Shawon Raffi
Hey ___
It’s me Shawon Rafii ____
Hacking Presentation
Student of Creative IT
Institute, Batch: GB-1824,
Roll-06.
Follow Me FB/R4ff1
Today I am going to presenting you about Hacking!!
Hacking actually is not the one which people think of ……
Hacking is like Art of Computer Technology!! Hacking basically
use for finding vulnerability & penetration Testing on System.
But Some bad guy miss-use of this Technic of Hacking so
They are called Black Hat. White hat Hacker always works for
Cyber Security….
I ‘ll try my Best to …. hope you enjoy 
If you Have any Suggestion/Feedback please let me know to
make me better one in future……….. Thanks 
Overview
Concept Of Hacking
A Brief of Hacking History
Definition Hacking And Hacker…
Famous hacker in history
Top 10 Countries with most hackers
Type of Hacker…
What And Why Ethical Hacker??.
Top Bangladeshi Hackers
Cybercrime & Cybercrime Type..
Famous Hacker in the History
Hacking Advantage and Disadvantage
Top Tips To Safe from hacker
Concept Of Hacking
Hacking is not the one which people
think of………..
It is not the one which you play with
other’s computer, Facebook
account(organization’s government’s
etc….)
Now a days this Technology has become
a crime due to these aspects
We should not miss use the technologies
for such criminal aspects
Instead we can use it in better manner
like security purpose
Hacking is identifying weakness in computer systems or networks to
exploit its weaknesses to gain access. Example of hacking: using
password cracking algorithm to gain access to A system.
Computers have become mandatory to run a successful businesses. It is
not enough to have isolated computers systems, they need to be
networked to facilitate communication with external businesses. This
exposes them to the outside world and hacking. Hacking means using
computers to commit fraudulent acts such as fraud, privacy invasion,
stealing corporate/personal data, etc. Cyber crimes cost many
organizations millions of dollars every year. Businesses need to protect
themselves against such attacks.
What is
Hacking?
A Hacker is a person who finds and exploits the
weakness in computer systems and/or
networks to gain access. Hackers are usually
skilled computer programmers with knowledge
of computer security. Hackers are classified
according to the intent of their actions.
Who is a
Hacker?
A brief History of Hacking
2000s______
 Microsoft is a victim
of new Type Hackers
 Chinese Hacker claim
to gain access to
sensitive data
 YouTube sesame
street hacking
1980-1990s ___
 Cyberspace coined
 414 arrested
 2600 published
 National crackdown on hackers
 Kevin mitnick arrested
 Microsoft’s operating pierced
2001 ____
 In one of the denial-of service-attack,
hackers launched attacks against
ebay, yahoo, CNN.Com, AMAZON and
others
2007______
 Bank hit by biggest
ever hack swedish
bank, nordea recorded
nearly $1 million has
been stolen in three
months from 250
customers account.
2016______
 China hackers stolen
$100 million from the
central bank of
Bangladesh, that was
the highest attack in
bank in history &
Fortunately The bank
was managed to block
future transfer of $870
million.
1870s______
First instance of phone
hacking exhibited by teenager
1960s______
Positive term for hackers
develops though MITs
artificial intelligence
Famous Hackers in history
1.CHINA
2.UNITED STATE
3.TURKEY
4.RUSSIA
5.TAIWAN
6.BRAZIL
7.ROMANIA
8.INDIA
9.ITALY
10.HUNGARY
TOP 10 COUNTRIES WITH MOST
IN 201
7
 Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal
gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from
bank accounts etc.
 Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the
identified weaknesses. They may also perform penetration-Testing and vulnerability
assessments
 Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into
computer systems without authority with a view to identify weaknesses and reveal them to the
system owner.
 Script kiddies: A non-skilled person who gains access to computer systems using already made
tools.
 Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This
is usually done by hijacking websites and leaving the message on the hijacked website.
 Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.
Types of Hackers:
What is Ethical Hacking?
Ethical Hacking is identifying weakness in computer systems and/or
computer networks and coming with countermeasures that protect the
weaknesses. Ethical hackers must abide by the following rules.
 Get written permission from the owner of the computer system and/or
computer network before hacking.
 Protect the privacy of the organization been hacked.
 Transparently report all the identified weaknesses in the computer system to the
organization.
 Inform hardware and software vendors of the identified weaknesses.
•Information is one of the most valuable assets
of an organization. Keeping information secure
can protect an organization’s image and save an
organization a lot of money.
•Hacking can lead to loss of business for
organizations that deal in finance such as
PayPal. Ethical hacking puts them a step ahead
of the cyber criminals who would otherwise lead
to loss of business.
Why Ethical Hacking?
Top 10 Common Hacking Techniques
 Keylogger
 Denial of Service (DoSDDoS)
 Waterhole attacks
 Fake WAP
 Eavesdropping (Passive Attacks)
 Phishing
 Virus, Trojan, Ransomware etc
 ClickJacking Attacks
 Cookie theft
 Bait and switch
Bangladeshi Top Hacking T3am
Bangladesh Grey Hat Hackers (BGHH)
Bangladesh Cyber 71
Bangladesh Cyber Army
Bangladesh Black Hat Hackers (BBHH)
Cyber crime is the use of computers
and networks to perform illegal
activities such as spreading computer
viruses, online bullying, performing
unauthorized electronic fund
transfers, etc. Most cybercrimes are
committed through the internet.
