SlideShare a Scribd company logo
1 of 19
Topic:
Hacking And Its Types
What is Hacking?
Hacking is identifying weakness in computer systems
or networks to exploit its weaknesses to gain access.
‫ہے‬ ‫ہی‬ ‫کر‬ ‫نشاندہی‬ ‫کی‬ ‫کمزوری‬ ‫میں‬ ‫ورکس‬ ‫نیٹ‬ ‫یا‬ ‫سسٹمز‬ ‫کمپیوٹر‬ ‫ہیکنگ‬‫تک‬‫اس‬‫کی‬‫کار‬ ‫بروئے‬ ‫کو‬ ‫کمزوریوں‬
‫جاسکے۔‬ ‫الیا‬
Who is a Hacker?
A Hacker is a person who finds and exploits
the weakness in computer systems and/or
networks to gain access. Hackers are usually
skilled computer programmers with
knowledge of computer security.
‫اور‬ ‫سسٹمز‬ ‫کمپیوٹر‬ ‫جو‬ ‫ہے‬ ‫شخص‬ ‫وہ‬ ‫ہیکر‬/‫اس‬ ‫اور‬ ‫ہے‬ ‫کرتا‬ ‫تالش‬ ‫کو‬ ‫کمزوری‬ ‫کردہ‬ ‫حاصل‬ ‫میں‬ ‫ورکس‬ ‫نیٹ‬ ‫یا‬
‫ک‬ ‫سیکیورٹی‬ ‫کمپیوٹر‬ ‫میں‬ ‫جن‬ ‫ہیں‬ ‫ہوتے‬ ‫پروگرامر‬ ‫کمپیوٹر‬ ‫مند‬ ‫ہنر‬ ‫پر‬ ‫طور‬ ‫عام‬ ‫ہیکر‬ ‫ہے۔‬ ‫کرتا‬ ‫استحصال‬ ‫کا‬‫علم‬ ‫ا‬
‫ہے۔‬ ‫ہوتا‬
Types of Hackers
There are three types of hackers:
1. White hat hackers
2. Grey hat hackers
3. Black hat hackers
Ethical Hacker (White hat)
A hacker who gains access to systems
with a view to fix the identified
weaknesses. They may also perform
penetration testing and vulnerability
assessments.
‫ہے۔‬ ‫کرتا‬ ‫حاصل‬ ‫رسائی‬ ‫تک‬ ‫سسٹم‬ ‫ساتھ‬ ‫کے‬ ‫نظریہ‬ ‫کے‬ ‫کرنے‬ ‫دور‬ ‫کو‬ ‫کمزوریوں‬ ‫شدہ‬ ‫شناخت‬ ‫جو‬ ‫ہیکر‬ ‫ایک‬
‫خو‬ ‫وہ‬‫د‬‫ہیں۔‬ ‫سکتے‬ ‫لے‬ ‫بھی‬ ‫جائزہ‬ ‫کا‬ ‫کمزوری‬ ‫اور‬ ‫جانچ‬
Cracker (Black hat)
A hacker who gains unauthorized access to
computer systems for personal gain. The
intent is usually to steal corporate data,
violate privacy rights, transfer funds from
bank accounts etc.
‫ایک‬‫کے‬ ‫فائدے‬ ‫ذاتی‬ ‫جو‬ ‫ہیکر‬ ‫ایسا‬‫لے‬‫پر‬ ‫طور‬ ‫عام‬ ‫ہے۔‬ ‫کرتا‬ ‫حاصل‬ ‫رسائی‬ ‫مجاز‬ ‫غیر‬ ‫تک‬ ‫سسٹم‬ ‫کمپیوٹر‬
‫کی‬ ‫فنڈز‬ ‫سے‬ ‫اکاؤنٹس‬ ‫بینک‬ ، ‫کرنا‬ ‫ورزی‬ ‫خالف‬ ‫کی‬ ‫حقوق‬ ‫کے‬ ‫رازداری‬ ، ‫کرنا‬ ‫چوری‬ ‫ڈیٹا‬ ‫کارپوریٹ‬
‫ہے۔‬ ‫کرنا‬ ‫منتقلی‬
Grey Hat
A hacker who is in between ethical and black
hat hackers. He/she breaks into computer
systems without authority with a view to
identify weaknesses and reveal them.
‫وہ‬ ‫ہے۔‬ ‫مابین‬ ‫کے‬ ‫ہیکرز‬ ‫ہیٹ‬ ‫بلیک‬ ‫اور‬ ‫اخالقی‬ ‫جو‬ ‫ہیکر‬ ‫ایک‬/‫اور‬ ‫کرنے‬ ‫نشاندہی‬ ‫کی‬ ‫کمزوریوں‬ ‫وہ‬
‫ہے۔‬ ‫جاتا‬ ‫توڑ‬ ‫میں‬ ‫سسٹم‬ ‫کمپیوٹر‬ ‫بغیر‬ ‫کے‬ ‫نظریہ‬ ‫کے‬ ‫کرنے‬ ‫ظاہر‬ ‫کو‬ ‫ان‬
Whatscan
Some people use whatscan for
hacking for other people whatsapp.
Whatscan is the best and a easy App
to open Whatsapp Web in your iPhone
