SlideShare a Scribd company logo
HACKING
CONTENT
• Hacking
• History of Hacking
• Types of Hacking
• Hackers
• Types of Hackers
• Famous Hacker
• Service of Ethical Hacking
• Disadvantages of Hacking
• Need of Hacking
• Cyber law for Hacking
• Scope of Ethical Hacking
WHAT IS HACKING?
• Hacking is an attempt to exploit a computer system or
a private network inside a computer. Simply put, it is
the unauthorised access to or control over computer
network security systems for some illicit purpose. To
better describe hacking, one needs to first understand
hackers. One can easily assume them to be intelligent
and highly skilled in computers.
HISTORY OF HACKING
• When hacking first started it was not thought of as that serious. The
hackers were not even known as hackers but as practical jokers. The
very first hack came in 1878 when the phone company, Bell Telephone,
was started. A group of teenage boys, hired to run the switchboards,
would disconnect or misdirect calls.
The first authentic computer hackers came in the 1960s. During those
times, computers were mainframes, locked away in temperature
controlled, glassed in areas. It cost a lot of money to run these
machines, so programmers had limited access to them.
HISTORY OF HACKING
• The smarter students, usually MIT students, had an insatiable
curiosity about how things worked. So, the smartest ones created
what they called "hacks", programming shortcuts, to complete
computing tasks more quickly. In some cases the shortcuts were better
than the original program. One of the hacks that was created in the
60s, 1969 to be exact, was created to act as an open set of rules to run
machines on the computer frontier. It was created by two employees
from the Bell Lab's think tank. The two employees were Dennis
Ritchie and Ken Thompson and the "hack" was called UNIX.
TYPES OF HACKING
• Ethical Hacking
• Back Door Hacking
• Website Hacking
• Network Hacking
• Password Hacking
ETHICAL HACKING
• Ethical hacking, also known as penetration testing or pen testing, is legally
breaking into computers and devices to test an organization's defenses. It's
among the most exciting IT jobs any person can be involved in. You are
literally getting paid to keep up with the latest technology and get to break
into computers without the threat of being arrested.
• Companies engage ethical hackers to identify vulnerabilities in their
systems. From the penetration tester's point of view, there is no downside: If
you hack in past the current defenses, you’ve given the client a chance to
close the hole before an attacker discovers it. If you don’t find anything, your
client is even happier because they now get to declare their systems “secure
enough that even paid hackers couldn’t break into it.”
BACKDOOR HACKING
• In the world of cybersecurity, a backdoor refers to any method by
which authorized and unauthorized users are able to get around
normal security measures and gain high level user access (aka root
access) on a computer system, network, or software application. Once
they're in, cybercriminals can use a backdoor to steal personal and
financial data, install additional malware, and hijack devices.
• A well-known backdoor example is called FinSpy. When installed on a
system, it enables the attacker to download and execute files remotely
on the system the moment it connects to the internet, irrespective of
the system's physical location. It compromises overall system security.
WEBSITE HACKING
• Hacking a website is nothing but getting the password to add, edit,
delete data stored in that website. After the attack done by a hacker, if
he has changed the password of that website software, then it will be
tough for the Webmaster to get it back. Hacker will insert harmful
programs by inserting malicious codes into the website. It will also
cause to the website server to be slow.
• In the past years, even Amazon and Yahoo had been attacked by the
hacker experts, but it would not affect much to them. In the last year
we had seen that, the world wide hackers are tried their level best to
make fear on the famous companies like PayPal and Facebook.
NETWORK HACKING
• Networking Hacking is an offensive branch of computer security
related to networks hacking and the penetration of a target via the
networking services or equipment.
• Network Hacking is generally means gathering information about
domain by using tools like Telnet , Nslookup , Ping, Tracert , Netstat ,
etc.
• It also includes OS Fingerprinting, Port Scanning and Port Surfing
