HACKING
Omer Naeem Ahmed
Saad Owais
Rizwan Mumtaz
Darya Khan
Nadia Khan
What is Hacking ?
Gain unauthorized access to data in a system
or computer.
The one who hacks is called “Hacker”.
Famous Hackers:
1. Gary McKinnon
2. Hamza Bendeladlj
3. Adrian Lamo
4. Anonymous
GaryMcKinnon
Gary McKinnon must’ve been a curious, restless child, for to
gain information on UFOs, he thought it better to get a
direct access into the channels of NASA. He infiltrated 97 US
military and NASA computers, by installing virus and deleting
a few files.
GaryMcKinnon
All the efforts to satisfy his curiosity, but, alas, curiosity
killed the cat. It was soon found that McKinnon was guilty of
having hacked the military and NASA websites from his
girlfriend’s aunt’s house in London. While entering and
deleting the files from these websites wasn’t enough,
McKinnon thought of shaming the security forces by putting
out a notice on the website that said, “Your security is
crap.”
Hamza Bendeladlj
The 27-year-old Algerian computer science graduate used a
computer virus to steal money from more than 200 American
banks and financial institutions. He then reportedly gave
millions of dollars to Palestinian charities.
Hamza Bendeladlj
Bendelladj, who is alleged to be the co-creator of a banking
trojan horse called SpyEye, was indicted in absentia by US
authorities in 2011. The program - a malware toolkit that
saw its popularity peak between 2009 and 2011 - is believed
to have infected more than 1.4 million computers in the US
and elsewhere, according to Wired, a San Francisco-based
technology magazine.
Adrian Lamo
Adrian Lamo decided to switch careers when he realized the
potentials of his skills. He became a news when he hacked
into Yahoo!, Microsoft, Google, and The New York Times.
This, although culminated into his arrest, it later helped him
gain the batch of an American Threat Analyst.
Adrian Lamo
A guy who would hack into top-notch accounts sitting in the
spacious and comforting cafeterias, libraries, internet cafes,
soon turned Wikileaks suspect Bradley Manning over to FBI.
While Manning was arrested for leaking several hundred
sensitive US government documents, Lamo went hiding or
should we presume, undercover?
Anonymous
Anonymous is a loosely associated international network of
activist and hacktivist entities. A website nominally
associated with the group describes it as "an Internet
gathering" with "a very loose and decentralized command
structure that operates on ideas rather than directives". The
group became known for a series of well-publicized publicity
stunts and DDoS attacks on government, religious, and
corporate websites.
Anonymous
Anonymous originated in 2003 on the imageboard 4chan,
representing the concept of many online and offline
community users simultaneously existing as an anarchic,
digitized global brain. Anonymous members (known as
"Anons") can be distinguished in public by the wearing of Guy
Fawkes masks in the style portrayed in the graphic novel and
film V for Vendetta.
Hacking tools
 Kali Linux
 John The Ripper
 Metasploit Penetration Testing Software
Kali Linux
 Kali Linux was released in August 2015. It has a major
release known as Kali Linux 2.0. This app is packed with
distribution and interface tools. It has an improved
hardware and supports a large number of Desktop
environments. Kali Linux is a security-focused operating
system you can run off a CD or USB drive, anywhere. With
its security toolkit, you can crack Wi-Fi passwords, create
fake networks, and test other vulnerabilities.
John The Ripper
John the Ripper, mostly just referred to as simply, 'John' is
a popular password cracking pentesting tool that is most
commonly used to perform dictionary attacks. John the
Ripper takes text string samples (from a text file, referred
to as a 'wordlist', containing popular and complex words
found in a dictionary or real passwords cracked before),
encrypting it in the same way as the password being cracked
(including both the encryption algorithm and key), and
comparing the output to the encrypted string.
Metasploit Penetration Testing Software
 The Metasploit Project is a hugely popular pentesting or
hacking framework. If you are new to Metasploit think of
it as a 'collection of hacking tools and frameworks' that
can be used to execute various tasks. Widely used by
cybersecurity professionals and ethical hackers this is a
tool that you have to learn.