& Ipad.
What you can make by Whatscan for
WhatsApp:
Why I need Whatscan for WhatsApp?
- To open more than One WhatsApp
Account in the same Phone.
- Using the same WhatsApp Account in
another iphone or ipad.
- To control your "Children, Wife,
Friend and Man".
How working Whatscan for WhatsApp?
You need only
to scan the
QR Code on
Whatscan
screen from
your phone.
Description
 - Read Messages.
 - Send Messages.
 - Change Profile Picture.
 - Change Profile Status.
 - Download Images.
 - Forward Images.
 - Send Images from Gallery
 - Send images from Camera
 - Download Videos.
 - Forward Videos.
 - Send Videos from Gallery
 - Send Videos from Camera
 - Send document Files
 - Send Contacts
Facebook
How to Hack Facebook Account
 Professional hackers
 Trusted people
 Using links
Anomor
Anomor com is a website or you can say it act
as a tool that provides the different type of
phishing links to hack anyone Email Id and
Password. Read the step by step instructions
below (6 steps ).
‫ای‬ ‫بھی‬ ‫کو‬ ‫کسی‬ ‫جو‬ ‫ہے‬ ‫کرتا‬ ‫کام‬ ‫بطور‬ ‫کے‬ ‫ٹول‬ ‫کسی‬ ‫یہ‬ ‫کہ‬ ‫ہیں‬ ‫سکتے‬ ‫کہہ‬ ‫آپ‬ ‫یا‬ ‫ہے‬ ‫سائٹ‬ ‫ویب‬ ‫ایک‬ ‫کام‬ ‫انومر‬
‫ہے۔‬ ‫کرتا‬ ‫مہیا‬ ‫لنکس‬ ‫فشنگ‬ ‫کے‬ ‫قسم‬ ‫مختلف‬ ‫لئے‬ ‫کے‬ ‫کرنے‬ ‫ہیک‬ ‫کو‬ ‫ورڈ‬ ‫پاس‬ ‫اور‬ ‫میل‬
Steps to hack a Facebook account using
Anomor:
Step 1 – Open Browser
Step 2 – Open Your Social Account
Step 3 – Open Anomor
Step 4 – Anomor Signup
Step 5 – Copy any Link and send it to hack
account password
Step 6 – Your Victims will be shown in My Victims
Option
Tips to send the link
 If you are sending the anomor link to your
facebook friend then remember one thing do
not send this link to more than 1 person
because Facebook will detect the unusual
activities easily and will block all your links.
 If your links are getting blocked by facebook
then you can use other platforms like
WhatsApp, Gmail etc to send the links
without getting blocked.
NOTE:
Hacking is a criminal offense and illegal
activity so don’t try it on anyone. You
can try this on your own account or on
your own system. This tutorial is for
educational purpose.
‫اپنے‬ ‫یہ‬ ‫آپ‬ ‫کریں۔‬ ‫نہ‬ ‫آزمائش‬ ‫کی‬ ‫اس‬ ‫بھی‬ ‫پر‬ ‫کسی‬ ‫لہذا‬ ‫ہے‬ ‫سرگرمی‬ ‫قانونی‬ ‫غیر‬ ‫اور‬ ‫جرم‬ ‫مجرمانہ‬ ‫ایک‬ ‫ہیکنگ‬
‫ہے۔‬ ‫لئے‬ ‫کے‬ ‫مقصد‬ ‫تعلیمی‬ ‫سبق‬ ‫یہ‬ ‫ہیں۔‬ ‫سکتے‬ ‫آزما‬ ‫پر‬ ‫سسٹم‬ ‫اپنے‬ ‫یا‬ ‫پر‬ ‫اکاؤنٹ‬
Thank you

