SlideShare une entreprise Scribd logo
1  sur  36
HACKING
GROUP MEMBERS
 Dianna Marie B. Manalo
 Apol Magbuhos
Lenie Aniel
 Deborah Anna Perez
 Kim Ralph Perez
 Glenn Perez
 Marco Paolo Aclan
 Neil Ian Bagsic
Christian Recto
Overview
Is hacking a crime?
What is Hacking?
History of Hacking
Types of Hacking
Types of Hacker
Skill levels of Hacking
Common Hacking Approach
Why do people hack?
Ethical Hacking
Some Famous Hacker
Is Hacking a crime?
Is hacking a crime??
NO NO NO..
NOT AT ALL…….
Hacking is NOT a
CRIME
What is Hacking?
Process of attempting to gain or
sucessfully gaining,unauthorized
acess to computer resources for the
purpose of help to a secure system.
A technique in which any one can
access any one's computer without
his permission.
History of Hacking
The first hacker appeared
in 1960's at the
Massachusetts Institute Of
Technology(MIT)
During the 1970's, a
different kind of hacker
appeared: Phone Phreaker
or Phone Hacker
 In the 1980’s, phreaks started to migrate to computers,
and the first Bulletin Board System (BBS) appeared
 During the 1990’s, when the use of internet
widespread around the world, hackers multiplied
Types of Hacking
Website Hacking
Email Hacking
Network Hacking
Password Hacking
Online Banking Hacking
Computer Hacking
Website Hacking
hacking a website means taking control
from the website owner to a person who
hacks the website
The hacker will get the username and
password and the hacker will use that
website for any purpose which may
sometimes to destroy some valuable
information or even reputation.
Email Hacking
Email Hacking is taking access to an
email account or email correspondence
Email may be protected by methods such
as a strong password, encryption of the
contents or a digital signatture. An email
disclaimer may be used to warn an
authorized readers but these are thought
to be ineffective
Network Hacking
generally means gathering information
about domain by using tools like Telnet,
NslookUp,Ping,Tracent,etc... over the
network
3 common methods of hacking a wireless
network
Sniffing
Spoofing
Encryption Cracking
Password Hacking
the process of recovering secret password
from data that has been stored in or
transmitted by a computer system.
Techniques
Rat and Keyloggers
Guessing
Social Engineering
Brute Force
Phishing
Rainbow Table
Password Hacking(cont.)
 Rat and Keyloggers
 In keylogging or RATing the
hacker sends keylogger or
rat to the victim. This allows
hacker to monitor every
thing victim do on his
computer. Every keystroke
is logged including
passwords. Moreever
hacker can even control the
victims computer.
Password Hacking(cont.)
 Guessing
This seems silly but this
can easily help you to get
someones password
within seconds. If hacker
knows you, he can use
information he knows
about you to guess your
password. Hacker can
also use combination of
Social Engineering and
Guessing to acquire your
password
Password Hacking(cont.)
Social Engineering
Social engineering is process of manipulating
someone to trust you and get information from
them. For example, if the hacker was trying to
get the password of a co-workers or friends
computer, he could call him pretending to be
from the IT department and simply ask for his
login details. Sometime hackers call the victim
pretending to be from bank and ask for their
credit cards details. Social Engineering can
be used to get someone password, to get
bank credentials or any personal information.
Password Hacking(cont.)
 Brute Force
Any password can be
cracked using Brute-force
attack. Brute-force attacks
try every possible
combinations of numbers,
letters and special
characters until the right
password is match. Brute-
force attacks can take very
long time depending upon
the complexity of the
password. The cracking
time is determined by the
speed of computer and
complexity of the
password.
Password Hacking(cont.)
 Phishing
Phishing is the most
easiest and popular
hacking method used
by hackers to get
someone account
details. In Phishing
attack hacker send
fake page of real
website like facebook,
gmail to victim. When
someone login through
that fake page his
details is send to the
hacker. This fake
pages can be easily
created and hosted on
free web-hosting sites.
Password Hacking(cont.)
 Rainbow Table
A Rainbow table is a huge pre-computed list of
hashes for every possible combination of characters.
A password hash is a password that has gone
through a mathematical algorithm such as md5 and is
transformed into something which is not recognizable.
A hash is a one way encryption so once a password
is hashed there is no way to get the original string
from the hashed string. A very commonly used
hashing algorithm to store passwords in website
databases is MD5. It is almost similar to dictionary
attack, the only difference is, in rainbow tables attack
hashed characters are used as passwords whereas in
dictionary attack normal characters are used as
passwords.
Online Banking Hacking
Unauthorized accessing bank accounts
