SlideShare a Scribd company logo
HACKING
HISTORY OF HACKING:
• THE FIRST HACKER WAS APPEARED IN 1960’S AT THE MASSACHUSETTS INSTITUTE
OF TECHNOLOGY(MIT)
• DURING THE 1970’S, A DIFFERENT KIND OF HACKER APPEARED: PHONE
PHREAKER OR PHONE HACKER
WHAT IS HACKING:
• IN COMPUTING, A HACKER IS ANY SKILLED COMPUTER EXPERT THAT USES
THEIR TECHNICAL KNOWLEDGE TO OVERCOME A PROBLEM. WHILE "HACKER"
CAN REFER TO ANY COMPUTER PROGRAMMER, THE TERM HAS BECOME
ASSOCIATED IN POPULAR CULTURE WITH A "SECURITY HACKER", SOMEONE
WHO, WITH THEIR TECHNICAL KNOWLEDGE, USES BUGS OR EXPLOITS TO BREAK
INTO COMPUTER SYSTEMS.
TYPES OF HACKER:
Hacker
Ethical Hacker
(White hat)
Cracker
(Black hat)
Grey hat
(Both)
Ethical Hacker (White hat): A hacker who gains
access to systems with a view to fix the identified
weaknesses. They may also perform penetration
Testing and vulnerability assessments.
Cracker (Black hat): A hacker who gains
unauthorized access to computer systems for
personal gain. The intent is usually to steal
corporate data, violate privacy rights, transfer funds
from bank accounts etc.
Grey hat: A hacker who is in between ethical and
black hat hackers. He/she breaks into computer
systems without authority with a view to identify
weaknesses and reveal them to the system owner.
HACKING TECHNIQUES:
1. KEYLOGGER
2. DENIAL OF SERVICE (DOSDDOS)
3. WATERHOLE ATTACKS
4. FAKE WAP
5. EAVESDROPPING (PASSIVE ATTACKS)
6. PHISHING
7. VIRUS, TROJEN ETC.
8. CLICKJACKING ATTACKS
9. COOKIE THEFT
10. BAIT AND SWITCH
KEYLOGGER:
• KEYLOGGER IS A SIMPLE SOFTWARE THAT RECORDS THE KEY SEQUENCE AND
STROKES OF YOUR KEYBOARD INTO A LOG FILE ON YOUR MACHINE. THESE LOG
FILES MIGHT EVEN CONTAIN YOUR PERSONAL EMAIL IDS AND PASSWORDS.
• KEYLOGGER IS ONE OF THE MAIN REASONS WHY ONLINE BANKING SITES GIVE
YOU AN OPTION TO USE THEIR VIRTUAL KEYBOARDS.
DENIAL OF SERVICE ATTACK:
• A DENIAL OF SERVICE ATTACK IS A HACKING TECHNIQUE TO TAKE DOWN A SITE
OR SERVER BY FLOODING THAT SITE OR SERVER WITH A LOT OF TRAFFIC THAT
THE SERVER IS UNABLE TO PROCESS ALL THE REQUESTS IN THE REAL TIME AND
FINALLY CRASHES DOWN.
• FOR DDOS ATTACKS, HACKERS OFTEN DEPLOY BOTNETS OR ZOMBIE COMPUTERS
WHICH HAVE GOT THE ONLY WORK TO FLOOD YOUR SYSTEM WITH REQUEST
PACKETS.
WATERHOLE ATTACKS:
• IF YOU ARE A BIG FAN OF DISCOVERY OR NATIONAL GEOGRAPHIC CHANNELS, YOU
COULD RELATE EASILY WITH THE WATERHOLE ATTACKS. TO POISON A PLACE, IN THIS
CASE, THE HACKER HITS THE MOST ACCESSIBLE PHYSICAL POINT OF THE VICTIM.
• FOR EXAMPLE, IF THE SOURCE OF A RIVER IS POISONED, IT WILL HIT THE ENTIRE
STRETCH OF ANIMALS DURING SUMMER. IN THE SAME WAY, HACKERS TARGET THE
MOST ACCESSED PHYSICAL LOCATION TO ATTACK THE VICTIM. THAT POINT COULD
BE A COFFEE SHOP, A CAFETERIA ETC.
• ONCE HACKERS ARE AWARE OF YOUR TIMINGS, THEY MIGHT CREATE A FAKE WI-FI