using various tools.
PASSWORD HACKING
• Password hacking, sometimes referred to as password cracking, is a
method of recovering passwords from data transmitted by or stored on
a computer.
• A password can be a secret word, phrase or string of characters used
to gain access to secured data. An individual with no knowledge of a
password may still determine it through password hacking.
• Conversely, a dictionary attack allows hackers to employ a program
which cycles through common words. A brute force attack goes letter
by letter, whereas a dictionary attack only tries possibilities most
likely to succeed. ... For example, users tend to pick
short passwords and base their passwords off common words.
HACKER
• A computer hacker is a computer expert who uses their technical
knowledge to achieve a goal or overcome an obstacle, within a
computerized system by non-standard means.
• Though the term "hacker" has become associated in popular
culture with a "security hacker" – someone who utilizes their technical
know-how of bugs or exploits to break into computer systems and
access data which would otherwise be unavailable to them – hacking
can also be utilized by legitimate figures in legal situations. For
example, law enforcement agencies sometimes use hacking techniques
in order to collect evidence on criminals and other malicious actors.
TYPES OF HACKERS
 Black Hat Hackers
 White Hat Hackers
 Grey Hat Hackers
BLACK HAT HACKER
• The term “black hat” originated from Western movies, where the bad
guys wore black hats and the good guys wore white hats.
• A black-hat hacker is an individual who attempts to gain
unauthorized entry into a system or network to exploit them for
malicious reasons. The black-hat hacker does not have any permission
or authority to compromise their targets. They try to inflict damage by
compromising security systems, altering functions of websites and
networks, or shutting down systems. They often do so to steal or gain
access to passwords, financial information, and other personal data.
WHITE HAT HACKER
• White-hat hackers, on the other hand, are deemed to be the good guys,
working with organizations to strengthen the security of a system. A
white hat has permission to engage the targets and to compromise
them within the prescribed rules of engagement.
• White-hat hackers are often referred to as ethical hackers. This
individual specializes in ethical hacking tools, techniques, and
methodologies to secure an organization’s information systems.
• Unlike black-hat hackers, ethical hackers exploit security networks
and look for backdoors when they are legally permitted to do so.
White-hat hackers always disclose every vulnerability they find in the
company’s security system so that it can be fixed before they are being
exploited by malicious actors.Some Fortune 50 companies like
Facebook, Microsoft, and Google also use white-hat hackers.
GREY HAT HACKER
• Grey hats exploit networks and computer systems in the way that
black hats do, but do so without any malicious intent, disclosing all
loopholes and vulnerabilities to law enforcement agencies or
intelligence agencies.
• Usually, grey-hat hackers surf the net and hack into computer
systems to notify the administrator or the owner that their
system/network contains one or more vulnerabilities that must be
fixed immediately. Grey hats may also extort the hacked, offering to
correct the defect for a nominal fee.
WORLD BEST HACKER
• Kevin Mitnick is the world's authority on hacking, social engineering,
and security awareness training. In fact, the world's most used
computer-based end-user security awareness training suite bears his
name. Kevin's keynote presentations are one part magic show, one
part education, and all parts entertaining.
• Hacked into 40 major corporations, landing him on the FBI’s Most
Wanted list
• CEO and chief "white hat" hacker at one of the most advanced
boutique security firms in the world
• His Global Ghost Team has a 100 percent success rate hacking into
security systems.
SERVICE OF ETHICAL HACKING
• Wireless Security
• Application Security
• Network Security
WIRELESS SECURITY
These services provide and assess the level of security in the existing
infrastructure and network to provide instructions promising system
accessibility and uphold its integrity at the same time. Wireless security
works in three steps, which are:
• Identify vulnerabilities
• Adopt security measures
• Deploy the threats
APPLICATION SECURITY
• Application security is the process of making apps more secure by