That’s it 

Hacking.pptx

  • 1.
    HACKING Omer Naeem Ahmed SaadOwais Rizwan Mumtaz Darya Khan Nadia Khan
  • 2.
    What is Hacking? Gain unauthorized access to data in a system or computer. The one who hacks is called “Hacker”.
  • 3.
    Famous Hackers: 1. GaryMcKinnon 2. Hamza Bendeladlj 3. Adrian Lamo 4. Anonymous
  • 4.
    GaryMcKinnon Gary McKinnon must’vebeen a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files.
  • 6.
    GaryMcKinnon All the effortsto satisfy his curiosity, but, alas, curiosity killed the cat. It was soon found that McKinnon was guilty of having hacked the military and NASA websites from his girlfriend’s aunt’s house in London. While entering and deleting the files from these websites wasn’t enough, McKinnon thought of shaming the security forces by putting out a notice on the website that said, “Your security is crap.”
  • 7.
    Hamza Bendeladlj The 27-year-oldAlgerian computer science graduate used a computer virus to steal money from more than 200 American banks and financial institutions. He then reportedly gave millions of dollars to Palestinian charities.
  • 8.
    Hamza Bendeladlj Bendelladj, whois alleged to be the co-creator of a banking trojan horse called SpyEye, was indicted in absentia by US authorities in 2011. The program - a malware toolkit that saw its popularity peak between 2009 and 2011 - is believed to have infected more than 1.4 million computers in the US and elsewhere, according to Wired, a San Francisco-based technology magazine.
  • 9.
    Adrian Lamo Adrian Lamodecided to switch careers when he realized the potentials of his skills. He became a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times. This, although culminated into his arrest, it later helped him gain the batch of an American Threat Analyst.
  • 11.
    Adrian Lamo A guywho would hack into top-notch accounts sitting in the spacious and comforting cafeterias, libraries, internet cafes, soon turned Wikileaks suspect Bradley Manning over to FBI. While Manning was arrested for leaking several hundred sensitive US government documents, Lamo went hiding or should we presume, undercover?
  • 13.
    Anonymous Anonymous is aloosely associated international network of activist and hacktivist entities. A website nominally associated with the group describes it as "an Internet gathering" with "a very loose and decentralized command structure that operates on ideas rather than directives". The group became known for a series of well-publicized publicity stunts and DDoS attacks on government, religious, and corporate websites.
  • 15.
    Anonymous Anonymous originated in2003 on the imageboard 4chan, representing the concept of many online and offline community users simultaneously existing as an anarchic, digitized global brain. Anonymous members (known as "Anons") can be distinguished in public by the wearing of Guy Fawkes masks in the style portrayed in the graphic novel and film V for Vendetta.
  • 16.
    Hacking tools  KaliLinux  John The Ripper  Metasploit Penetration Testing Software
  • 17.
    Kali Linux  KaliLinux was released in August 2015. It has a major release known as Kali Linux 2.0. This app is packed with distribution and interface tools. It has an improved hardware and supports a large number of Desktop environments. Kali Linux is a security-focused operating system you can run off a CD or USB drive, anywhere. With its security toolkit, you can crack Wi-Fi passwords, create fake networks, and test other vulnerabilities.
  • 19.
    John The Ripper Johnthe Ripper, mostly just referred to as simply, 'John' is a popular password cracking pentesting tool that is most commonly used to perform dictionary attacks. John the Ripper takes text string samples (from a text file, referred to as a 'wordlist', containing popular and complex words found in a dictionary or real passwords cracked before), encrypting it in the same way as the password being cracked (including both the encryption algorithm and key), and comparing the output to the encrypted string.
  • 20.
    Metasploit Penetration TestingSoftware  The Metasploit Project is a hugely popular pentesting or hacking framework. If you are new to Metasploit think of it as a 'collection of hacking tools and frameworks' that can be used to execute various tasks. Widely used by cybersecurity professionals and ethical hackers this is a tool that you have to learn.
  • 21.