SlideShare une entreprise Scribd logo
1  sur  17
HACKERS & HACKTIVISM



•SYED BILAL ALI (5803)
•AHSAN KHAN GHORI (6121)
TOPICS COVERED IN THIS PRESENTATION



•LITTLE BIT ABOUT HACKING

•INTRODUCTION

•HACKERS

•TYPES
•HACKTIVISM
•SOME HACKERS GROUP
•CONCLUSION
HACKING

•Authorized/Unauthorized access of Network & Computer resources

                       OR


•Activity within the computer programmer subculture
HISTORY

1960s
MIT AI Lab
Ken Thompson invented UNIX
Positive Meaning
1970s
Dennis Ritchie invented C

1980s
Cyberspace coined
414s arrested
Two hacker groups formed

1990s
National Crackdown on hackers
Kevin Mitnick arrested
Microsoft’s NT operating system
WORLD MOST FAMOUS HACKERS


                                      Kevin Mitnick
stephen wozniak




Tsutomu Shimomura
                            At the time of his arrest, he was the most-
                            wanted computer criminal in the United
                            States.
TYPES OF HACKERS
FAMOUS NOTORIOUS BLACK HAT HACKER


•Kevin Poulsen

•Gary McKinnon

•Kevin Mitnick

•Jonathan James

•Michael Calce

•Adrian Lamo

George Hotz
HACKTIVISM



Hacktivism is the act of hacking, or breaking
into a computer system, for a politically or
socially motivated purpose. The individual who
performs an act of hacktivism is said to be a
hacktivist.

A hacktivist uses the same tools and
techniques as a hacker, but does so in order to
disrupt services and bring attention to a
political or social cause.
•Anonymous to Hacked
                        Facebook on November 5th.
 Anonymous is an extended group of hackers active on the Internet.

They defend freedom of expression. During the physical manifestations
         of the collective, the members usually wear a mask.



                        The mask symbolizes

                               -the anonymity

        -the activism, it’s the mask of Guy Fawkes who tried to blow up
             the English Parliament in the 16th century because of
              disagreement with the policy of King James the first.
WHY ANONYMOUS??


Anonymous is in the news these days because
the community declares war on facebook.




It seems that this is a fake, however the
actions of the group are large and extend over
the planet.
The Anonymous organization of hackivists has
leveled a new threat against Egypt’s largest
political group, the Muslim Brotherhood,
saying it would take down the group’s online
capacity.

The announcement is titled “Operation
Brotherhood Takedown.” And they said it was
“engaged.”
SOME EXAMPLES


       RECENT ACTIVITY

•Pakistan Tehreek-e-Insaf facebook pages has been hacked. The cyber attack on the
different facebook page associated with Pakistan Tehreek-e-Insaf was made on 3rd
February, 2012 (Friday) at 3:00 PM PST. Thousands of Tehreek-e-Insaf facebook
supporters could not access the fan pages after repeated attempts.


•Mr.Badoo is one of most famous and old hacker of Pakistan in cyber space.He is
arrested by FBI on June, 25, 2012 for hacking into PC of Andy who create any
event of drawing Prophet Muhammad’s(SAW). He hacked Andy account and
remove that event from facebook.
Most Famous and Recent Hacker Groups In
the World.

  •We are Anonymous , We don’t forgive , we don’t forget , Expect us

  •LulzSecurity commonly known as LulzSec,


   •Chaos Computer Club, CCC


   •Legion of Doom

   •Masters of Deception, (The Gang that ruled
   the cyber space )

   •milw0rm (Nuclear Hacker Group)
CONCLUSION


   Q/A
Thank You

 Hope You Like
The Presentation

Contenu connexe

Tendances

Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaMurray Security Services
 
Anonymous
AnonymousAnonymous
Anonymousdiscon
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSecPositive Hack Days
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekarnforceit
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and futureChristian Martorella
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationCharles Mok
 
The deep web
The deep webThe deep web
The deep webAGDNello
 
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014Andrew Schwabe
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneHasani Jaali
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital Worldalxdvs
 
Chinese social network
Chinese social networkChinese social network
Chinese social networktianc001
 
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-statesSecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-statesMikko Hypponen
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronakRonak Karanpuria
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngI am Cipher
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 

Tendances (20)

Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Anonymous
AnonymousAnonymous
Anonymous
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekar
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
The deep web
The deep webThe deep web
The deep web
 
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
 
Is the us engaged in a cyber war
Is the us engaged in a cyber warIs the us engaged in a cyber war
Is the us engaged in a cyber war
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Chinese social network
Chinese social networkChinese social network
Chinese social network
 
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-statesSecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
 
Media Pitch
Media PitchMedia Pitch
Media Pitch
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 

En vedette

Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivismaligi
 
Anonymous Handbook Hacktivist
Anonymous Handbook HacktivistAnonymous Handbook Hacktivist
Anonymous Handbook HacktivistAnonymousLegion
 
Digital Activism & Power: How to Change the World
Digital Activism & Power: How to Change the WorldDigital Activism & Power: How to Change the World
Digital Activism & Power: How to Change the WorldMer Joyce
 
What is Digital Activism?
What is Digital Activism?What is Digital Activism?
What is Digital Activism?Mer Joyce
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Political hacktivism
Political hacktivismPolitical hacktivism
Political hacktivismEva Sánchez
 
23 may bt (print) hackers accessed 145m accounts, says e_bay
23 may bt (print) hackers accessed 145m accounts, says e_bay23 may bt (print) hackers accessed 145m accounts, says e_bay
23 may bt (print) hackers accessed 145m accounts, says e_baySamson Lam
 