More Related Content

What's hot

ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKINGNAWAZ KHAN
 
Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security SystemMatthew Bricker
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy stepsLee Toulouse
 
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media ForensicsEC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media ForensicsSina Manavi
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Mazin Ahmed
 
Explore Security Testing
Explore Security TestingExplore Security Testing
Explore Security Testingshwetaupadhyay
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagiamansyal
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenKlaus Drosch
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websitesmaha5960
 
Cybercrime - Why we're not doomed after all
Cybercrime - Why we're not doomed after allCybercrime - Why we're not doomed after all
Cybercrime - Why we're not doomed after allSophos Benelux
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Esteban Bedoya
 

What's hot (20)

ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security System
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy steps
 
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media ForensicsEC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
 
Explore Security Testing
Explore Security TestingExplore Security Testing
Explore Security Testing
 
spyware
spywarespyware
spyware
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagi
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
Hackers secrets
Hackers secretsHackers secrets
Hackers secrets
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Password hacking
Password hackingPassword hacking
Password hacking
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websites
 
Spyware report
Spyware reportSpyware report
Spyware report
 
Hacker halted2
Hacker halted2Hacker halted2
Hacker halted2
 
Cybercrime - Why we're not doomed after all
Cybercrime - Why we're not doomed after allCybercrime - Why we're not doomed after all
Cybercrime - Why we're not doomed after all
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
Password Attack
Password AttackPassword Attack
Password Attack
 

Similar to What is hacking

Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smartKanha Sahu
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxSiddheshSurve10
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Hacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersHacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersJahaSoft
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605RAKESH SHARMA
 

Similar to What is hacking (20)

Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Hacking Kishor
Hacking KishorHacking Kishor
Hacking Kishor
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptxEthical Hacking - A Need To Know.pptx
Ethical Hacking - A Need To Know.pptx
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Internet threats
Internet threatsInternet threats
Internet threats
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Hacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie HackersHacking for Beginners The Ultimate Guide For Newbie Hackers
Hacking for Beginners The Ultimate Guide For Newbie Hackers
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 

More from MuhammadUmer411

More from MuhammadUmer411 (6)

Skeletal system anatomy physiology
Skeletal system anatomy physiology Skeletal system anatomy physiology
Skeletal system anatomy physiology
 
Exercise of phychology
Exercise of phychologyExercise of phychology
Exercise of phychology
 
Head stand
Head standHead stand
Head stand
 
Triple jump
Triple jumpTriple jump
Triple jump
 
tennis game
tennis game tennis game
tennis game
 
Imegery and perfomance
Imegery and perfomanceImegery and perfomance
Imegery and perfomance
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