Some cybercrimes can also be carried
out using Mobile phones via SMS and
online chatting applications.
What is Cyber Crime
The following list presents the common types of cybercrimes:
•Computer Fraud: Intentional deception for personal gain via the use of computer systems.
•Privacy violation: Exposing personal information such as email addresses, phone number,
account details, etc. on social media, websites, etc.
•Identity Theft: Stealing personal information from somebody and impersonating that person.
•Sharing copyrighted files/information: This involves distributing copyright protected files
such as eBooks and computer programs etc.
•Electronic funds transfer: This involves gaining an un-authorized access to bank computer
networks and making illegal fund transfers.
•Electronic money laundering: This involves the use of the computer to launder money.
•ATM Fraud: This involves intercepting ATM card details such as account number and PIN
numbers. These details are then used to withdraw funds from the intercepted accounts.
•Denial of Service Attacks: This involves the use of computers in multiple locations to attack
servers with a view of shutting them down.
•Spam: Sending unauthorized emails. These emails usually contain advertisements.
Type of Cybercrime
INTRODUCTION
Advantages Of Hacking
o To recover lost information, especially in case one lost his password.
o To perform penetration testing to strengthen computer and network security.
o To have a computer system that prevents malicious hackers from gaining access.
o To put adequate preventive measure in place to prevent security.
INTRODUCTION
Disadvantages Of Hacking
o Massive security breach.
o Unauthorized system access on private information.
o Hampering system operation.
o Denial of service attack on the system.
o Malicious attack on the system.
Top tips To Avoid getting Hacked & Protect your Computer(include Smart phone, Tab) from
Virus, Malware….
• Keep updated regularly: Use auto-update to get the latest patches for apps, software or
operating systems.
• Passwords: don’t re-use the same password you already used others & change passwords at
least couple of a year. Also make a strong/complex password– don’t use like (12345, your
name, etc.)
• Download from authorized websites: always make sure that you download files from trusted
source….
• Turn off when you are done: That includes logging out of sites when you are done, switch off
the computer when you leave the house or disconnect Wi-Fi/internet
• Use 2-step verification: if available for logins, it ‘ll protect you to access from unauthorized
Devices.
• Don’t Open any Document from unknown sender: don’t open any type of documents from
unknown sender, it’s can be your inbox.
Safe yourselffrom Hacker
Safe yourselffrom Hacker
• Check that you are in the real site: there are many fake site like phishing on internet so don’t
enter/provide your private data(includes credit card no, email id, phone no, image etc.) to unknown
sites.
• Review app permission: for smart phones-- always check the permission when installing apps that it
does not granting any non-required permission. Such as__ a torchlight app wants Location permission
:P
• Update your Antivirus: Keep updated your virus definitions and scan your computer at lest one in
every weeks.
• Install Find my Phone service: this a excellent app for tracking, locking, and wiping missing phones
and Tablets.
• Cracking: Avoid using crack, Maximum software are basically paid so cracker/hacker make a
program/patch to use the paid software for free but Crack are so dangerous for users PC/Smart
phone, cause crack are infected by virus/malware.
• Put a sicker over your unused webcam.
• Lookout for scam site: There are many Scam/fraud site are offering you for many attractive stuffs ,
that way you can get hacked & lost your money.
T H A N K
Y
Graphic & Animation By RAFFI
The End ………

Hacking Presentation v2 By Raffi

  • 1.
    Shawon Raffi Hey ___ It’sme Shawon Rafii ____ Hacking Presentation Student of Creative IT Institute, Batch: GB-1824, Roll-06. Follow Me FB/R4ff1 Today I am going to presenting you about Hacking!! Hacking actually is not the one which people think of …… Hacking is like Art of Computer Technology!! Hacking basically use for finding vulnerability & penetration Testing on System. But Some bad guy miss-use of this Technic of Hacking so They are called Black Hat. White hat Hacker always works for Cyber Security…. I ‘ll try my Best to …. hope you enjoy  If you Have any Suggestion/Feedback please let me know to make me better one in future……….. Thanks 
  • 2.
    Overview Concept Of Hacking ABrief of Hacking History Definition Hacking And Hacker… Famous hacker in history Top 10 Countries with most hackers Type of Hacker… What And Why Ethical Hacker??. Top Bangladeshi Hackers Cybercrime & Cybercrime Type.. Famous Hacker in the History Hacking Advantage and Disadvantage Top Tips To Safe from hacker
  • 3.
    Concept Of Hacking Hackingis not the one which people think of……….. It is not the one which you play with other’s computer, Facebook account(organization’s government’s etc….) Now a days this Technology has become a crime due to these aspects We should not miss use the technologies for such criminal aspects Instead we can use it in better manner like security purpose
  • 4.