without knowing the password or without
permission of account holder
A bank account can be access in many
ways. When someone gts access to your
account that person can take all your
funds without your knowledge
Online Banking Hacking(cont.)
Here are 5 siple tips that will help to protect
your Online Account
Use Strong Account
Protect your Computer
 Keep an eye on running process
 Download with care
 Be careful whenusing unprotected public
networks
Computer Hacking
Computer Hacking is when files on your
computer are viewed, created or edited
without you authorization
 People can gain complete access to your
computer from anywhere in the world if
your computer is turned on,unprotected
and has an internet connection. What they
do, is up to them.
Hacker is a word that has two
meanings:
 Traditionally, a Hacker is
the very inteligent person who is using
his knowledge in constructive
manner to secure system and
never damage data
....Recently,
 Hacker has taken on a new
meaning — someone who
maliciously breaks into systems for
personal gain. Technically, these
criminals & are known as Crackers.
Types of Hacker
White Hat Hackers
• Good guys
• Don’t use their skill for
illegal purpose
• Computer security
experts and help to
protect from Black Hats.
Black Hat Hackers
Bad Guys
Use their skill
maliciously for personal
gain
Hack banks, steal credit
cards and defaces
websites
Types of Hacker (cont.)
Types of Hacker (cont.)
 Grey Hat
Hackers
It is a
combination a
of white hat
hackers and
Black Hat
Hackers
Types of Hackers (cont.)
NEOPHYTE (NEWBIE, NOOB)
Someone who's new in hacking/ phreaking
 HACKTIVIST
 uses technology to publicize a social
ideological message
EX:Cyber Terrorist, Freedom of Information
COMMON HACKING APPROACH
SYSTEM ENUMERATION
DISCOVERING INFORMATION ABOUT THE
TARGET
VULNERABILITY ANALYSIS
IDENTIFYING POTENTIAL WAYS TO
ATTACK
EXPLOITATION- COMPROMISING THE
SYSTEM BY EMPLOYING THE
VULNERABILITIES FOUND
SKILL LEVELS OF HACKING
• ELLITE HACKERS- HIGHEST LEVEL
• TECHNICIAN CLASS - "TOOL
DEPENDENT"
• SCRYPT SKIDDIES- LOWEST LEVEL
HACKERS
WHY DO PEOPLE HACK?
• TO ACQUIRE DATA
• TO IMPERSONATE
• TO DESTROY DATA
• JUST FOR FUN ^_^
What is Ethical Hacking??
Ethical Hacking is
testing the resources for
a good cause and for the
betterment of technology.
Technically Ethical Hacking
means penetration
testing which is focused on
Securing and Protecting IT
Systems.
Some Famous Hacker
 Kevin Mitnick
At age 15, he used social
engineering and dumpster
diving to bypass the punch
card system used in the
Los Angeles bus system.
Social engineering
became his primary
method of obtaining
information, including user-
names and passwords and
modem phone numbers
he was the most-wanted
computer criminal in the
United States.
Some Famous Hacker(cont.)
 Johan Helsinguis
 born in 1961 in Helsinki, Finland,
started and ran the Anon.penet.fi
internet remailer.
 Anon.penet.fi was one of the most
popular Internet remailers,
handling 10,000 messages a day.
The server was the first of its kind
to use a password-protected PO
box system for sending and
receiving e-mails. In the 1980s, he
was the system administrator for
the central Finnish news node as
well as one of the founding
members of the Finnish UNIX User
Group.
Some Famous Hacker(cont.)
 Linus Torvalds
 a Finnish American software
engineer, he was the principal force
behind the development of the
Linux kernel that became the most
popular kernel for operating
systems.
 He later became the chief architect
of the Linux kernel and now acts as
the project's coordinator.
 He also created the revision
control system Git as well as the
diving log software Subsurface. He
was honored, along with Shinya
Yamanaka, with the 2012
Millennium Technology Prize by the
Technology Academy Finland "in
recognition of his creation of a new
open source operating system for
computers leading to the widely
used Linux kernel".
Some Famous Hacker(cont.)
 Mark Abene
 Mark Abene was one of the
most notorious phone hackers.
His hacker handle was Phiber
Optik. His preferred hacking
activity was breaking into
telephone systems using a
normal phone receiver.
 Mark was a member of the
Legion of Doom hacker group,
and then founded the hacker
group Masters of Deception
(MOD). When the AT&T
telephone system crashed in
1990, he was blamed and raided
by the Secret Service, but the
crash later turned out be caused
by a computer bug.
Some Famous Hacker(cont.)
 Robbert Morris
 He is best known for creating the
Morris Worm in 1988, considered
the first computer worm on the
Internet, and for companies he has
founded.
 Morris was prosecuted for
releasing the worm, and became
the first person convicted under
the new Computer Fraud and
Abuse Act.
 He went on to co-found the online
store Viaweb, one of the first web-
based applications
 He later joined the faculty in the
department of Electrical
Engineering and Computer
Science at the Massachusetts
Institute of Technology, where he
received tenure in 2006.

