Hacking is the process of attempting to gain or successfully gaining , unauthorized access to computer resources.
Hacking refers to an array of activities which are done to intrude someone else’s personal information so as to use it for malicious , unwanted purposes. Cyber Security.
2. CONTENTS
1. What is Hacking?
2. History of Hacking
3. Who is Hacker?
4. Famous Hackers in History
5. Why do Hackers Hack?
6. Types of Hacking
7. Techniques of Hacking
8. How to give a password to an account
9. What should do after hacked
10. How to secure our data
11. Advantages of Hacking
12. Disadvantages of Hacking
13. Conclusion
14. Questions
3. WHAT IS HACKING?
• The process of attempting to gain or successfully gaining ,
unauthorized access to computer resources is called
Hacking
• Hacking refers to an array of activities which are done to
intrude someone else’s personal information so as to use it
for malicious , unwanted purposes.
4. HISTORY OF HACKING
• Hacking has been part of Computing for nearly 40 years .
• First hacker emerged at MIT in 1960.
• 1960s: Interestingly, the term “hack” did not originate
from computers. Rather, it originated with MIT's Tech
Model Railroad Club way back in 1961 when club
members hacked their high-tech train sets in order to
modify their functions .
5.
6. WHO IS HACKER?
• In the computer security context , Hacker
is the one who seeks and exploits
weakness in the computer system or
computer network.
• The term Hackers is reclaimed by
computer programmers who argue that
someone who breaks into computers must
be called as Cracker.
7.
8. WHY DO HACKERS HACK?
Just for fun.
Show off.
Hack others systems secretly.
Notify many people their thought .
Steal important information.
Destroy enemy’s computer network during war.
10. WEBSITE HACKING
• Hacking a Website means taking
overall control of the website from
the website owner to the person who
hacks the website.
11. NETWORK HACKING
• Network Hacking is generally means
gathering information about domain
by using tools like Telnet, NslookUp,
Ping, Tracert, Netstat, etc. It also
includes OS Fingerprinting , Port
Scanning and Port Surfing using
various tools.
12. ETHICAL HACKING
• Ethical Hacking is where a person
hacks to find weakness in the system
and usually patches them.
• Ethical Hacking is also known as
Penetration testing, Intrusion testing,
or Red teaming.
13. EMAIL HACKING
• Email Hacking is the unauthorized access to, or manipulation
of, an email account or email correspondence.
14. PASSWORD HACKING
• Password Hacking, sometimes referred to as password
cracking, is a method of recovering passwords from data
transmitted by or stored on a computer
15. ONLINE BANKING HACKING
• Unauthorised accessing of bank accounts without the permission
of account holder is known as Online Banking Hacking.
16. COMPUTER HACKING
• Computer Hacking refers to the practice of modifying or
altering computer software and hardware to accomplish a
goal that is considered to be outside of the creator's original
objective.
• Computer Hacking is when files on the computer are
viewed, created or edited without Computer owner’s
authorization.
17. TECHNIQUES OF HACKING
1.Keylogger:
Keylogger is a simple software that records
the key sequence and strokes of your
keyboard into a log file on your machine. These
log files might even contain your personal
email IDs and passwords.
2. Denial of Service (DoSDDoS):
A Denial of Service attack is a hacking
technique to take down a site or server by
flooding that site or server with a lot of traffic
that the server is unable to process all the
requests in the real time and finally crashes
down.
18. TECHNIQUES OF HACKING
3.Waterhole Attacks: To poison a place ,in
this case, the hacker hits the most accessible
physical point of the Victim.
4. Fake WAP: Hacker uses a software to
fake a wireless access point . WAP connects to the
public place WAP. Once you get connected to the
fake WAP , Hacker can Access your data same as
in above case.
19. TECHNIQUES OF HACKING
5.Eawesdropping(Passive Attacks):
6.Phishing:
Unlike other attacks which are active in
nature, using a passive attack, a hacker just
monitors the computer systems and networks
to gain some unwanted information.
Phishing is a hacking technique using
which a hacker replicates the most-
accessed sites and traps the victim by
sending that spoofed link.
20. TECHNIQUES OF HACKING
7.Virus, Trojan etc.:
8.ClickJacking:
Virus or trojans are malicious software
programs which get installed into the victim’s
system and keeps sending the victims data to
the hacker.
ClickJacking is also known by a different
name, UI Redress. In this attack, the hacker
hides the actual UI where the victim is
supposed to click
21. TECHNIQUES OF HACKING
9.Cookies Theft:
10.Bait & Switch:
The cookies of a browser keep our personal data
such as browsing history, username, and passwords
for different sites that we access. Once the hacker
gets the access to your cookie, he can even
authenticate himself as you on a browser.
Using bait and switch hacking technique,
an attacker can buy advertising spaces on
the websites. Later, when a user clicks on
the ad, he might get directed to a page
that’s infected with malware.
22. WHAT SHOULD DO AFTER HACKED?
Shutdown the system .
Separate the system from network.
Restore the system with Backup
Reinstall all the programs
Connect the system to the network
Its better to call the police
23. HOW TO SET A PASSWORD TO YOUR ACCOUNT?
• Use unique passwords for your accounts.
• Choose a combination of letters ,numbers
and symbols to make a unique password.
24. HOW TO SECURE OUR DATA?
1 i or l
3 e
4 a
+ t
9 g
0 o
$ s
| i or l
|/| M
|| N
s z
c c
f ph
Ph f
x ks
ks x
25. ADVANTAGES OF HACKING
Hacking is quite useful in the following scenarios :
1.To recover lost information, especially in case you lost
your password.
2.To perform penetration testing to strengthen computer and
network security.
3.To put adequate preventative measures in place to prevent
security breaches.
4.To have a computer system that prevents malicious
hackers from gaining access.
26. DISADVANTAGES OF HACKING
• Hacking is quite dangerous if it is done with harmful
intent. It can cause −
1. Massive security breach.
2. Unauthorized system access on private information.
3. Privacy violation.
4. Hampering system operation.
5. Denial of service attacks.
6. Malicious attack on the system.
27. CONCLUSION
• Keep your password protected. Your password should be
combination of characters , digits, special symbols. Do
not respond to fake or phishing Email. Whenever you do
any online transaction always keep watch on site whether
the protocol of site is “https” and whether it has a lock
Symbol or not.