2. GROUP MEMBERS
Dianna Marie B. Manalo
Apol Magbuhos
Lenie Aniel
Deborah Anna Perez
Kim Ralph Perez
Glenn Perez
Marco Paolo Aclan
Neil Ian Bagsic
Christian Recto
3. Overview
Is hacking a crime?
What is Hacking?
History of Hacking
Types of Hacking
Types of Hacker
Skill levels of Hacking
Common Hacking Approach
Why do people hack?
Ethical Hacking
Some Famous Hacker
5. Is hacking a crime??
NO NO NO..
NOT AT ALL…….
Hacking is NOT a
CRIME
6. What is Hacking?
Process of attempting to gain or
sucessfully gaining,unauthorized
acess to computer resources for the
purpose of help to a secure system.
A technique in which any one can
access any one's computer without
his permission.
7. History of Hacking
The first hacker appeared
in 1960's at the
Massachusetts Institute Of
Technology(MIT)
During the 1970's, a
different kind of hacker
appeared: Phone Phreaker
or Phone Hacker
8. In the 1980’s, phreaks started to migrate to computers,
and the first Bulletin Board System (BBS) appeared
During the 1990’s, when the use of internet
widespread around the world, hackers multiplied
10. Website Hacking
hacking a website means taking control
from the website owner to a person who
hacks the website
The hacker will get the username and
password and the hacker will use that
website for any purpose which may
sometimes to destroy some valuable
information or even reputation.
11. Email Hacking
Email Hacking is taking access to an
email account or email correspondence
Email may be protected by methods such
as a strong password, encryption of the
contents or a digital signatture. An email
disclaimer may be used to warn an
authorized readers but these are thought
to be ineffective
12. Network Hacking
generally means gathering information
about domain by using tools like Telnet,
NslookUp,Ping,Tracent,etc... over the
network
3 common methods of hacking a wireless
network
Sniffing
Spoofing
Encryption Cracking
13. Password Hacking
the process of recovering secret password
from data that has been stored in or
transmitted by a computer system.
Techniques
Rat and Keyloggers
Guessing
Social Engineering
Brute Force
Phishing
Rainbow Table
14. Password Hacking(cont.)
Rat and Keyloggers
In keylogging or RATing the
hacker sends keylogger or
rat to the victim. This allows
hacker to monitor every
thing victim do on his
computer. Every keystroke
is logged including
passwords. Moreever
hacker can even control the
victims computer.
15. Password Hacking(cont.)
Guessing
This seems silly but this
can easily help you to get
someones password
within seconds. If hacker
knows you, he can use
information he knows
about you to guess your
password. Hacker can
also use combination of
Social Engineering and
Guessing to acquire your
password
16. Password Hacking(cont.)
Social Engineering
Social engineering is process of manipulating
someone to trust you and get information from
them. For example, if the hacker was trying to
get the password of a co-workers or friends
computer, he could call him pretending to be
from the IT department and simply ask for his
login details. Sometime hackers call the victim
pretending to be from bank and ask for their
credit cards details. Social Engineering can
be used to get someone password, to get
bank credentials or any personal information.
17. Password Hacking(cont.)
Brute Force
Any password can be
cracked using Brute-force
attack. Brute-force attacks
try every possible
combinations of numbers,
letters and special
characters until the right
password is match. Brute-
force attacks can take very
long time depending upon
the complexity of the
password. The cracking
time is determined by the
speed of computer and
complexity of the
password.
18. Password Hacking(cont.)
Phishing
Phishing is the most
easiest and popular
hacking method used
by hackers to get
someone account
details. In Phishing
attack hacker send
fake page of real
website like facebook,
gmail to victim. When
someone login through
that fake page his
details is send to the
hacker. This fake
pages can be easily
created and hosted on
free web-hosting sites.
19. Password Hacking(cont.)
Rainbow Table
A Rainbow table is a huge pre-computed list of
hashes for every possible combination of characters.
A password hash is a password that has gone
through a mathematical algorithm such as md5 and is
transformed into something which is not recognizable.
A hash is a one way encryption so once a password
is hashed there is no way to get the original string
from the hashed string. A very commonly used
hashing algorithm to store passwords in website
databases is MD5. It is almost similar to dictionary
attack, the only difference is, in rainbow tables attack
hashed characters are used as passwords whereas in
dictionary attack normal characters are used as
passwords.