ACCESS POINT AND MODIFY YOUR MOST VISITED WEBSITE TO REDIRECT THEM TO
YOU TO GET YOUR PERSONAL INFORMATION.
FAKE WAP:
• EVEN JUST FOR FUN, A HACKER CAN USE SOFTWARE TO FAKE A WIRELESS
ACCESS POINT. THIS WAP CONNECTS TO THE OFFICIAL PUBLIC PLACE WAP. ONCE
YOU GET CONNECTED THE FAKE WAP, A HACKER CAN ACCESS YOUR DATA, JUST
LIKE IN THE ABOVE CASE.
• EX:
• TOOL: WI-FI PUMPKIN
EAVESDROPPING (PASSIVE ATTACKS):
• UNLIKE OTHER ATTACKS WHICH ARE ACTIVE IN NATURE, USING A PASSIVE
ATTACK, A HACKER JUST MONITORS THE COMPUTER SYSTEMS AND NETWORKS
TO GAIN SOME UNWANTED INFORMATION.
• THE MOTIVE BEHIND EAVESDROPPING IS NOT TO HARM THE SYSTEM BUT TO GET
SOME INFORMATION WITHOUT BEING IDENTIFIED.
PHISHING:
• PHISHING IS A HACKING TECHNIQUE USING WHICH A HACKER REPLICATES THE
MOST-ACCESSED SITES AND TRAPS THE VICTIM BY SENDING THAT SPOOFED
LINK.
• ONCE THE VICTIM TRIES TO LOGIN OR ENTER SOME DATA, THE HACKER GETS
THAT PRIVATE INFORMATION OF THE TARGET VICTIM USING THE TROJAN
RUNNING ON THE FAKE SITE.
VIRUS OR TROJANS ETC. :
• VIRUS OR TROJANS ARE MALICIOUS SOFTWARE PROGRAMS WHICH
GET INSTALLED INTO THE VICTIM’S SYSTEM AND KEEPS SENDING THE VICTIMS
DATA TO THE HACKER.
CLICKJACKING:
• CLICKJACKING IS ALSO KNOWN BY A DIFFERENT NAME, UI REDRESS. IN THIS
ATTACK, THE HACKER HIDES THE ACTUAL UI WHERE THE VICTIM IS SUPPOSED
TO CLICK.
• IN ANOTHER WORD, THE ATTACKER HIJACKS THE CLICKS OF THE VICTIM THAT
AREN’T MEANT FOR THE EXACT PAGE, BUT FOR A PAGE WHERE THE HACKER
WANTS YOU TO BE.
COOKIE THEFT:
• THE COOKIES OF A BROWSER KEEP OUR PERSONAL DATA SUCH AS BROWSING
HISTORY, USERNAME, AND PASSWORDS FOR DIFFERENT SITES THAT WE ACCESS.
ONCE THE HACKER GETS THE ACCESS TO YOUR COOKIE, HE CAN EVEN
AUTHENTICATE HIMSELF AS YOU ON A BROWSER.
BAIT AND SWITCH:
• USING BAIT AND SWITCH HACKING TECHNIQUE, THE HACKER RUNS
A MALICIOUS PROGRAM WHICH THE USER BELIEVES TO BE AUTHENTIC. THIS
WAY, AFTER INSTALLING THE MALICIOUS PROGRAM ON YOUR COMPUTER, THE
HACKER GETS UNPRIVILEGED ACCESS TO YOUR COMPUTER.
HACKING LANGUAGE:
1. WEB HACKING:
SINCE MOST OF THE TECH IS BUILD AROUND WORLD WIDE WEB, IT IS IMPORTANT TO LEARN WEB HACKING TO BE A
GOOD HACKER. LET’S SAY YOU ARE INTERESTED IN HACKING WEB APPS AND/OR WEBSITES THEN YOU WILL NEED TO
LEARN WEB CODING. WEBSITES USE MOSTLY HTML, PHP AND JAVASCRIPT SO IT IS IMPORTANT TO LEARN THESE THREE.
• HTML:
ONE OF THE EASIEST AND WIDELY USED STATIC MARKUP WEB LANGUAGE PRESENT IN EACH AND EVERY WEBSITE YOU
SEE IN YOUR BROWSER. IT’S RECOMMENDED TO LEARN HTML BECAUSE IT HELPS UNDERSTANDING WEB ACTIONS,
RESPONSE, AND LOGIC.
• JAVASCRIPT:
JS IS A CLIENT-SIDE WEB PROGRAMMING MOSTLY USED IN WEB SITES FOR BETTER USER INTERFACE AND QUICK
RESPONSE. IF YOU ARE INTERESTED IN A HACKING CAREER YOU NEED TO LEARN JAVASCRIPT BECAUSE IT HELPS TO