What is hacking

  • 1.
  • 3. What is Hacking? Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. ‫ہے‬ ‫ہی‬ ‫کر‬ ‫نشاندہی‬ ‫کی‬ ‫کمزوری‬ ‫میں‬ ‫ورکس‬ ‫نیٹ‬ ‫یا‬ ‫سسٹمز‬ ‫کمپیوٹر‬ ‫ہیکنگ‬‫تک‬‫اس‬‫کی‬‫کار‬ ‫بروئے‬ ‫کو‬ ‫کمزوریوں‬ ‫جاسکے۔‬ ‫الیا‬
  • 4. Who is a Hacker? A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. ‫اور‬ ‫سسٹمز‬ ‫کمپیوٹر‬ ‫جو‬ ‫ہے‬ ‫شخص‬ ‫وہ‬ ‫ہیکر‬/‫اس‬ ‫اور‬ ‫ہے‬ ‫کرتا‬ ‫تالش‬ ‫کو‬ ‫کمزوری‬ ‫کردہ‬ ‫حاصل‬ ‫میں‬ ‫ورکس‬ ‫نیٹ‬ ‫یا‬ ‫ک‬ ‫سیکیورٹی‬ ‫کمپیوٹر‬ ‫میں‬ ‫جن‬ ‫ہیں‬ ‫ہوتے‬ ‫پروگرامر‬ ‫کمپیوٹر‬ ‫مند‬ ‫ہنر‬ ‫پر‬ ‫طور‬ ‫عام‬ ‫ہیکر‬ ‫ہے۔‬ ‫کرتا‬ ‫استحصال‬ ‫کا‬‫علم‬ ‫ا‬ ‫ہے۔‬ ‫ہوتا‬
  • 5. Types of Hackers There are three types of hackers: 1. White hat hackers 2. Grey hat hackers 3. Black hat hackers
  • 6. Ethical Hacker (White hat) A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments. ‫ہے۔‬ ‫کرتا‬ ‫حاصل‬ ‫رسائی‬ ‫تک‬ ‫سسٹم‬ ‫ساتھ‬ ‫کے‬ ‫نظریہ‬ ‫کے‬ ‫کرنے‬ ‫دور‬ ‫کو‬ ‫کمزوریوں‬ ‫شدہ‬ ‫شناخت‬ ‫جو‬ ‫ہیکر‬ ‫ایک‬ ‫خو‬ ‫وہ‬‫د‬‫ہیں۔‬ ‫سکتے‬ ‫لے‬ ‫بھی‬ ‫جائزہ‬ ‫کا‬ ‫کمزوری‬ ‫اور‬ ‫جانچ‬
  • 7. Cracker (Black hat) A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. ‫ایک‬‫کے‬ ‫فائدے‬ ‫ذاتی‬ ‫جو‬ ‫ہیکر‬ ‫ایسا‬‫لے‬‫پر‬ ‫طور‬ ‫عام‬ ‫ہے۔‬ ‫کرتا‬ ‫حاصل‬ ‫رسائی‬ ‫مجاز‬ ‫غیر‬ ‫تک‬ ‫سسٹم‬ ‫کمپیوٹر‬ ‫کی‬ ‫فنڈز‬ ‫سے‬ ‫اکاؤنٹس‬ ‫بینک‬ ، ‫کرنا‬ ‫ورزی‬ ‫خالف‬ ‫کی‬ ‫حقوق‬ ‫کے‬ ‫رازداری‬ ، ‫کرنا‬ ‫چوری‬ ‫ڈیٹا‬ ‫کارپوریٹ‬ ‫ہے۔‬ ‫کرنا‬ ‫منتقلی‬
  • 8. Grey Hat A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them. ‫وہ‬ ‫ہے۔‬ ‫مابین‬ ‫کے‬ ‫ہیکرز‬ ‫ہیٹ‬ ‫بلیک‬ ‫اور‬ ‫اخالقی‬ ‫جو‬ ‫ہیکر‬ ‫ایک‬/‫اور‬ ‫کرنے‬ ‫نشاندہی‬ ‫کی‬ ‫کمزوریوں‬ ‫وہ‬ ‫ہے۔‬ ‫جاتا‬ ‫توڑ‬ ‫میں‬ ‫سسٹم‬ ‫کمپیوٹر‬ ‫بغیر‬ ‫کے‬ ‫نظریہ‬ ‫کے‬ ‫کرنے‬ ‫ظاہر‬ ‫کو‬ ‫ان‬
  • 9. Whatscan Some people use whatscan for hacking for other people whatsapp. Whatscan is the best and a easy App to open Whatsapp Web in your iPhone & Ipad. What you can make by Whatscan for WhatsApp:
  • 10. Why I need Whatscan for WhatsApp? - To open more than One WhatsApp Account in the same Phone. - Using the same WhatsApp Account in another iphone or ipad. - To control your "Children, Wife, Friend and Man".
