SlideShare a Scribd company logo
WHAT IS HACKING ?
 Hacking is the act of breaking in to a
computersystem and is a criminal offence under
the computer misuse.unauthorized access to
computer resources is called Hacking.
 Computer hacking is the most popular form of
hacking now a days, especially in the field of
computer security, but hacking exists in many other
forms, such as phone hacking, brain hacking, etc.
and it's not limited to either of them.
 In 1878, just two years after the telephone was invented by
Alexander Graham Bell, a group of teenage boys hired to run
the switchboards were kicked off of a telephone system in
NewYork.The reason? The boys were more interested in
knowing how the phone system worked than in making
proper connections and directing calls to the correct place. In
essence, they were trying to "hack" the system to see how it
worked.
 Hacking has been a part of computing for 40 years.
 The first computer hacker emerged at MIT.
 Hacking is began in the 1960s at MIT , origin of the
term “hacker”.
MIT=Massachusetts Institute of Technology
WHO IS A HACKER?
There Are 7 Types Of Hacking
1)  WEBSITE HACKING
2)  NETWORK HACKING
3)  ETHICAL HACKING
4)  EMAIL HACKING
5)  PASSWORD HACKING
6)  ONLINE BANKING HACKING
7)  COMPUTER HACKING
EXPLAINATION ON TYPES OF HACKING
 WEBSITEHACKING = Hacking A Website Means Taking Control Form The Website Owner
To A Person Who Hacks The Website.
 NETWORKHACKING =Generally Means Gathering Information About Domain By Using
Tools Like Telnet,nslookup,ping,tracert,netstat Etc.
 ETHICALHACKING--An ethical hacker is a computer and networking expert who
systematically attempts to penetrate a computer system or network on behalf of its
owners for the purpose of finding security vulnerabilities that a malicious hacker could
potentially exploit..
E-MAIL HACKING = Email hacker is a free Email hacking tool capable of hacking email
accounts of the most popular service provider. Email hacking is a illicit access to an
email account or email correspondence. PASSWORDHACKING= A password can be secret word,pharase or
string of character used to gain access to secured data.password hacking is sometimes
password sometimes referred to as a password cracking is a method of recovering passwords
from data transmitted by or stored on a computer.
 COMPUTERHACKING--is the practice of modifying computer hardware and software
to accomplish a goal outside of the creator’s original purpose. People who engage
in computer hacking activities are often called hackers.
Ian Murphy Kevin Mitnick
Johan HelsinguisLinusTorvalds Mark Abene
Robert Morris
ADVANTAGES DISADVANTAGES
1) Teaches you that no technology is
100% secure.
Criminals can use it to their
advantage.
2) To test how good security is on
your own network.
It can harm someone's privacy
3) Can be used to recover lost
information where the computer
password has been lost.
It destroys other people work.
4) It provides security to banking
and financial establishments.
It's Illegal.
5) They call it white hat computer
hacking.
Hiring professional is expensive.
TYPES OF HACKER
 WHITE HAT HACKERS = Who Specializes In Penetration
Testing And In Other Testing Methodologies To Ensure The
Sequrity Of An Organization’s Information Systems.
 BLACK HAT HACKERS = A Black Hat Is The Villan Or Bad
Guy, Especially In A Western Movie In Which Such A Character
Would Stereotypically Wear A Black Hat In Contrast To The Hero’s
White Hat.
 GREY HAT HACKERS = A Grey, Hat Is The Hacking
Community, Refers To A Skilled Hacker Whose Activities Fall
Somewhere Between White And Black Hat Hackers On A Variety
Of Spectra.
5 HACKERS
WHY DO HACKERS HACK ?
Just for fun.
Show off.
Hack other system
secretly.
Notice many people
their thought.
Steal important
information.
Destroy’s enemy’s
computer network
during the war.
92%
7% 1%
HACKERS
1st Qtr 2nd Qtr 3th Qtr
 Amateurs (cyber
joy riders).
■ Potential
professional
hackers for hire
(corporate spies).
■ World-class cyber
criminals.
BASE=ABOUT 100,000 HACKERS
WORLDWIDE.
 Watch Dogs is an open world vigilante action-adventure stealth video game developed by
Ubisoft Montreal and published by Ubisoft.
 A third-person open-world game from Ubisoft, set in a dark alternate version of the US
where corporations track and catalog all online behavior over a vast data network. A
vigilante group called the Watch_Dogs hacks into this data, using it to hunt criminals.
WHAT TO DO AFTERYOU'VE BEENHACKED
1) SHUT DOWN THE
SYSTEM.
OR Turn off the system.
2) SEPRATE THE SYSTEM FROM NETWORK.
3) RESTORE THE SYSTEM WITH
THE BACKUP.
OR Shutdown the system .
4) IT CAN BE GOOD TO CALL THE CYBER CRIME POLICE.
5) RESET YOUR PASSWORDS.
6) LET YOUR OTHER CONTACTS KNOW ABOUT THE HACK.
7) MAKE SURE YOU WERE HACKED.
8) FORENSIC RECOVERY.
MOBILE PHONE COMMAND PROMPT EMULATOR
WORLDWIDE HACKING ATTACKS
 Anonymous Originated In 2003 On The Imageboard 4chan, Representing The
Concept Of Many Online And Offline Community Users Simultaneously Existing
As An Anarchic, Digitized Global Brain.
 Anonymous Is A Lossely Associated Hacking Organization. It Was Formed On
“4chan” To Represent The Idea Of Many Online And Offline Community Users.
 Anonymous Strongly Opposes Internet Censorship And Surveillance, And Have
Shutdown Multiple Government Website.
 Their Member Can Be Recognized Ny Their “Guy Fawkes“ Mask In Public.
 Anonymous is the first internet-based super-consciousness. Anonymous is a
group, in the sense that a flock of birds is a group.
 Dozens of people have been arrested for involvement in Anonymous cyber
attacks, in countries including the US, UK, Australia, the Netherlands, Spain,
and Turkey.
 Supporters have called the group "freedom fighters” and digital Robin Hoods
while critics have described them as "a cyber lynch-mob "or “ cyber terrorists".
 In 2012, Time called Anonymous one of the "100 most influential people" in
the world.
THIS HACKING PROJECT IS DONE BY = MUBEEN MOMIN,SWAPNIL
LAVAHARE,PRATAMESH KHEDEKAR,PRIYANKA MALI,SUYASH BHADEKAR.