UNDERSTAND CLIENT-SIDE MECHANISM WHICH IS ESSENTIAL FOR FINDING CLIENT-SIDE FLAWS.
CONT.….
• PHP:
A DYNAMIC SERVER-SIDE LANGUAGE WHICH IS RESPONSIBLE FOR MANAGING WEB-APPS AND
DATABASE. PHP IS CONSIDERED ONE OF THE MOST ESSENTIAL LANGUAGE BECAUSE IT CONTROLS
EVERYTHING ON SITE AND SERVER, LIKE A CAPTAIN OF A SHIP. IT IS ADVISED TO LEARN PHP
NICELY.
• SQL:
SQL IS RESPONSIBLE FOR STORING AND MANAGING SENSITIVE AND CONFIDENTIAL DATA SUCH AS
USER CREDENTIALS, BANK AND PERSONAL INFORMATION ABOUT THE WEBSITE VISITORS. BLACK
HAT HACKERS MOSTLY TARGET SQL DATABASE AND STEAL INFORMATION WHICH IS LATER SOLD
ON UNDERGROUND DARK WEB FORUM. IF YOU WANT TO BE GOOD SECURITY RESEARCHER, YOU
SHOULD LEARN SQL SO THAT YOU CAN FIND FLAWS IN A WEBSITE AND REPORT THEM.
CONT...
2. EXPLOIT WRITING
AFTER WEB HACKING, ANOTHER MOST IMPORTANT FEATURE OF HACKING IS EXPLOITS. YOU CAN CRACK A PARTICULAR
SOFTWARE BY WRITING A EXPLOIT. BUT TO WRITE A EXPLOIT YOU NEED TO LEARN EITHER PYTHON OR RUBY.
• PYTHON:
IT IS SAID THAT A SECURITY RESEARCHER OR HACKER SHOULD KNOW PYTHON BECAUSE IT THE CORE LANGUAGE FOR
CREATING EXPLOITS AND TOOLS. SECURITY EXPERTS AND EVEN PRO HACKERS SUGGEST THAT MASTER PYTHON IS THE
BEST WAY TO LEARN HACKING. PYTHON OFFERS WIDER FLEXIBILITY AND YOU CAN CREATE EXPLOITS ONLY IF YOU ARE
GOOD IN PYTHON.
• RUBY:
RUBY IS A SIMPLE YET COMPLICATED OBJECT-ORIENTED LANGUAGE. RUBY IS VERY USEFUL WHEN IT COMES TO EXPLOIT
WRITING. IT IS USED FOR METERPRETER SCRIPTING BY HACKERS. THE MOST FAMOUS HACKER TOOL, METASPLOIT
FRAMEWORK IS PROGRAMMED IN RUBY. THOUGH RUBY MAY NOT BE AS VERSATILE AS PYTHON, KNOWLEDGE OF RUBY IS
MUST IN UNDERSTANDING EXPLOITS.
CONT.…
• REVERSE ENGINEERING:
• REVERSE ENGINEERING, THE PROCESS OF TAKING A SOFTWARE
PROGRAM’S BINARY CODE AND RECREATING IT SO AS TO TRACE IT BACK TO
THE ORIGINAL SOURCE CODE. IF YOU KNOW REVERSE ENGINEERING YOU CAN
FIND FLAWS AND BUGS EASILY. IF YOU WANT TO LEARN REVERSE ENGINEERING
YOU NEED TO KNOW C, C++ AND JAVA. THE PROCESS OF CONVERTING THE CODE
WRITTEN IN HIGH LEVEL LANGUAGE INTO A LOW LEVEL LANGUAGE WITHOUT
CHANGING THE ORIGINAL PROGRAM IS KNOWN AS REVERSE ENGINEERING.
HOW TO TRANSLATE THE HACKERS’
LANGUAGE
1 -> I OR L
3 -> E
4 -> A
7 -> T
9 -> G
0 -> O
$ -> S
| -> I OR L
|| -> N
|/| -> M
S -> Z
Z -> S
F -> PH
PH -> F
X -> CK
CK -> X
HOW TO TRANSLATE THE HACKERS’
LANGUAGE
• EX)
• 1 D1D N0T H4CK TH1S P4G3, 1T W4S L1K3 TH1S WH3N 1 H4CK3D 1N
• I DID NOT HACK THIS PAGE, IT WAS LIKE THIS WHEN I HACKED IN
TOP 10 ETHICAL HACKER:
1) RAHUL TYAGI
2) PRANAV MISTRY
3) ANKIT FADIA
4) KOUSHIK DUTTA
5) VIVEK RAMACHANDRAN
6) TRISHNEET ARORA
7) SUNNY VAGHELA
8) BENILD JOSEPH
9) FALGUN RATHOD
10) JAYANT KRISHNAMURTHY
Hacking and Types of Hacker.