  • 11. How working Whatscan for WhatsApp? You need only to scan the QR Code on Whatscan screen from your phone.
  • 12. Description  - Read Messages.  - Send Messages.  - Change Profile Picture.  - Change Profile Status.  - Download Images.  - Forward Images.  - Send Images from Gallery  - Send images from Camera  - Download Videos.  - Forward Videos.  - Send Videos from Gallery  - Send Videos from Camera  - Send document Files  - Send Contacts
  • 13.
  • 14. Facebook How to Hack Facebook Account  Professional hackers  Trusted people  Using links
  • 15. Anomor Anomor com is a website or you can say it act as a tool that provides the different type of phishing links to hack anyone Email Id and Password. Read the step by step instructions below (6 steps ). ‫ای‬ ‫بھی‬ ‫کو‬ ‫کسی‬ ‫جو‬ ‫ہے‬ ‫کرتا‬ ‫کام‬ ‫بطور‬ ‫کے‬ ‫ٹول‬ ‫کسی‬ ‫یہ‬ ‫کہ‬ ‫ہیں‬ ‫سکتے‬ ‫کہہ‬ ‫آپ‬ ‫یا‬ ‫ہے‬ ‫سائٹ‬ ‫ویب‬ ‫ایک‬ ‫کام‬ ‫انومر‬ ‫ہے۔‬ ‫کرتا‬ ‫مہیا‬ ‫لنکس‬ ‫فشنگ‬ ‫کے‬ ‫قسم‬ ‫مختلف‬ ‫لئے‬ ‫کے‬ ‫کرنے‬ ‫ہیک‬ ‫کو‬ ‫ورڈ‬ ‫پاس‬ ‫اور‬ ‫میل‬
  • 16. Steps to hack a Facebook account using Anomor: Step 1 – Open Browser Step 2 – Open Your Social Account Step 3 – Open Anomor Step 4 – Anomor Signup Step 5 – Copy any Link and send it to hack account password Step 6 – Your Victims will be shown in My Victims Option
  • 17. Tips to send the link  If you are sending the anomor link to your facebook friend then remember one thing do not send this link to more than 1 person because Facebook will detect the unusual activities easily and will block all your links.  If your links are getting blocked by facebook then you can use other platforms like WhatsApp, Gmail etc to send the links without getting blocked.
  • 18. NOTE: Hacking is a criminal offense and illegal activity so don’t try it on anyone. You can try this on your own account or on your own system. This tutorial is for educational purpose. ‫اپنے‬ ‫یہ‬ ‫آپ‬ ‫کریں۔‬ ‫نہ‬ ‫آزمائش‬ ‫کی‬ ‫اس‬ ‫بھی‬ ‫پر‬ ‫کسی‬ ‫لہذا‬ ‫ہے‬ ‫سرگرمی‬ ‫قانونی‬ ‫غیر‬ ‫اور‬ ‫جرم‬ ‫مجرمانہ‬ ‫ایک‬ ‫ہیکنگ‬ ‫ہے۔‬ ‫لئے‬ ‫کے‬ ‫مقصد‬ ‫تعلیمی‬ ‫سبق‬ ‫یہ‬ ‫ہیں۔‬ ‫سکتے‬ ‫آزما‬ ‫پر‬ ‫سسٹم‬ ‫اپنے‬ ‫یا‬ ‫پر‬ ‫اکاؤنٹ‬