Contenu connexe

Tendances (19)

Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hacking
HackingHacking
Hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Hacking
Hacking Hacking
Hacking
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
H A C K I N Gjk,K
H A C K I N Gjk,KH A C K I N Gjk,K
H A C K I N Gjk,K
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 

En vedette

Personality development
Personality developmentPersonality development
Personality developmentShahid Khan
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typeshamza javed
 
Personality Development Tips
Personality Development TipsPersonality Development Tips
Personality Development Tipssandeep chhaya
 
Personality development- A PATH TO SUCCESS
Personality development- A PATH TO SUCCESSPersonality development- A PATH TO SUCCESS
Personality development- A PATH TO SUCCESSsree navya
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 

En vedette (7)

Personality development
Personality developmentPersonality development
Personality development
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Personality Development Tips
Personality Development TipsPersonality Development Tips
Personality Development Tips
 
personality development
personality developmentpersonality development
personality development
 
Personality development- A PATH TO SUCCESS
Personality development- A PATH TO SUCCESSPersonality development- A PATH TO SUCCESS
Personality development- A PATH TO SUCCESS
 
PERSONALITY DEVELOPMENT
PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT
PERSONALITY DEVELOPMENT
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Similaire à Hacking (20)

Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
hacking
hackinghacking
hacking
 

Dernier

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Dernier (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Hacking