More Related Content

What's hot

Hacking
HackingHacking
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
 
Social engineering
Social engineeringSocial engineering
Social engineering
Vishal Kumar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Malicious
MaliciousMalicious
Malicious
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Hacking
HackingHacking
Hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similar to Hacking and Types of Hacker.

Hacking
HackingHacking
Hacking
VipinYadav257
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Lalit Kumar
 
Hacking
Hacking Hacking
Hacking
Harendra Singh
 
News2 bytes
News2 bytesNews2 bytes
News2 bytes
Shreyasi Rao
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
Outhai SAIOUDOM
 
Social engineering
Social engineering Social engineering
Social engineering
Abdelhamid Limami
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rishabha Garg
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
JasminJaman1
 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty Basics
HackerOne
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Alan Quayle
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
Nikhil Tripathi
 
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
Florent Batard
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
Barcamp Kerala
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Sourabh Goyal
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
SuhailShaik16
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
Er Mahendra Yadav
 

Similar to Hacking and Types of Hacker. (20)

Hacking
HackingHacking
Hacking
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
Hacking Hacking
Hacking
 
News2 bytes
News2 bytesNews2 bytes
News2 bytes
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
 
Social engineering
Social engineering Social engineering
Social engineering
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty Basics
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 

More from Coder Tech

HTML (Basic to Advance)
HTML (Basic to Advance)HTML (Basic to Advance)
HTML (Basic to Advance)
Coder Tech
 
PHP Course (Basic to Advance)
PHP Course (Basic to Advance)PHP Course (Basic to Advance)
PHP Course (Basic to Advance)
Coder Tech
 
Kotlin- Basic to Advance
Kotlin- Basic to Advance Kotlin- Basic to Advance
Kotlin- Basic to Advance
Coder Tech
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
Coder Tech
 
Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)
Coder Tech
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory space
Coder Tech
 
Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)
Coder Tech
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
Coder Tech
 

More from Coder Tech (9)

HTML (Basic to Advance)
HTML (Basic to Advance)HTML (Basic to Advance)
HTML (Basic to Advance)
 
PHP Course (Basic to Advance)
PHP Course (Basic to Advance)PHP Course (Basic to Advance)
PHP Course (Basic to Advance)
 
Kotlin- Basic to Advance
Kotlin- Basic to Advance Kotlin- Basic to Advance
Kotlin- Basic to Advance
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
 
Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory space
 
Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 

Hacking and Types of Hacker.