More Related Content

What's hot

Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Hacking
HackingHacking
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
leoimpact
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
little robie
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
Ayush Upadhyay
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
Marin Ivezic
 
Computer Security
Computer SecurityComputer Security
Computer Security
vishal purkuti
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Phishing
PhishingPhishing
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Web security
Web securityWeb security
Web security
Jatin Grover
 

What's hot (20)

Social engineering
Social engineering Social engineering
Social engineering
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing
PhishingPhishing
Phishing
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Web security
Web securityWeb security
Web security
 

Similar to Hacking

Hacking
HackingHacking
Hacking
mubeenm50
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
Sweta Kumari Barnwal
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
Sweta Kumari Barnwal
 
Hacking
HackingHacking
Hacking
Virus
 
Hacking
HackingHacking
Hacking
HackingHacking
Hacking
Yhannah
 
HACKING
HACKINGHACKING
Hacking
HackingHacking
Hacking
pranav patade
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
DEEPIKA WALIA
 
Hacking
Hacking Hacking
Hacking
ANUSHAMOL2
 
Hacking
Hacking Hacking
Hacking
ANUSHAMOL2
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Sourabh Goyal
 
Hacking
HackingHacking
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
Solomon Oho
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ritwick Mukherjee
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
Dinesh O Bareja
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
arohan6
 

Similar to Hacking (20)