20. Online Banking Hacking
Unauthorized accessing bank accounts
without knowing the password or without
permission of account holder
A bank account can be access in many
ways. When someone gts access to your
account that person can take all your
funds without your knowledge
21. Online Banking Hacking(cont.)
Here are 5 siple tips that will help to protect
your Online Account
Use Strong Account
Protect your Computer
Keep an eye on running process
Download with care
Be careful whenusing unprotected public
networks
22. Computer Hacking
Computer Hacking is when files on your
computer are viewed, created or edited
without you authorization
People can gain complete access to your
computer from anywhere in the world if
your computer is turned on,unprotected
and has an internet connection. What they
do, is up to them.
23. Hacker is a word that has two
meanings:
Traditionally, a Hacker is
the very inteligent person who is using
his knowledge in constructive
manner to secure system and
never damage data
....Recently,
Hacker has taken on a new
meaning — someone who
maliciously breaks into systems for
personal gain. Technically, these
criminals & are known as Crackers.
24. Types of Hacker
White Hat Hackers
• Good guys
• Don’t use their skill for
illegal purpose
• Computer security
experts and help to
protect from Black Hats.
25. Black Hat Hackers
Bad Guys
Use their skill
maliciously for personal
gain
Hack banks, steal credit
cards and defaces
websites
Types of Hacker (cont.)
26. Types of Hacker (cont.)
Grey Hat
Hackers
It is a
combination a
of white hat
hackers and
Black Hat
Hackers
27. Types of Hackers (cont.)
NEOPHYTE (NEWBIE, NOOB)
Someone who's new in hacking/ phreaking
HACKTIVIST
uses technology to publicize a social
ideological message
EX:Cyber Terrorist, Freedom of Information
28. COMMON HACKING APPROACH
SYSTEM ENUMERATION
DISCOVERING INFORMATION ABOUT THE
TARGET
VULNERABILITY ANALYSIS
IDENTIFYING POTENTIAL WAYS TO
ATTACK
EXPLOITATION- COMPROMISING THE
SYSTEM BY EMPLOYING THE
VULNERABILITIES FOUND
30. WHY DO PEOPLE HACK?
• TO ACQUIRE DATA
• TO IMPERSONATE
• TO DESTROY DATA
• JUST FOR FUN ^_^
31. What is Ethical Hacking??
Ethical Hacking is
testing the resources for
a good cause and for the
betterment of technology.
Technically Ethical Hacking
means penetration
testing which is focused on
Securing and Protecting IT
Systems.
32. Some Famous Hacker
Kevin Mitnick
At age 15, he used social
engineering and dumpster
diving to bypass the punch
card system used in the
Los Angeles bus system.
Social engineering
became his primary
method of obtaining
information, including user-
names and passwords and
modem phone numbers
he was the most-wanted
computer criminal in the
United States.
33. Some Famous Hacker(cont.)
Johan Helsinguis
born in 1961 in Helsinki, Finland,
started and ran the Anon.penet.fi
internet remailer.
Anon.penet.fi was one of the most
popular Internet remailers,
handling 10,000 messages a day.
The server was the first of its kind
to use a password-protected PO
box system for sending and
receiving e-mails. In the 1980s, he
was the system administrator for
the central Finnish news node as
well as one of the founding
members of the Finnish UNIX User
Group.
34. Some Famous Hacker(cont.)
Linus Torvalds
a Finnish American software
engineer, he was the principal force
behind the development of the
Linux kernel that became the most
popular kernel for operating
systems.
He later became the chief architect
of the Linux kernel and now acts as
the project's coordinator.
He also created the revision
control system Git as well as the
diving log software Subsurface. He
was honored, along with Shinya
Yamanaka, with the 2012
Millennium Technology Prize by the
Technology Academy Finland "in
recognition of his creation of a new
open source operating system for
computers leading to the widely
used Linux kernel".
35. Some Famous Hacker(cont.)
Mark Abene
Mark Abene was one of the
most notorious phone hackers.
His hacker handle was Phiber
Optik. His preferred hacking
activity was breaking into
telephone systems using a
normal phone receiver.
Mark was a member of the
Legion of Doom hacker group,
and then founded the hacker
group Masters of Deception
(MOD). When the AT&T
telephone system crashed in
1990, he was blamed and raided
by the Secret Service, but the
crash later turned out be caused
by a computer bug.
36. Some Famous Hacker(cont.)
Robbert Morris
He is best known for creating the
Morris Worm in 1988, considered
the first computer worm on the
Internet, and for companies he has
founded.
Morris was prosecuted for
releasing the worm, and became
the first person convicted under
the new Computer Fraud and
Abuse Act.
He went on to co-found the online
store Viaweb, one of the first web-
based applications
He later joined the faculty in the
department of Electrical
Engineering and Computer
Science at the Massachusetts
Institute of Technology, where he
received tenure in 2006.