  • 2. HISTORY OF HACKING: • THE FIRST HACKER WAS APPEARED IN 1960’S AT THE MASSACHUSETTS INSTITUTE OF TECHNOLOGY(MIT) • DURING THE 1970’S, A DIFFERENT KIND OF HACKER APPEARED: PHONE PHREAKER OR PHONE HACKER
  • 3. WHAT IS HACKING: • IN COMPUTING, A HACKER IS ANY SKILLED COMPUTER EXPERT THAT USES THEIR TECHNICAL KNOWLEDGE TO OVERCOME A PROBLEM. WHILE "HACKER" CAN REFER TO ANY COMPUTER PROGRAMMER, THE TERM HAS BECOME ASSOCIATED IN POPULAR CULTURE WITH A "SECURITY HACKER", SOMEONE WHO, WITH THEIR TECHNICAL KNOWLEDGE, USES BUGS OR EXPLOITS TO BREAK INTO COMPUTER SYSTEMS.
  • 4. TYPES OF HACKER: Hacker Ethical Hacker (White hat) Cracker (Black hat) Grey hat (Both)
  • 5. Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration Testing and vulnerability assessments. Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
  • 6. HACKING TECHNIQUES: 1. KEYLOGGER 2. DENIAL OF SERVICE (DOSDDOS) 3. WATERHOLE ATTACKS 4. FAKE WAP 5. EAVESDROPPING (PASSIVE ATTACKS) 6. PHISHING 7. VIRUS, TROJEN ETC. 8. CLICKJACKING ATTACKS 9. COOKIE THEFT 10. BAIT AND SWITCH
  • 7. KEYLOGGER: • KEYLOGGER IS A SIMPLE SOFTWARE THAT RECORDS THE KEY SEQUENCE AND STROKES OF YOUR KEYBOARD INTO A LOG FILE ON YOUR MACHINE. THESE LOG FILES MIGHT EVEN CONTAIN YOUR PERSONAL EMAIL IDS AND PASSWORDS. • KEYLOGGER IS ONE OF THE MAIN REASONS WHY ONLINE BANKING SITES GIVE YOU AN OPTION TO USE THEIR VIRTUAL KEYBOARDS.
  • 8. DENIAL OF SERVICE ATTACK: • A DENIAL OF SERVICE ATTACK IS A HACKING TECHNIQUE TO TAKE DOWN A SITE OR SERVER BY FLOODING THAT SITE OR SERVER WITH A LOT OF TRAFFIC THAT THE SERVER IS UNABLE TO PROCESS ALL THE REQUESTS IN THE REAL TIME AND FINALLY CRASHES DOWN. • FOR DDOS ATTACKS, HACKERS OFTEN DEPLOY BOTNETS OR ZOMBIE COMPUTERS WHICH HAVE GOT THE ONLY WORK TO FLOOD YOUR SYSTEM WITH REQUEST PACKETS.
  • 9. WATERHOLE ATTACKS: • IF YOU ARE A BIG FAN OF DISCOVERY OR NATIONAL GEOGRAPHIC CHANNELS, YOU COULD RELATE EASILY WITH THE WATERHOLE ATTACKS. TO POISON A PLACE, IN THIS CASE, THE HACKER HITS THE MOST ACCESSIBLE PHYSICAL POINT OF THE VICTIM. • FOR EXAMPLE, IF THE SOURCE OF A RIVER IS POISONED, IT WILL HIT THE ENTIRE STRETCH OF ANIMALS DURING SUMMER. IN THE SAME WAY, HACKERS TARGET THE MOST ACCESSED PHYSICAL LOCATION TO ATTACK THE VICTIM. THAT POINT COULD BE A COFFEE SHOP, A CAFETERIA ETC. • ONCE HACKERS ARE AWARE OF YOUR TIMINGS, THEY MIGHT CREATE A FAKE WI-FI ACCESS POINT AND MODIFY YOUR MOST VISITED WEBSITE TO REDIRECT THEM TO YOU TO GET YOUR PERSONAL INFORMATION.
  • 10. FAKE WAP: • EVEN JUST FOR FUN, A HACKER CAN USE SOFTWARE TO FAKE A WIRELESS ACCESS POINT. THIS WAP CONNECTS TO THE OFFICIAL PUBLIC PLACE WAP. ONCE YOU GET CONNECTED THE FAKE WAP, A HACKER CAN ACCESS YOUR DATA, JUST LIKE IN THE ABOVE CASE. • EX: • TOOL: WI-FI PUMPKIN
