SlideShare une entreprise Scribd logo
1  sur  23
A Presentation on
Hacking

Group Name:- G3
Group Members :-

Ravikant Verma
Rahul Sisodiya
Sanjay Kumar
Jugendra Singh
Hacking
Authorized or unauthorized
attempts to bypass the security
mechanisms of an information
system or network.
Types of Hacking
•Website Hacking.
•E-mail Hacking.
•Network Hacking.
•Password Hacking.
•Online Banking Hacking.
•Computer Hacking.
Website Hacking..
E-mail Hacking…
Network Hacking...
Password Hacking..
Online Banking Hacking..
Computer Hacking..
Who is a “HACKER” ?
Someone who bypasses the
system‟s access controls by taking
advantage of security weaknesses
left in the system by developers.
Types of Hackers
White-Hat Hackers
The good guys who identify the
security weakness of the system or
network and inform the owner about
them.
Black Hat Hackers
A black hat is the villain or bad guy,
who crash into victim‟s security to
steal information and destroy the
victims security network.
Also known as „cracker‟.
Grey Hat Hackers
A grey hat, in the hacking
community, refers to a skilled
hacker who is somewhere in
between white and black hat
hackers.
Why do people hack ?
•To make security stronger ( Ethical
Hacking ).
•Just for fun.
•Show off.
•Hack other systems secretly.
•Notify many people their thought.
•For money purpose.
Random Fact !!!!
The average age group of hackers
are aged between 14-24 yrs. …
Did you know ?
Social networking sites like
„FACEBOOK‟,‟GMAIL‟,‟YAHOO”
comprised of 60% of direct or
indirect hacking incidents.
Popular Hacked sites
www.jntu.ac.in was hacked on 7 Nov
2010.
www.songs.pk was hacked on 15 July
2011.

Songs.pk

JNTUhomepage after it was hcked
Preventive measures
•Install a strong anti-virus.
•Always run a anti-virus check before
you download a program or a file
from the internet.
•Avoid disclosing personal details like
phone number, credit card details
to strangers.
Any Queries ??

Contenu connexe

Tendances (19)

Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 
Hackers final
Hackers finalHackers final
Hackers final
 
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And Hackers
 
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threats
 
Hackers
HackersHackers
Hackers
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
Final ethical hacking
Final ethical hackingFinal ethical hacking
Final ethical hacking
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
E thical hacking
E thical hackingE thical hacking
E thical hacking
 
Hacking
HackingHacking
Hacking
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

En vedette

Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...BAgobcamp
 
Hacking the Public Presentation
Hacking the Public PresentationHacking the Public Presentation
Hacking the Public PresentationSpicer Group, Inc.
 
Martie star wars birthday
Martie star wars birthdayMartie star wars birthday
Martie star wars birthdayksmith9
 
Outlook configuration in Microsoft Office
Outlook configuration in Microsoft OfficeOutlook configuration in Microsoft Office
Outlook configuration in Microsoft OfficeFreeKaaMaal
 

En vedette (6)

Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
Agenda cultural – Lara Gorfinkiel y Fer Grenno (Secretaría General) - BAgobca...
 
Datateknik
DatateknikDatateknik
Datateknik
 
Hacking the Public Presentation
Hacking the Public PresentationHacking the Public Presentation
Hacking the Public Presentation
 
Martie star wars birthday
Martie star wars birthdayMartie star wars birthday
Martie star wars birthday
 
Outlook configuration in Microsoft Office
Outlook configuration in Microsoft OfficeOutlook configuration in Microsoft Office
Outlook configuration in Microsoft Office
 
Dhtic expo
Dhtic expoDhtic expo
Dhtic expo
 

Similaire à Hacking (20)

hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Hacking
HackingHacking
Hacking
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
HACKING
HACKINGHACKING
HACKING
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Hacking-coffee and latte
Hacking-coffee and latteHacking-coffee and latte
Hacking-coffee and latte
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking
HackingHacking
Hacking
 

Plus de Rahul Baghla

Plus de Rahul Baghla (10)

Holography
HolographyHolography
Holography
 
Sensor technology
Sensor technologySensor technology
Sensor technology
 
Lifi technology
Lifi technologyLifi technology
Lifi technology
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Computer virus
Computer virusComputer virus
Computer virus
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 

Dernier

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Dernier (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Hacking