  • 2. GROUP MEMBERS  Dianna Marie B. Manalo  Apol Magbuhos Lenie Aniel  Deborah Anna Perez  Kim Ralph Perez  Glenn Perez  Marco Paolo Aclan  Neil Ian Bagsic Christian Recto
  • 3. Overview Is hacking a crime? What is Hacking? History of Hacking Types of Hacking Types of Hacker Skill levels of Hacking Common Hacking Approach Why do people hack? Ethical Hacking Some Famous Hacker
  • 4. Is Hacking a crime?
  • 5. Is hacking a crime?? NO NO NO.. NOT AT ALL……. Hacking is NOT a CRIME
  • 6. What is Hacking? Process of attempting to gain or sucessfully gaining,unauthorized acess to computer resources for the purpose of help to a secure system. A technique in which any one can access any one's computer without his permission.
  • 7. History of Hacking The first hacker appeared in 1960's at the Massachusetts Institute Of Technology(MIT) During the 1970's, a different kind of hacker appeared: Phone Phreaker or Phone Hacker
  • 8.  In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared  During the 1990’s, when the use of internet widespread around the world, hackers multiplied
  • 9. Types of Hacking Website Hacking Email Hacking Network Hacking Password Hacking Online Banking Hacking Computer Hacking
  • 10. Website Hacking hacking a website means taking control from the website owner to a person who hacks the website The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information or even reputation.
  • 11. Email Hacking Email Hacking is taking access to an email account or email correspondence Email may be protected by methods such as a strong password, encryption of the contents or a digital signatture. An email disclaimer may be used to warn an authorized readers but these are thought to be ineffective
  • 12. Network Hacking generally means gathering information about domain by using tools like Telnet, NslookUp,Ping,Tracent,etc... over the network 3 common methods of hacking a wireless network Sniffing Spoofing Encryption Cracking
  • 13. Password Hacking the process of recovering secret password from data that has been stored in or transmitted by a computer system. Techniques Rat and Keyloggers Guessing Social Engineering Brute Force Phishing Rainbow Table
  • 14. Password Hacking(cont.)  Rat and Keyloggers  In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.
  • 15. Password Hacking(cont.)  Guessing This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess your password. Hacker can also use combination of Social Engineering and Guessing to acquire your password
  • 16. Password Hacking(cont.) Social Engineering Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.
  • 17. Password Hacking(cont.)  Brute Force Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute- force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.
  • 18. Password Hacking(cont.)  Phishing Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.
  • 19. Password Hacking(cont.)  Rainbow Table A Rainbow table is a huge pre-computed list of hashes for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm such as md5 and is transformed into something which is not recognizable. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. A very commonly used hashing algorithm to store passwords in website databases is MD5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords.
  • 20. Online Banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder A bank account can be access in many ways. When someone gts access to your account that person can take all your funds without your knowledge
  • 21. Online Banking Hacking(cont.) Here are 5 siple tips that will help to protect your Online Account Use Strong Account Protect your Computer  Keep an eye on running process  Download with care  Be careful whenusing unprotected public networks
  • 22. Computer Hacking Computer Hacking is when files on your computer are viewed, created or edited without you authorization  People can gain complete access to your computer from anywhere in the world if your computer is turned on,unprotected and has an internet connection. What they do, is up to them.
  • 23. Hacker is a word that has two meanings:  Traditionally, a Hacker is the very inteligent person who is using his knowledge in constructive manner to secure system and never damage data ....Recently,  Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals & are known as Crackers.
  • 24. Types of Hacker White Hat Hackers • Good guys • Don’t use their skill for illegal purpose • Computer security experts and help to protect from Black Hats.
  • 25. Black Hat Hackers Bad Guys Use their skill maliciously for personal gain Hack banks, steal credit cards and defaces websites Types of Hacker (cont.)
  • 26. Types of Hacker (cont.)  Grey Hat Hackers It is a combination a of white hat hackers and Black Hat Hackers
  • 27. Types of Hackers (cont.) NEOPHYTE (NEWBIE, NOOB) Someone who's new in hacking/ phreaking  HACKTIVIST  uses technology to publicize a social ideological message EX:Cyber Terrorist, Freedom of Information
  • 28. COMMON HACKING APPROACH SYSTEM ENUMERATION DISCOVERING INFORMATION ABOUT THE TARGET VULNERABILITY ANALYSIS IDENTIFYING POTENTIAL WAYS TO ATTACK EXPLOITATION- COMPROMISING THE SYSTEM BY EMPLOYING THE VULNERABILITIES FOUND
  • 29. SKILL LEVELS OF HACKING • ELLITE HACKERS- HIGHEST LEVEL • TECHNICIAN CLASS - "TOOL DEPENDENT" • SCRYPT SKIDDIES- LOWEST LEVEL HACKERS
  • 30. WHY DO PEOPLE HACK? • TO ACQUIRE DATA • TO IMPERSONATE • TO DESTROY DATA • JUST FOR FUN ^_^
  • 31. What is Ethical Hacking?? Ethical Hacking is testing the resources for a good cause and for the betterment of technology. Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.
  • 32. Some Famous Hacker  Kevin Mitnick At age 15, he used social engineering and dumpster diving to bypass the punch card system used in the Los Angeles bus system. Social engineering became his primary method of obtaining information, including user- names and passwords and modem phone numbers he was the most-wanted computer criminal in the United States.
  • 33. Some Famous Hacker(cont.)  Johan Helsinguis  born in 1961 in Helsinki, Finland, started and ran the Anon.penet.fi internet remailer.  Anon.penet.fi was one of the most popular Internet remailers, handling 10,000 messages a day. The server was the first of its kind to use a password-protected PO box system for sending and receiving e-mails. In the 1980s, he was the system administrator for the central Finnish news node as well as one of the founding members of the Finnish UNIX User Group.
  • 34. Some Famous Hacker(cont.)  Linus Torvalds  a Finnish American software engineer, he was the principal force behind the development of the Linux kernel that became the most popular kernel for operating systems.  He later became the chief architect of the Linux kernel and now acts as the project's coordinator.  He also created the revision control system Git as well as the diving log software Subsurface. He was honored, along with Shinya Yamanaka, with the 2012 Millennium Technology Prize by the Technology Academy Finland "in recognition of his creation of a new open source operating system for computers leading to the widely used Linux kernel".
  • 35. Some Famous Hacker(cont.)  Mark Abene  Mark Abene was one of the most notorious phone hackers. His hacker handle was Phiber Optik. His preferred hacking activity was breaking into telephone systems using a normal phone receiver.  Mark was a member of the Legion of Doom hacker group, and then founded the hacker group Masters of Deception (MOD). When the AT&T telephone system crashed in 1990, he was blamed and raided by the Secret Service, but the crash later turned out be caused by a computer bug.
  • 36. Some Famous Hacker(cont.)  Robbert Morris  He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet, and for companies he has founded.  Morris was prosecuted for releasing the worm, and became the first person convicted under the new Computer Fraud and Abuse Act.  He went on to co-found the online store Viaweb, one of the first web- based applications  He later joined the faculty in the department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, where he received tenure in 2006.