  • 11. EAVESDROPPING (PASSIVE ATTACKS): • UNLIKE OTHER ATTACKS WHICH ARE ACTIVE IN NATURE, USING A PASSIVE ATTACK, A HACKER JUST MONITORS THE COMPUTER SYSTEMS AND NETWORKS TO GAIN SOME UNWANTED INFORMATION. • THE MOTIVE BEHIND EAVESDROPPING IS NOT TO HARM THE SYSTEM BUT TO GET SOME INFORMATION WITHOUT BEING IDENTIFIED.
  • 12. PHISHING: • PHISHING IS A HACKING TECHNIQUE USING WHICH A HACKER REPLICATES THE MOST-ACCESSED SITES AND TRAPS THE VICTIM BY SENDING THAT SPOOFED LINK. • ONCE THE VICTIM TRIES TO LOGIN OR ENTER SOME DATA, THE HACKER GETS THAT PRIVATE INFORMATION OF THE TARGET VICTIM USING THE TROJAN RUNNING ON THE FAKE SITE.
  • 13. VIRUS OR TROJANS ETC. : • VIRUS OR TROJANS ARE MALICIOUS SOFTWARE PROGRAMS WHICH GET INSTALLED INTO THE VICTIM’S SYSTEM AND KEEPS SENDING THE VICTIMS DATA TO THE HACKER.
  • 14. CLICKJACKING: • CLICKJACKING IS ALSO KNOWN BY A DIFFERENT NAME, UI REDRESS. IN THIS ATTACK, THE HACKER HIDES THE ACTUAL UI WHERE THE VICTIM IS SUPPOSED TO CLICK. • IN ANOTHER WORD, THE ATTACKER HIJACKS THE CLICKS OF THE VICTIM THAT AREN’T MEANT FOR THE EXACT PAGE, BUT FOR A PAGE WHERE THE HACKER WANTS YOU TO BE.
  • 15. COOKIE THEFT: • THE COOKIES OF A BROWSER KEEP OUR PERSONAL DATA SUCH AS BROWSING HISTORY, USERNAME, AND PASSWORDS FOR DIFFERENT SITES THAT WE ACCESS. ONCE THE HACKER GETS THE ACCESS TO YOUR COOKIE, HE CAN EVEN AUTHENTICATE HIMSELF AS YOU ON A BROWSER.
  • 16. BAIT AND SWITCH: • USING BAIT AND SWITCH HACKING TECHNIQUE, THE HACKER RUNS A MALICIOUS PROGRAM WHICH THE USER BELIEVES TO BE AUTHENTIC. THIS WAY, AFTER INSTALLING THE MALICIOUS PROGRAM ON YOUR COMPUTER, THE HACKER GETS UNPRIVILEGED ACCESS TO YOUR COMPUTER.
  • 17. HACKING LANGUAGE: 1. WEB HACKING: SINCE MOST OF THE TECH IS BUILD AROUND WORLD WIDE WEB, IT IS IMPORTANT TO LEARN WEB HACKING TO BE A GOOD HACKER. LET’S SAY YOU ARE INTERESTED IN HACKING WEB APPS AND/OR WEBSITES THEN YOU WILL NEED TO LEARN WEB CODING. WEBSITES USE MOSTLY HTML, PHP AND JAVASCRIPT SO IT IS IMPORTANT TO LEARN THESE THREE. • HTML: ONE OF THE EASIEST AND WIDELY USED STATIC MARKUP WEB LANGUAGE PRESENT IN EACH AND EVERY WEBSITE YOU SEE IN YOUR BROWSER. IT’S RECOMMENDED TO LEARN HTML BECAUSE IT HELPS UNDERSTANDING WEB ACTIONS, RESPONSE, AND LOGIC. • JAVASCRIPT: JS IS A CLIENT-SIDE WEB PROGRAMMING MOSTLY USED IN WEB SITES FOR BETTER USER INTERFACE AND QUICK RESPONSE. IF YOU ARE INTERESTED IN A HACKING CAREER YOU NEED TO LEARN JAVASCRIPT BECAUSE IT HELPS TO UNDERSTAND CLIENT-SIDE MECHANISM WHICH IS ESSENTIAL FOR FINDING CLIENT-SIDE FLAWS.