Hacking
HackingHacking
Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 

Recently uploaded

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Hacking

  • 1.
  • 2.
  • 3. WHAT IS HACKING ?  Hacking is the act of breaking in to a computersystem and is a criminal offence under the computer misuse.unauthorized access to computer resources is called Hacking.  Computer hacking is the most popular form of hacking now a days, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
  • 4.
  • 5.  In 1878, just two years after the telephone was invented by Alexander Graham Bell, a group of teenage boys hired to run the switchboards were kicked off of a telephone system in NewYork.The reason? The boys were more interested in knowing how the phone system worked than in making proper connections and directing calls to the correct place. In essence, they were trying to "hack" the system to see how it worked.  Hacking has been a part of computing for 40 years.  The first computer hacker emerged at MIT.  Hacking is began in the 1960s at MIT , origin of the term “hacker”. MIT=Massachusetts Institute of Technology
  • 6. WHO IS A HACKER?
  • 7.
  • 8. There Are 7 Types Of Hacking 1)  WEBSITE HACKING 2)  NETWORK HACKING 3)  ETHICAL HACKING 4)  EMAIL HACKING 5)  PASSWORD HACKING 6)  ONLINE BANKING HACKING 7)  COMPUTER HACKING
  • 9. EXPLAINATION ON TYPES OF HACKING  WEBSITEHACKING = Hacking A Website Means Taking Control Form The Website Owner To A Person Who Hacks The Website.  NETWORKHACKING =Generally Means Gathering Information About Domain By Using Tools Like Telnet,nslookup,ping,tracert,netstat Etc.  ETHICALHACKING--An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit..
  • 10. E-MAIL HACKING = Email hacker is a free Email hacking tool capable of hacking email accounts of the most popular service provider. Email hacking is a illicit access to an email account or email correspondence. PASSWORDHACKING= A password can be secret word,pharase or string of character used to gain access to secured data.password hacking is sometimes password sometimes referred to as a password cracking is a method of recovering passwords from data transmitted by or stored on a computer.  COMPUTERHACKING--is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers.
  • 11.
  • 12. Ian Murphy Kevin Mitnick Johan HelsinguisLinusTorvalds Mark Abene Robert Morris
  • 13. ADVANTAGES DISADVANTAGES 1) Teaches you that no technology is 100% secure. Criminals can use it to their advantage. 2) To test how good security is on your own network. It can harm someone's privacy 3) Can be used to recover lost information where the computer password has been lost. It destroys other people work. 4) It provides security to banking and financial establishments. It's Illegal. 5) They call it white hat computer hacking. Hiring professional is expensive.
  • 14. TYPES OF HACKER  WHITE HAT HACKERS = Who Specializes In Penetration Testing And In Other Testing Methodologies To Ensure The Sequrity Of An Organization’s Information Systems.  BLACK HAT HACKERS = A Black Hat Is The Villan Or Bad Guy, Especially In A Western Movie In Which Such A Character Would Stereotypically Wear A Black Hat In Contrast To The Hero’s White Hat.  GREY HAT HACKERS = A Grey, Hat Is The Hacking Community, Refers To A Skilled Hacker Whose Activities Fall Somewhere Between White And Black Hat Hackers On A Variety Of Spectra.
  • 16. WHY DO HACKERS HACK ? Just for fun. Show off. Hack other system secretly. Notice many people their thought. Steal important information. Destroy’s enemy’s computer network during the war.
  • 17. 92% 7% 1% HACKERS 1st Qtr 2nd Qtr 3th Qtr  Amateurs (cyber joy riders). ■ Potential professional hackers for hire (corporate spies). ■ World-class cyber criminals. BASE=ABOUT 100,000 HACKERS WORLDWIDE.
  • 18.
  • 19.  Watch Dogs is an open world vigilante action-adventure stealth video game developed by Ubisoft Montreal and published by Ubisoft.  A third-person open-world game from Ubisoft, set in a dark alternate version of the US where corporations track and catalog all online behavior over a vast data network. A vigilante group called the Watch_Dogs hacks into this data, using it to hunt criminals.
  • 20. WHAT TO DO AFTERYOU'VE BEENHACKED 1) SHUT DOWN THE SYSTEM. OR Turn off the system. 2) SEPRATE THE SYSTEM FROM NETWORK. 3) RESTORE THE SYSTEM WITH THE BACKUP. OR Shutdown the system . 4) IT CAN BE GOOD TO CALL THE CYBER CRIME POLICE. 5) RESET YOUR PASSWORDS. 6) LET YOUR OTHER CONTACTS KNOW ABOUT THE HACK. 7) MAKE SURE YOU WERE HACKED. 8) FORENSIC RECOVERY.
  • 21. MOBILE PHONE COMMAND PROMPT EMULATOR
  • 23.
  • 24.  Anonymous Originated In 2003 On The Imageboard 4chan, Representing The Concept Of Many Online And Offline Community Users Simultaneously Existing As An Anarchic, Digitized Global Brain.  Anonymous Is A Lossely Associated Hacking Organization. It Was Formed On “4chan” To Represent The Idea Of Many Online And Offline Community Users.  Anonymous Strongly Opposes Internet Censorship And Surveillance, And Have Shutdown Multiple Government Website.  Their Member Can Be Recognized Ny Their “Guy Fawkes“ Mask In Public.  Anonymous is the first internet-based super-consciousness. Anonymous is a group, in the sense that a flock of birds is a group.  Dozens of people have been arrested for involvement in Anonymous cyber attacks, in countries including the US, UK, Australia, the Netherlands, Spain, and Turkey.  Supporters have called the group "freedom fighters” and digital Robin Hoods while critics have described them as "a cyber lynch-mob "or “ cyber terrorists".  In 2012, Time called Anonymous one of the "100 most influential people" in the world.
  • 25. THIS HACKING PROJECT IS DONE BY = MUBEEN MOMIN,SWAPNIL LAVAHARE,PRATAMESH KHEDEKAR,PRIYANKA MALI,SUYASH BHADEKAR.