief
September 13- Letter by Dominican Hotelier Gregor Nassief
 
MCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-NovemberMCX News updates by Theequicom 28-November
MCX News updates by Theequicom 28-November
 
INDOKON BETON INSTAN
INDOKON BETON INSTANINDOKON BETON INSTAN
INDOKON BETON INSTAN
 
Donation waiver authority and procedure
Donation waiver authority and procedureDonation waiver authority and procedure
Donation waiver authority and procedure
 
E tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgonE tancsads szakmai megvalsulsai ma magyarorszgon
E tancsads szakmai megvalsulsai ma magyarorszgon
 
Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016Hewlett Packard Enterprise SW catalogue 2016
Hewlett Packard Enterprise SW catalogue 2016
 
Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013Weekly mcx newsletter 16 dec 2013
Weekly mcx newsletter 16 dec 2013
 
Daily MCX Market Updates 21-November
Daily MCX Market Updates 21-NovemberDaily MCX Market Updates 21-November
Daily MCX Market Updates 21-November
 
งานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้วงานคอม ใบงานที่ 2 8 แก้แล้ว
งานคอม ใบงานที่ 2 8 แก้แล้ว
 
Together as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federationTogether as one community - Hambleton, Richmondshire and Whitby federation
Together as one community - Hambleton, Richmondshire and Whitby federation
 

Similar to FULL MEANING OF HACKING

Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202James Ruffer
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hackingsumit dimri
 
Quality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseQuality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseMichal Špaček
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security offbeatnominee633
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
security procedures
security procedures
security procedures
security procedures puffyarson5604
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 

Similar to FULL MEANING OF HACKING (20)

Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
What is hacking
What is hackingWhat is hacking
What is hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Wordpress security 101 202
Wordpress security 101 202Wordpress security 101 202
Wordpress security 101 202
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Quality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseQuality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of Defense
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
security procedures
security procedures
security procedures
security procedures
 
Hack a Facebook password
Hack a Facebook passwordHack a Facebook password
Hack a Facebook password
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Password Attack
Password Attack Password Attack
Password Attack
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 

Recently uploaded

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 

Recently uploaded (20)

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 

FULL MEANING OF HACKING

  • 7. Hackers are the person who unkindly breaks into systems for personal gain. Technically, these criminals are crackers PROJECT BY HARSH & RAVI
  • 8. Black hats – highly skilled, malicious, destructive “crackers” White hats – skills used for defensive security analysts Gray hats – offensively and defensively; will hack for different reasons, depends on situation. PROJECT BY HARSH & RAVI
  • 9. Reset the Password Use a Key logger Command prompt (Linux based) Phishing PROJECT BY HARSH & RAVI
  • 10. The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack. Steps:-  The first step would be to get your friend's Facebook email login.  Next, enter victim's email then click on Forgotten your password?  It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?  It will now ask you a question.  If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three - five friends.  It will send them passwords. PROJECT BY HARSH & RAVI
  • 13. Phishing is the most widely used hacking method for hacking Facebook passwords. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo , Gmail, MySpace etc. PROJECT BY HARSH & RAVI
  • 14. STEP1:- Go to facebook homepage the right it save webpage as HTML only by name “INDEX” STEP2:- create a notepad file for entering following code & saveas “next.php” STEP3:- create text file & save as “password” STEP4:- open INDEX file in notepad press ctrl+F search for action, now change webpage to next.php and save it STEP5:- go to www.************.com and log in to your account STEP6:- upload all the 3 file to website in public directory folder STEP7:- now ask the person to log in to dummy page of facebook as he log in its password would be mailed to id or saved to password.txt PROJECT BY HARSH & RAVI
  • 24.  Hacking is the most dangerous enemy of the company because most of the companies work is done through online.  If companies a/c or website is hacked then its all private data may be leaked and competitors may take advantages of that data.  Our company’s monopoly product is Faluda syrup all over Gujarat. So, after being hacked the secret ingredients of Faluda syrup may revealed. PROJECT BY HARSH & RAVI
  • 25. MAIN THREATS OF THE COMPANY AFTER BEING HACKED Account details Company details payment structures Secret ingredients of their products List of suppliers and its details List of bulk purchase customers and its details etc.. PROJECT BY HARSH & RAVI
  • 26. Use an email address specifically for your Facebook and don't put that email address on your profile. When choosing a security question and answer, make it difficult. Don’t log on an unknown/unsecured pc’s PROJECT BY HARSH & RAVI
  • 27. Don’t give access of professional a/c to any employees or any other person Try to access your professional a/c on your pcs or laptop only Upload less personal information on social hubs Use anti-phishing feature in anti virus (Avast-Anti- Phishing) PROJECT BY HARSH & RAVI
  • 28. Don’t click on unknown pop-ups Frequently change your password Use security features in email server and make mobile no. protection PROJECT BY HARSH & RAVI