finding, fixing, and enhancing the security of apps. Much of this
happens during the development phase, but it includes tools and
methods to protect apps once they are deployed.
• This is used for digging deep into and processing the cruciality and
range of challenges faces by the thick client (Java) and the thin client
(web browsers). Application security comprises of services like client-
side testing and web application testing.
NETWORK SECURITY
• Network security is a broad term that covers a multitude of
technologies, devices and processes. In its simplest term, it is a set of
rules and configurations designed to protect the integrity,
confidentiality and accessibility of computer networks and data using
both software and hardware technologies.
It lends information on the networks, services, system devices, and
their agreements. It also examines and surveys the applications of the
voice over Internet convention within the organization
environment. Network security’s main objective is to facilitate the
presentation of the political repercussions on its own development.
WHY DO WE NEED ETHICAL HACKING?
• Ethical Hacking comes handy in corporate sectors and organizations,
to fight against unlawful practices of breaching systems and to take
precautionary actions on hackers.
• Dangerous software like Trojan horses, viruses and spam email causes
disruption and disturbance in the system and storage space. Ethical
hacking provides useful here as it helps to uncover these virus attacks
against systems and in addition, lends high-level security.
• The main objective of ethical hacking is to promise safety in wireless
infrastructure which constitutes most of the current business
companies’ aims.
DISADVANTAGES OF HACKING
• Massive security breach.
• Unauthorized system access on private information.
• Privacy violation.
• Hampering system operation.
• Denial of service attacks.
• Malicious attack on the system.
NEED OF ETHICAL HACKING?
• Ethical hacking follows the guidelines of safe hacking for the efficient
working of the system. This is a complex procedure hence an ethical
hacker requires great skills in comparison to penetration testing.
• Ethical hacking has the privilege of gathering access to a company’s
network and information system. This automatically provides security
to intellectual attacks and threats like viruses. Ethical hacking, as a
result, ends up also testing the security levels of the programs and
software.
CYBER LAW IN INDIA FOR HACKING
• Chapter XI Section 66 of IT Act, 2000 particularly deals with the act
of hacking. Section 66(1) defines a hack as, any person, dishonestly or
fraudulently, does any act referred to in Section 43 is called
hacking, and Section 66(2) prescribes the punishment for it. Hacking
is a punishable offense in India with imprisonment up to 3 years, or
with fine up to two lakh rupees, or with both.
• Chapter IX Section 43 of IT act, 2000 prescribes a penalty for the
damage to computer or computer system. It is a common thing which
happens whenever a computer system is hacked. Black hats damage
the system that they hack and steal the information. This
enumerative provision includes a lot of activities.
CYBER LAW IN INDIA FOR HACKING
• Chapter XI Section 65 of the said act makes tampering with computer
source documents an offense. Section 72 of the same chapter makes
the breach of confidentiality and privacy, a punishable offense. This is
the most common aftermath of hacking.
• The Information and Technology Act, 2000 (IT Act) covers all types
of cyber crime committed in the country
including hacking. Hacking earlier used to refer to a crime under
section 43 of the IT Act but at the same time, ethical hacking or better
known as white collar hacking was considered legal.
SCOPE FOR ETHICAL HACKING
• Ethical hacking is generally used as penetration testing to detect
vulnerabilities, risk and identify the loopholes in a security system
and to take corrective measures against those attacks.
• Ethical hacking is a key component of risk evaluation, auditing, and
counter-frauds. The scope for the Ethical Hackers is high and it is one
of the rapidly growing careers at present as many malicious attackers
cause a threat to the business and its networks. Industries like
Information Technology and Banking Sectors hire several Ethical
hackers to protect their data and infrastructure. Also, in the upcoming
days, the demand for this profile is going to be high compared to other
profiles due to an increased threat of vulnerabilities.