The dream of a cyberpunk future seminar presentation
The dream of a cyberpunk future seminar presentationThe dream of a cyberpunk future seminar presentation
The dream of a cyberpunk future seminar presentationtae-i
 
Digital Activism
Digital ActivismDigital Activism
Digital ActivismMax Garcia
 
The hacking mentality
The hacking mentalityThe hacking mentality
The hacking mentalityTausance Vlad
 
Civil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedCivil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedMer Joyce
 
Social media activism presentation
Social media activism presentationSocial media activism presentation
Social media activism presentationPatrick Murphy
 

En vedette (20)

Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivism
 
Anonymous Handbook Hacktivist
Anonymous Handbook HacktivistAnonymous Handbook Hacktivist
Anonymous Handbook Hacktivist
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Digital Activism & Power: How to Change the World
Digital Activism & Power: How to Change the WorldDigital Activism & Power: How to Change the World
Digital Activism & Power: How to Change the World
 
Digital activism
Digital activismDigital activism
Digital activism
 
What is Digital Activism?
What is Digital Activism?What is Digital Activism?
What is Digital Activism?
 
Digital Activism examples
Digital Activism examplesDigital Activism examples
Digital Activism examples
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Political hacktivism
Political hacktivismPolitical hacktivism
Political hacktivism
 
23 may bt (print) hackers accessed 145m accounts, says e_bay
23 may bt (print) hackers accessed 145m accounts, says e_bay23 may bt (print) hackers accessed 145m accounts, says e_bay
23 may bt (print) hackers accessed 145m accounts, says e_bay
 
The dream of a cyberpunk future seminar presentation
The dream of a cyberpunk future seminar presentationThe dream of a cyberpunk future seminar presentation
The dream of a cyberpunk future seminar presentation
 
Digital Activism
Digital ActivismDigital Activism
Digital Activism
 
The hacking mentality
The hacking mentalityThe hacking mentality
The hacking mentality
 
Civil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedCivil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods Upgraded
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Social impact of computers
Social impact of computersSocial impact of computers
Social impact of computers
 
hacking
hackinghacking
hacking
 
Social media activism presentation
Social media activism presentationSocial media activism presentation
Social media activism presentation
 

Similaire à Hackers & hacktivism

Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleFelipe Prado
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...wookyluvr
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lectureRob Jewitt
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbookMika Ch
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-RAKESH SHARMA
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 

Similaire à Hackers & hacktivism (20)

Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Lulz security
Lulz securityLulz security
Lulz security
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc style
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbook
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 

Dernier

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Dernier (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Hackers & hacktivism

  • 1. HACKERS & HACKTIVISM •SYED BILAL ALI (5803) •AHSAN KHAN GHORI (6121)
  • 2. TOPICS COVERED IN THIS PRESENTATION •LITTLE BIT ABOUT HACKING •INTRODUCTION •HACKERS •TYPES •HACKTIVISM •SOME HACKERS GROUP •CONCLUSION
  • 3. HACKING •Authorized/Unauthorized access of Network & Computer resources OR •Activity within the computer programmer subculture
  • 4. HISTORY 1960s MIT AI Lab Ken Thompson invented UNIX Positive Meaning 1970s Dennis Ritchie invented C 1980s Cyberspace coined 414s arrested Two hacker groups formed 1990s National Crackdown on hackers Kevin Mitnick arrested Microsoft’s NT operating system
  • 5. WORLD MOST FAMOUS HACKERS Kevin Mitnick stephen wozniak Tsutomu Shimomura At the time of his arrest, he was the most- wanted computer criminal in the United States.
  • 7. FAMOUS NOTORIOUS BLACK HAT HACKER •Kevin Poulsen •Gary McKinnon •Kevin Mitnick •Jonathan James •Michael Calce •Adrian Lamo George Hotz
  • 8.
  • 9. HACKTIVISM Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause.
  • 10.
  • 11. •Anonymous to Hacked Facebook on November 5th. Anonymous is an extended group of hackers active on the Internet. They defend freedom of expression. During the physical manifestations of the collective, the members usually wear a mask. The mask symbolizes -the anonymity -the activism, it’s the mask of Guy Fawkes who tried to blow up the English Parliament in the 16th century because of disagreement with the policy of King James the first.
  • 12. WHY ANONYMOUS?? Anonymous is in the news these days because the community declares war on facebook. It seems that this is a fake, however the actions of the group are large and extend over the planet.
  • 13. The Anonymous organization of hackivists has leveled a new threat against Egypt’s largest political group, the Muslim Brotherhood, saying it would take down the group’s online capacity. The announcement is titled “Operation Brotherhood Takedown.” And they said it was “engaged.”
  • 14. SOME EXAMPLES RECENT ACTIVITY •Pakistan Tehreek-e-Insaf facebook pages has been hacked. The cyber attack on the different facebook page associated with Pakistan Tehreek-e-Insaf was made on 3rd February, 2012 (Friday) at 3:00 PM PST. Thousands of Tehreek-e-Insaf facebook supporters could not access the fan pages after repeated attempts. •Mr.Badoo is one of most famous and old hacker of Pakistan in cyber space.He is arrested by FBI on June, 25, 2012 for hacking into PC of Andy who create any event of drawing Prophet Muhammad’s(SAW). He hacked Andy account and remove that event from facebook.
  • 15. Most Famous and Recent Hacker Groups In the World. •We are Anonymous , We don’t forgive , we don’t forget , Expect us •LulzSecurity commonly known as LulzSec, •Chaos Computer Club, CCC •Legion of Doom •Masters of Deception, (The Gang that ruled the cyber space ) •milw0rm (Nuclear Hacker Group)
  • 16. CONCLUSION Q/A
  • 17. Thank You Hope You Like The Presentation