HACKING
Presented By :- Abhishek Hire
HACKING
The process of attempting to gain
or successfully gaining,
unauthorized access to computer
resources for the purpose of help
or secure system is called hacking.
WHY DO PEOPLE HACK ?
• Just for fun.
• Show of their knowledge.
• Hack other system secretly.
• Destroy enemy’s computer network
during the war.
• For profit people pays a cracker.
• Crack for sake of curiosity.
THE PSYCOLOGY OF
HACKERS:
• All information should be free.
• Access to computer should be unlimited
and free.
• It can change life for better.
• It can create beauty on computer.
TYPES OF HACKING
There are many types of
hacking:
1. Password hacking
2. Software hacking
1. PASSWORD HACKING
There are two types of password
hacking:
1. Brute force
2. Dictionary based
Brute force:
In that case hackers try out all the
combination of all keyboard letters .It
has grater success but it takes long time
Dictionary based:
In that they are use predefine
password. It is unsuccessful method
1. SOFTWARE HACKING
• In that hackers changes the look &
execution way of that software.
• Change the demo version into full
version by decoding the source code.
WHO IS HACKER?
•Hacker is not cyber criminal but he is the
very intelligent person who uses his
knowledge in constructive manner to secure
system & never damage data.
•He knows all about the operating system &
different holes in the system.
TYPES OF HACKERS?
• White Hat Hackers
• Black Hat Hackers
• Gray Hat Hackers
• Green Hat Hackers
• Blue Hat Hackers
• Red Hat Hackers
(Not Malicious but
Not always Ethical)
(Ethical Hacker)
(Malicious Hacker)
(Vigilante Hacker)
(Vengeful Hacker)
(New, Unskilled
Hacker)
WHO IS CRACKER?
Person who enter into
other’s system and violet
the system, damage the
data, create havoc is called
CRACKER.
WHO IS CRACKER?
• Cracker is cyber criminal.
• They can be easily identified
because their actions are
malicious.
WHY DO CRACKERS EXIST?
• Crackers exist because human nature is
just so, frequently driven by to destroy
instead of create.
• They are used for different purposes like
for profit, some company use them for
disabling the competitor company, for
cracking credit card number.
HACKERS VS CRACKERS
HACKERS CRACKERS
• It is Ethical.
• Hackers have
Ethical Certificates.
• It is use for Good
purpose.
• It is Unethical.
• Crackers have not
Ethical Certificates.
• It is use for Bad
purpose.
HACKING TOOLS
• Scanners
• Telnet
• Ftp
Hacking

Hacking

  • 1.
  • 2.
    HACKING The process ofattempting to gain or successfully gaining, unauthorized access to computer resources for the purpose of help or secure system is called hacking.
  • 3.
  • 4.
    • Just forfun. • Show of their knowledge. • Hack other system secretly. • Destroy enemy’s computer network during the war. • For profit people pays a cracker. • Crack for sake of curiosity.
  • 5.
  • 6.
    • All informationshould be free. • Access to computer should be unlimited and free. • It can change life for better. • It can create beauty on computer.
  • 7.
  • 8.
    There are manytypes of hacking: 1. Password hacking 2. Software hacking
  • 9.
    1. PASSWORD HACKING Thereare two types of password hacking: 1. Brute force 2. Dictionary based
  • 10.
    Brute force: In thatcase hackers try out all the combination of all keyboard letters .It has grater success but it takes long time Dictionary based: In that they are use predefine password. It is unsuccessful method
  • 11.
    1. SOFTWARE HACKING •In that hackers changes the look & execution way of that software. • Change the demo version into full version by decoding the source code.
  • 12.
    WHO IS HACKER? •Hackeris not cyber criminal but he is the very intelligent person who uses his knowledge in constructive manner to secure system & never damage data. •He knows all about the operating system & different holes in the system.
  • 13.
  • 14.
    • White HatHackers • Black Hat Hackers • Gray Hat Hackers • Green Hat Hackers • Blue Hat Hackers • Red Hat Hackers (Not Malicious but Not always Ethical) (Ethical Hacker) (Malicious Hacker) (Vigilante Hacker) (Vengeful Hacker) (New, Unskilled Hacker)
  • 16.
    WHO IS CRACKER? Personwho enter into other’s system and violet the system, damage the data, create havoc is called CRACKER.
  • 17.
    WHO IS CRACKER? •Cracker is cyber criminal. • They can be easily identified because their actions are malicious.
  • 18.
    WHY DO CRACKERSEXIST? • Crackers exist because human nature is just so, frequently driven by to destroy instead of create. • They are used for different purposes like for profit, some company use them for disabling the competitor company, for cracking credit card number.
  • 19.
  • 20.
    HACKERS CRACKERS • Itis Ethical. • Hackers have Ethical Certificates. • It is use for Good purpose. • It is Unethical. • Crackers have not Ethical Certificates. • It is use for Bad purpose.
  • 21.