More Related Content

What's hot

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
Cyber crime
Cyber crimeCyber crime
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
himanshujoshi238
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Sagar Verma
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
NishaYadav177
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
leoimpact
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
Raghav Bisht
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy
 

What's hot (20)

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Hacking
HackingHacking
Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 

Similar to Hacking

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
ambemPrashanthi
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
ShivaniSingha1
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
dhumaletiku
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
penetration Tester
 
Intro
IntroIntro
Intro
Kalkey
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
vishakha bhagwat
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
Sunipa Bera
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
MadhuKumar114889
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
vamshimatangi
 
HACKING
HACKINGHACKING
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rohit Trimukhe
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speechtalhaabid
 

Similar to Hacking (20)

Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Intro
IntroIntro
Intro
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
HACKING
HACKINGHACKING
HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 

Recently uploaded

The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 

Recently uploaded (20)

The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 

Hacking

  • 2. CONTENT • Hacking • History of Hacking • Types of Hacking • Hackers • Types of Hackers • Famous Hacker • Service of Ethical Hacking • Disadvantages of Hacking • Need of Hacking • Cyber law for Hacking • Scope of Ethical Hacking
  • 3. WHAT IS HACKING? • Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose. To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers.
  • 4. HISTORY OF HACKING • When hacking first started it was not thought of as that serious. The hackers were not even known as hackers but as practical jokers. The very first hack came in 1878 when the phone company, Bell Telephone, was started. A group of teenage boys, hired to run the switchboards, would disconnect or misdirect calls. The first authentic computer hackers came in the 1960s. During those times, computers were mainframes, locked away in temperature controlled, glassed in areas. It cost a lot of money to run these machines, so programmers had limited access to them.
  • 5. HISTORY OF HACKING • The smarter students, usually MIT students, had an insatiable curiosity about how things worked. So, the smartest ones created what they called "hacks", programming shortcuts, to complete computing tasks more quickly. In some cases the shortcuts were better than the original program. One of the hacks that was created in the 60s, 1969 to be exact, was created to act as an open set of rules to run machines on the computer frontier. It was created by two employees from the Bell Lab's think tank. The two employees were Dennis Ritchie and Ken Thompson and the "hack" was called UNIX.
  • 6. TYPES OF HACKING • Ethical Hacking • Back Door Hacking • Website Hacking • Network Hacking • Password Hacking
  • 7. ETHICAL HACKING • Ethical hacking, also known as penetration testing or pen testing, is legally breaking into computers and devices to test an organization's defenses. It's among the most exciting IT jobs any person can be involved in. You are literally getting paid to keep up with the latest technology and get to break into computers without the threat of being arrested. • Companies engage ethical hackers to identify vulnerabilities in their systems. From the penetration tester's point of view, there is no downside: If you hack in past the current defenses, you’ve given the client a chance to close the hole before an attacker discovers it. If you don’t find anything, your client is even happier because they now get to declare their systems “secure enough that even paid hackers couldn’t break into it.”
  • 8. BACKDOOR HACKING • In the world of cybersecurity, a backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application. Once they're in, cybercriminals can use a backdoor to steal personal and financial data, install additional malware, and hijack devices. • A well-known backdoor example is called FinSpy. When installed on a system, it enables the attacker to download and execute files remotely on the system the moment it connects to the internet, irrespective of the system's physical location. It compromises overall system security.
  • 9. WEBSITE HACKING • Hacking a website is nothing but getting the password to add, edit, delete data stored in that website. After the attack done by a hacker, if he has changed the password of that website software, then it will be tough for the Webmaster to get it back. Hacker will insert harmful programs by inserting malicious codes into the website. It will also cause to the website server to be slow. • In the past years, even Amazon and Yahoo had been attacked by the hacker experts, but it would not affect much to them. In the last year we had seen that, the world wide hackers are tried their level best to make fear on the famous companies like PayPal and Facebook.
  • 10. NETWORK HACKING • Networking Hacking is an offensive branch of computer security related to networks hacking and the penetration of a target via the networking services or equipment. • Network Hacking is generally means gathering information about domain by using tools like Telnet , Nslookup , Ping, Tracert , Netstat , etc. • It also includes OS Fingerprinting, Port Scanning and Port Surfing using various tools.
  • 11. PASSWORD HACKING • Password hacking, sometimes referred to as password cracking, is a method of recovering passwords from data transmitted by or stored on a computer. • A password can be a secret word, phrase or string of characters used to gain access to secured data. An individual with no knowledge of a password may still determine it through password hacking. • Conversely, a dictionary attack allows hackers to employ a program which cycles through common words. A brute force attack goes letter by letter, whereas a dictionary attack only tries possibilities most likely to succeed. ... For example, users tend to pick short passwords and base their passwords off common words.
  • 12. HACKER • A computer hacker is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. • Though the term "hacker" has become associated in popular culture with a "security hacker" – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be unavailable to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors.
  • 13.
  • 14. TYPES OF HACKERS  Black Hat Hackers  White Hat Hackers  Grey Hat Hackers