    Hacking is identifyingweakness in computer systems or networks to exploit its weaknesses to gain access. Example of hacking: using password cracking algorithm to gain access to A system. Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems, they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks. What is Hacking?
  • 5.
    A Hacker isa person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Hackers are classified according to the intent of their actions. Who is a Hacker?
  • 6.
    A brief Historyof Hacking 2000s______  Microsoft is a victim of new Type Hackers  Chinese Hacker claim to gain access to sensitive data  YouTube sesame street hacking 1980-1990s ___  Cyberspace coined  414 arrested  2600 published  National crackdown on hackers  Kevin mitnick arrested  Microsoft’s operating pierced 2001 ____  In one of the denial-of service-attack, hackers launched attacks against ebay, yahoo, CNN.Com, AMAZON and others 2007______  Bank hit by biggest ever hack swedish bank, nordea recorded nearly $1 million has been stolen in three months from 250 customers account. 2016______  China hackers stolen $100 million from the central bank of Bangladesh, that was the highest attack in bank in history & Fortunately The bank was managed to block future transfer of $870 million. 1870s______ First instance of phone hacking exhibited by teenager 1960s______ Positive term for hackers develops though MITs artificial intelligence
  • 7.
  • 8.
  • 9.
     Cracker (Blackhat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.  Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration-Testing and vulnerability assessments  Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.  Script kiddies: A non-skilled person who gains access to computer systems using already made tools.  Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.  Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers. Types of Hackers:
  • 10.
    What is EthicalHacking? Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules.  Get written permission from the owner of the computer system and/or computer network before hacking.  Protect the privacy of the organization been hacked.  Transparently report all the identified weaknesses in the computer system to the organization.  Inform hardware and software vendors of the identified weaknesses.
  • 11.
    •Information is oneof the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money. •Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business. Why Ethical Hacking?
  • 12.
    Top 10 CommonHacking Techniques  Keylogger  Denial of Service (DoSDDoS)  Waterhole attacks  Fake WAP  Eavesdropping (Passive Attacks)  Phishing  Virus, Trojan, Ransomware etc  ClickJacking Attacks  Cookie theft  Bait and switch
  • 13.
    Bangladeshi Top HackingT3am Bangladesh Grey Hat Hackers (BGHH) Bangladesh Cyber 71 Bangladesh Cyber Army Bangladesh Black Hat Hackers (BBHH)
  • 14.
    Cyber crime isthe use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers, etc. Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using Mobile phones via SMS and online chatting applications. What is Cyber Crime
  • 15.
    The following listpresents the common types of cybercrimes: •Computer Fraud: Intentional deception for personal gain via the use of computer systems. •Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, websites, etc. •Identity Theft: Stealing personal information from somebody and impersonating that person. •Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc. •Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers. •Electronic money laundering: This involves the use of the computer to launder money. •ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts. •Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down. •Spam: Sending unauthorized emails. These emails usually contain advertisements. Type of Cybercrime
  • 16.
    INTRODUCTION Advantages Of Hacking oTo recover lost information, especially in case one lost his password. o To perform penetration testing to strengthen computer and network security. o To have a computer system that prevents malicious hackers from gaining access. o To put adequate preventive measure in place to prevent security.
  • 17.
    INTRODUCTION Disadvantages Of Hacking oMassive security breach. o Unauthorized system access on private information. o Hampering system operation. o Denial of service attack on the system. o Malicious attack on the system.
  • 18.
    Top tips ToAvoid getting Hacked & Protect your Computer(include Smart phone, Tab) from Virus, Malware…. • Keep updated regularly: Use auto-update to get the latest patches for apps, software or operating systems. • Passwords: don’t re-use the same password you already used others & change passwords at least couple of a year. Also make a strong/complex password– don’t use like (12345, your name, etc.) • Download from authorized websites: always make sure that you download files from trusted source…. • Turn off when you are done: That includes logging out of sites when you are done, switch off the computer when you leave the house or disconnect Wi-Fi/internet • Use 2-step verification: if available for logins, it ‘ll protect you to access from unauthorized Devices. • Don’t Open any Document from unknown sender: don’t open any type of documents from unknown sender, it’s can be your inbox. Safe yourselffrom Hacker
  • 19.
    Safe yourselffrom Hacker •Check that you are in the real site: there are many fake site like phishing on internet so don’t enter/provide your private data(includes credit card no, email id, phone no, image etc.) to unknown sites. • Review app permission: for smart phones-- always check the permission when installing apps that it does not granting any non-required permission. Such as__ a torchlight app wants Location permission :P • Update your Antivirus: Keep updated your virus definitions and scan your computer at lest one in every weeks. • Install Find my Phone service: this a excellent app for tracking, locking, and wiping missing phones and Tablets. • Cracking: Avoid using crack, Maximum software are basically paid so cracker/hacker make a program/patch to use the paid software for free but Crack are so dangerous for users PC/Smart phone, cause crack are infected by virus/malware. • Put a sicker over your unused webcam. • Lookout for scam site: There are many Scam/fraud site are offering you for many attractive stuffs , that way you can get hacked & lost your money.
  • 20.
    T H AN K Y Graphic & Animation By RAFFI The End ………