  • 18. CONT.…. • PHP: A DYNAMIC SERVER-SIDE LANGUAGE WHICH IS RESPONSIBLE FOR MANAGING WEB-APPS AND DATABASE. PHP IS CONSIDERED ONE OF THE MOST ESSENTIAL LANGUAGE BECAUSE IT CONTROLS EVERYTHING ON SITE AND SERVER, LIKE A CAPTAIN OF A SHIP. IT IS ADVISED TO LEARN PHP NICELY. • SQL: SQL IS RESPONSIBLE FOR STORING AND MANAGING SENSITIVE AND CONFIDENTIAL DATA SUCH AS USER CREDENTIALS, BANK AND PERSONAL INFORMATION ABOUT THE WEBSITE VISITORS. BLACK HAT HACKERS MOSTLY TARGET SQL DATABASE AND STEAL INFORMATION WHICH IS LATER SOLD ON UNDERGROUND DARK WEB FORUM. IF YOU WANT TO BE GOOD SECURITY RESEARCHER, YOU SHOULD LEARN SQL SO THAT YOU CAN FIND FLAWS IN A WEBSITE AND REPORT THEM.
  • 19. CONT... 2. EXPLOIT WRITING AFTER WEB HACKING, ANOTHER MOST IMPORTANT FEATURE OF HACKING IS EXPLOITS. YOU CAN CRACK A PARTICULAR SOFTWARE BY WRITING A EXPLOIT. BUT TO WRITE A EXPLOIT YOU NEED TO LEARN EITHER PYTHON OR RUBY. • PYTHON: IT IS SAID THAT A SECURITY RESEARCHER OR HACKER SHOULD KNOW PYTHON BECAUSE IT THE CORE LANGUAGE FOR CREATING EXPLOITS AND TOOLS. SECURITY EXPERTS AND EVEN PRO HACKERS SUGGEST THAT MASTER PYTHON IS THE BEST WAY TO LEARN HACKING. PYTHON OFFERS WIDER FLEXIBILITY AND YOU CAN CREATE EXPLOITS ONLY IF YOU ARE GOOD IN PYTHON. • RUBY: RUBY IS A SIMPLE YET COMPLICATED OBJECT-ORIENTED LANGUAGE. RUBY IS VERY USEFUL WHEN IT COMES TO EXPLOIT WRITING. IT IS USED FOR METERPRETER SCRIPTING BY HACKERS. THE MOST FAMOUS HACKER TOOL, METASPLOIT FRAMEWORK IS PROGRAMMED IN RUBY. THOUGH RUBY MAY NOT BE AS VERSATILE AS PYTHON, KNOWLEDGE OF RUBY IS MUST IN UNDERSTANDING EXPLOITS.
  • 20. CONT.… • REVERSE ENGINEERING: • REVERSE ENGINEERING, THE PROCESS OF TAKING A SOFTWARE PROGRAM’S BINARY CODE AND RECREATING IT SO AS TO TRACE IT BACK TO THE ORIGINAL SOURCE CODE. IF YOU KNOW REVERSE ENGINEERING YOU CAN FIND FLAWS AND BUGS EASILY. IF YOU WANT TO LEARN REVERSE ENGINEERING YOU NEED TO KNOW C, C++ AND JAVA. THE PROCESS OF CONVERTING THE CODE WRITTEN IN HIGH LEVEL LANGUAGE INTO A LOW LEVEL LANGUAGE WITHOUT CHANGING THE ORIGINAL PROGRAM IS KNOWN AS REVERSE ENGINEERING.
  • 21. HOW TO TRANSLATE THE HACKERS’ LANGUAGE 1 -> I OR L 3 -> E 4 -> A 7 -> T 9 -> G 0 -> O $ -> S | -> I OR L || -> N |/| -> M S -> Z Z -> S F -> PH PH -> F X -> CK CK -> X
  • 22. HOW TO TRANSLATE THE HACKERS’ LANGUAGE • EX) • 1 D1D N0T H4CK TH1S P4G3, 1T W4S L1K3 TH1S WH3N 1 H4CK3D 1N • I DID NOT HACK THIS PAGE, IT WAS LIKE THIS WHEN I HACKED IN
  • 23. TOP 10 ETHICAL HACKER: 1) RAHUL TYAGI 2) PRANAV MISTRY 3) ANKIT FADIA 4) KOUSHIK DUTTA 5) VIVEK RAMACHANDRAN 6) TRISHNEET ARORA 7) SUNNY VAGHELA 8) BENILD JOSEPH 9) FALGUN RATHOD 10) JAYANT KRISHNAMURTHY