  • 15. BLACK HAT HACKER • The term “black hat” originated from Western movies, where the bad guys wore black hats and the good guys wore white hats. • A black-hat hacker is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. The black-hat hacker does not have any permission or authority to compromise their targets. They try to inflict damage by compromising security systems, altering functions of websites and networks, or shutting down systems. They often do so to steal or gain access to passwords, financial information, and other personal data.
  • 16. WHITE HAT HACKER • White-hat hackers, on the other hand, are deemed to be the good guys, working with organizations to strengthen the security of a system. A white hat has permission to engage the targets and to compromise them within the prescribed rules of engagement. • White-hat hackers are often referred to as ethical hackers. This individual specializes in ethical hacking tools, techniques, and methodologies to secure an organization’s information systems. • Unlike black-hat hackers, ethical hackers exploit security networks and look for backdoors when they are legally permitted to do so. White-hat hackers always disclose every vulnerability they find in the company’s security system so that it can be fixed before they are being exploited by malicious actors.Some Fortune 50 companies like Facebook, Microsoft, and Google also use white-hat hackers.
  • 17. GREY HAT HACKER • Grey hats exploit networks and computer systems in the way that black hats do, but do so without any malicious intent, disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies. • Usually, grey-hat hackers surf the net and hack into computer systems to notify the administrator or the owner that their system/network contains one or more vulnerabilities that must be fixed immediately. Grey hats may also extort the hacked, offering to correct the defect for a nominal fee.
  • 18. WORLD BEST HACKER • Kevin Mitnick is the world's authority on hacking, social engineering, and security awareness training. In fact, the world's most used computer-based end-user security awareness training suite bears his name. Kevin's keynote presentations are one part magic show, one part education, and all parts entertaining. • Hacked into 40 major corporations, landing him on the FBI’s Most Wanted list • CEO and chief "white hat" hacker at one of the most advanced boutique security firms in the world • His Global Ghost Team has a 100 percent success rate hacking into security systems.
  • 19. SERVICE OF ETHICAL HACKING • Wireless Security • Application Security • Network Security
  • 20. WIRELESS SECURITY These services provide and assess the level of security in the existing infrastructure and network to provide instructions promising system accessibility and uphold its integrity at the same time. Wireless security works in three steps, which are: • Identify vulnerabilities • Adopt security measures • Deploy the threats
  • 21. APPLICATION SECURITY • Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed. • This is used for digging deep into and processing the cruciality and range of challenges faces by the thick client (Java) and the thin client (web browsers). Application security comprises of services like client- side testing and web application testing.
  • 22. NETWORK SECURITY • Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. It lends information on the networks, services, system devices, and their agreements. It also examines and surveys the applications of the voice over Internet convention within the organization environment. Network security’s main objective is to facilitate the presentation of the political repercussions on its own development.
  • 23. WHY DO WE NEED ETHICAL HACKING? • Ethical Hacking comes handy in corporate sectors and organizations, to fight against unlawful practices of breaching systems and to take precautionary actions on hackers. • Dangerous software like Trojan horses, viruses and spam email causes disruption and disturbance in the system and storage space. Ethical hacking provides useful here as it helps to uncover these virus attacks against systems and in addition, lends high-level security. • The main objective of ethical hacking is to promise safety in wireless infrastructure which constitutes most of the current business companies’ aims.
  • 24. DISADVANTAGES OF HACKING • Massive security breach. • Unauthorized system access on private information. • Privacy violation. • Hampering system operation. • Denial of service attacks. • Malicious attack on the system.
  • 25. NEED OF ETHICAL HACKING? • Ethical hacking follows the guidelines of safe hacking for the efficient working of the system. This is a complex procedure hence an ethical hacker requires great skills in comparison to penetration testing. • Ethical hacking has the privilege of gathering access to a company’s network and information system. This automatically provides security to intellectual attacks and threats like viruses. Ethical hacking, as a result, ends up also testing the security levels of the programs and software.
  • 26. CYBER LAW IN INDIA FOR HACKING • Chapter XI Section 66 of IT Act, 2000 particularly deals with the act of hacking. Section 66(1) defines a hack as, any person, dishonestly or fraudulently, does any act referred to in Section 43 is called hacking, and Section 66(2) prescribes the punishment for it. Hacking is a punishable offense in India with imprisonment up to 3 years, or with fine up to two lakh rupees, or with both. • Chapter IX Section 43 of IT act, 2000 prescribes a penalty for the damage to computer or computer system. It is a common thing which happens whenever a computer system is hacked. Black hats damage the system that they hack and steal the information. This enumerative provision includes a lot of activities.
  • 27. CYBER LAW IN INDIA FOR HACKING • Chapter XI Section 65 of the said act makes tampering with computer source documents an offense. Section 72 of the same chapter makes the breach of confidentiality and privacy, a punishable offense. This is the most common aftermath of hacking. • The Information and Technology Act, 2000 (IT Act) covers all types of cyber crime committed in the country including hacking. Hacking earlier used to refer to a crime under section 43 of the IT Act but at the same time, ethical hacking or better known as white collar hacking was considered legal.
  • 28. SCOPE FOR ETHICAL HACKING • Ethical hacking is generally used as penetration testing to detect vulnerabilities, risk and identify the loopholes in a security system and to take corrective measures against those attacks. • Ethical hacking is a key component of risk evaluation, auditing, and counter-frauds. The scope for the Ethical Hackers is high and it is one of the rapidly growing careers at present as many malicious attackers cause a threat to the business and its networks. Industries like Information Technology and Banking Sectors hire several Ethical hackers to protect their data and infrastructure. Also, in the upcoming days, the demand for this profile is going to be high compared to other profiles due to an increased threat of vulnerabilities.