SlideShare a Scribd company logo
1 of 32
Group Members:
Muhammad Abbas
Hadir janan,
Asmia basher.
Uasma Ahmad.
Fahad Rehan.
Arbaz Cheema.
• History.
• What is hacking.
• Who are hacker.
• Categories of hacking.
• Types of hacking.
• Famous hackers.
• Why they hack.
• How to secure your data.
• Advantages and dis advantages of hacking.
• Conclusion.
• It all began in the 1960s at MIT, origin of the term
“hacker”, where extremely skilled individuals practiced
hardcore programming in FORTRAN and other older
languages.
• And start hacking.
• In simple words to access someone data with put his
permission and view it. Called hacking.
• In the computer security context, a hacker is
someone who seeks and exploits weaknesses in a
computer system or computer network.
• The term hacker is reclaimed by computer
programmers who argue that someone breaking into
computers is better called a cracker.
• White hat hacking.
• Grey hat hacking.
• Black hat hacking.
• Website Hacking.
• Network hacking.
• Email hacking.
• Password Hacking.
• Online Banking Hacking.
• Computer Hacking.
• Hacking a website means taking control from the website
owner to a person who hacks the website.
• Network Hacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
• Email hacking is illicit access to an email account or
email correspondence.
Password Hacking Password cracking is the process of
recovering secret passwords from data that has been
stored in or transmitted by a computer system.
• Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without
permission of account holder is known as Online banking
hacking.
• Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.
• Gary McKinnon
• LulzSec .
• Adrian Lamo
• Gary McKinnon must’ve been a curious, restless child,
for to gain information on UFOs, he thought it better to
get a direct access into the channels of NASA. He
infiltrated 97 US military and NASA computers, by
installing virus and deleting a few files.
• LulzSec or Lulz Security, a high profile, Black Hat hacker
group, gained credentials for hacking into Sony, News
International, CIA, FBI, Scotland Yard, and several
noteworthy accounts.
• Adrian Lamo decided to switch careers when he realized
the potentials of his skills. He became a news when he
hacked into Yahoo!, Microsoft, Google, and The New
York Times.
• Just for fun.
• Show off.
• Hack other system Secretly.
• Steal important Data.
• Destroy Enemy computer during war.
• Shutdown your Computer.
• Separate your computer from network.
• It be batter to call police.
• Use unique passwords for your accounts.
• Choose a combination of letters, numbers, or symbols to
create a unique password.
• Can be used to recover lost information where the
computer password has been lost.
• Teaches you that no technology is 100% secure.
• To test how good security is on your own network.
• They call it white hat computer hacking.
• Criminals can use it to their advantage.
• It can harm someone's privacy
• It's Illegal
• Keep your password protected. Write your password
should be with combination of characters, digits, special
symbols. Do not respond to feck on fishing email. when
you are doing any online transection always keep watch
on site whether the protocol of site is https & whether
there is a lock symbol .
Hacking

More Related Content

What's hot

Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generationTony Lauro
 
Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference Jameel Nabbo
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vectorSmit Shah
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần tanqn_hut
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
Hacking-coffee and latte
Hacking-coffee and latteHacking-coffee and latte
Hacking-coffee and lattecoffeeandlatte
 

What's hot (18)

Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
Drooger, jack cyber security
Drooger, jack   cyber securityDrooger, jack   cyber security
Drooger, jack cyber security
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
hacking
hackinghacking
hacking
 
Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Hacking
HackingHacking
Hacking
 
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Hacking
Hacking Hacking
Hacking
 
Hacking-coffee and latte
Hacking-coffee and latteHacking-coffee and latte
Hacking-coffee and latte
 

Viewers also liked

Margaret Kahoilua - Resume
Margaret Kahoilua - ResumeMargaret Kahoilua - Resume
Margaret Kahoilua - ResumeMaggie Kahoilua
 
FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS
FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS
FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS Sandeep Gupta
 
DPNC Insight CARO 2016 vs 2015
DPNC Insight CARO 2016 vs 2015DPNC Insight CARO 2016 vs 2015
DPNC Insight CARO 2016 vs 2015Sandeep Gupta
 

Viewers also liked (7)

NB1
NB1NB1
NB1
 
Margaret Kahoilua - Resume
Margaret Kahoilua - ResumeMargaret Kahoilua - Resume
Margaret Kahoilua - Resume
 
Yourprezi
YourpreziYourprezi
Yourprezi
 
CARO lucknow
CARO lucknowCARO lucknow
CARO lucknow
 
FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS
FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS
FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS
 
Drugs & crime
Drugs & crimeDrugs & crime
Drugs & crime
 
DPNC Insight CARO 2016 vs 2015
DPNC Insight CARO 2016 vs 2015DPNC Insight CARO 2016 vs 2015
DPNC Insight CARO 2016 vs 2015
 

Similar to Hacking (20)

Hacking
HackingHacking
Hacking
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
hacking
hackinghacking
hacking
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Hacking
HackingHacking
Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
HACKING
HACKINGHACKING
HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking
HackingHacking
Hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Hacking

  • 1. Group Members: Muhammad Abbas Hadir janan, Asmia basher. Uasma Ahmad. Fahad Rehan. Arbaz Cheema.
  • 2. • History. • What is hacking. • Who are hacker. • Categories of hacking. • Types of hacking. • Famous hackers. • Why they hack. • How to secure your data. • Advantages and dis advantages of hacking. • Conclusion.
  • 3. • It all began in the 1960s at MIT, origin of the term “hacker”, where extremely skilled individuals practiced hardcore programming in FORTRAN and other older languages. • And start hacking.
  • 4. • In simple words to access someone data with put his permission and view it. Called hacking.
  • 5. • In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. • The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 6. • White hat hacking. • Grey hat hacking. • Black hat hacking.
  • 7. • Website Hacking. • Network hacking. • Email hacking. • Password Hacking. • Online Banking Hacking. • Computer Hacking.
  • 8.
  • 9. • Hacking a website means taking control from the website owner to a person who hacks the website.
  • 10.
  • 11. • Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  • 12.
  • 13. • Email hacking is illicit access to an email account or email correspondence.
  • 14. Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 15.
  • 16. • Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 17.
  • 18. • Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 19. • Gary McKinnon • LulzSec . • Adrian Lamo
  • 20.
  • 21. • Gary McKinnon must’ve been a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files.
  • 22.
  • 23. • LulzSec or Lulz Security, a high profile, Black Hat hacker group, gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts.
  • 24.
  • 25. • Adrian Lamo decided to switch careers when he realized the potentials of his skills. He became a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times.
  • 26. • Just for fun. • Show off. • Hack other system Secretly. • Steal important Data. • Destroy Enemy computer during war.
  • 27. • Shutdown your Computer. • Separate your computer from network. • It be batter to call police.
  • 28. • Use unique passwords for your accounts. • Choose a combination of letters, numbers, or symbols to create a unique password.
  • 29. • Can be used to recover lost information where the computer password has been lost. • Teaches you that no technology is 100% secure. • To test how good security is on your own network. • They call it white hat computer hacking.
  • 30. • Criminals can use it to their advantage. • It can harm someone's privacy • It's Illegal
  • 31. • Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .