SlideShare une entreprise Scribd logo
1  sur  29
1. Hacking
2. History Of Hacking
3. Types of Hacking
4. the Most World’s famous Hackers
5. Types Of Hackers
6. Scope Of Ethical Hackers
7. Cyber Laws for Hacking and their Punishments in Pakistan
8. How to Prevent Hacking
In 1878, just two years after the telephone was
invented by Alexander Graham Bell, a group of
teenage boys hired to run the switchboards.
The boys were more interested in knowing how the
phone system worked than in making proper
connections and directing calls to the correct place.
In essence, they were trying to "hack" the system to
see how it worked.
In the late 1950s and early 1960s, computers were
much different than the desktop or laptop systems
most people are familiar with Hacking.
1. 1960 The term “hacker” is used by MIT train
enthusiasts who hacked their train sets to change
how they work.
2. 1968 Dennis Ritchie and Keith Thompson develop
the UNIX operating system.
3. 1970s John Draper makes a long-distance call for
free by blowing a precise tone into a telephone that
tells the phone system to open a line.
4. Early 1980s the term carding has been used to
describe the practices surrounding credit card fraud.
5. ARPANET adopted TCP/IP on January 1, 1983,
and from there researchers began to assemble the
“network of networks” that became the modern
Internet.
6. 1987: Herbert Zinn, a 17-year-old high-school
student. He breaking into AT&T's computer network
after bragging about it on an electronic bulletin board.
7. 1988: Robert Morris, a 22-year-old graduate student
from Cornell University releases a self-replicating
virus on the Internet designed to exploit security holes
in UNIX systems. The virus eventually infects more
than 6,000 systems.
8. 1990: Four members of a band of hackers from the
Southeastern United States stealing the technical
specifications for BellSouth's 911 emergency telephone
network. they hack of lifting login accounts,
passwords and connect addresses for its computer
networks.
Definition:
Hacking is an attempt to exploit a
computer system or a private network
inside a computer. Simply put, it is
the unauthorized access to or control
over computer network security
systems for some illicit purpose.
A vulnerability scanner is a computer program designed to
assess computers, computer systems, networks or
applications for known weaknesses. In plain words, these
scanners are used to discover the weak points or poorly
constructed parts.
This allows the vulnerability scanner to access details of the
host operating system. It’s then able to provide detailed and
accurate information about the operating system and installed
software.
This allows the vulnerability scanner to access low-level data,
such as specific services and configuration details.
It is unable to provide detailed information about the assets
operating system and installed software.
1.Vulnerability
scanner:
i. Authenticated
Scans
ii. Unauthenticated
Scans
Password cracking is the process of recovering passwords
from data that have been stored in or transmitted by a
computer system.
A hacker uses a computer program or script to try to log in with
possible password combinations, usually starting with the
easiest-to-guess passwords.
A hacker uses a program or script to try to login by cycling
through combinations of common words. Generally, dictionary
attacks succeed because many people have a tendency to choose
passwords which are short.
2.Password
cracking:
i. Brute-force
cracking
ii. Dictionary
attacks
Definition:
A set of software tools that enable an unauthorized user to
gain control of a computer system without being detected.
I. Rootkit installation can be automated, or an attacker can
install it once they've obtained root or Administrator access.
II. Full control over a system means that existing software can
be Modified, Deleted, Copied and Blocked.
III. Rootkit detection is difficult.
IV. Removal can be complicated or practically impossible.
V. When dealing with firmware rootkits, removal may require
hardware replacement, or specialized equipment.
4.Root kit:
Definition:
A program designed to breach the security of a computer
system while performing any pre defined function.
It is a virus which is inserted into a Computer or Network to take
effect after a particular time or certain number of operations.
Trojan Horse can:
I. Delete Data
II. Block Data
III. Modify Data
5.Trojan Horse
Edward Joseph Snowden
is an American computer
professional, former Central
Intelligence Agency
employee, and former
contractor for the United
States government who
copied and leaked classified
information.
Julian Paul Assange is
an Australian computer
programmer and the
founder of WikiLeaks
an organization which
he founded in 2006. He
has won accolades
including the Sam
Adams Award.
Kevin David Mitnick is
an American computer
security consultant,
author and hacker, best
known for his high-profile
and for various computer
and communications-
related crimes
Albert Gonzalez
is an American computer
hacker and computer
criminal who is accused of
masterminding the combined
credit card theft and
subsequent reselling of more
than 170 million card and
ATM numbers.
1. Black Hat Hacker
2. Grey Hat Hacker
3. White Hat Hacker
Whenever we hear a word “Hacker”, by default we get a negative impact in our minds.
Today there will be a great Demand of ethical Hackers For internet Security purpose.
Criminal hacking is a great problem in the world.
Only Ethical hackers engage criminal hackers and fight against them to protect a internet
world.
If you are Interested in Ethical hacking for success in this field you must become a IT Security
Expert through formal or informal method.
Ethical Hacking is a complex, technical and difficult field .But
in Pakistan different Organization have need of Ethical
Hackers.
Macro IT companies.
Banks.
Financial Institutions etc.
Law enforcement Agencies also hire IT experts.
Last Five years Internet world spend 50 billions dollars for
improvement of security.
Salary
Noor Aziz Uddin
1. UPDATE OS FREQUENTLY:
Update your OS and other software frequently, if not automatically.
This keeps hackers from accessing your computer through
vulnerabilities in outdated programs.
2. DO NOT USE OPEN WIFI
Do not use open wifi; it makes it too easy for hackers to steal your
connection and download illegal files. Protect your wifi with an
encrypted password.
3. CHANGE PASSWORD FREQUENTLY:
Sensing a pattern here? Create difficult passwords and change them
frequently. In addition, never use the same passwords across multiple
services.
4. Check before you download:
Before downloading apps onto your phone or software on your
computer do some research - check what it's asking for access to (look
for apps permissions in Settings).
5. Use anti-virus software:
If you use a Windows computer you should protect it using anti-virus
software, such as AVG or Sophos.
6. Keep it private
Check the privacy settings on all of your social media accounts so that
only the people you want to share your information with can see it.
7. Beware of public mobile charging points:
It's possible to hack into a smartphone that is charging via
USB in a public place, such as an airport, cafe or on public
transport. To avoid being a victim, only plug your phone into
trusted computers when using a USB cable.
8. Be suspicious of your messages:
Never open or forward a suspicious looking email or respond
to a social media message from someone you don't know.
9. Log off, log out:
Always make sure you log out of your accounts when you’ve
finished with them and log off a computer when you’ve
finished using it.
10. Use encrypted messaging apps:
End-to-end encrypted messaging apps such as WhatsApp, iMessage
and Telegram protect your privacy by masking the contents of your
messages from would-be eavesdroppers.

Contenu connexe

Tendances

Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.Coder Tech
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 

Tendances (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking
HackingHacking
Hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Internet security
Internet securityInternet security
Internet security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Hacking
HackingHacking
Hacking
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Network security
Network securityNetwork security
Network security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similaire à Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for Hacking

Similaire à Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for Hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Hacking
HackingHacking
Hacking
 
455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hamza
HamzaHamza
Hamza
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Internet security
Internet securityInternet security
Internet security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Hacking
HackingHacking
Hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 

Dernier

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 

Dernier (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 

Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for Hacking

  • 1. 1. Hacking 2. History Of Hacking 3. Types of Hacking 4. the Most World’s famous Hackers 5. Types Of Hackers 6. Scope Of Ethical Hackers 7. Cyber Laws for Hacking and their Punishments in Pakistan 8. How to Prevent Hacking
  • 2. In 1878, just two years after the telephone was invented by Alexander Graham Bell, a group of teenage boys hired to run the switchboards. The boys were more interested in knowing how the phone system worked than in making proper connections and directing calls to the correct place. In essence, they were trying to "hack" the system to see how it worked. In the late 1950s and early 1960s, computers were much different than the desktop or laptop systems most people are familiar with Hacking.
  • 3. 1. 1960 The term “hacker” is used by MIT train enthusiasts who hacked their train sets to change how they work. 2. 1968 Dennis Ritchie and Keith Thompson develop the UNIX operating system. 3. 1970s John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line.
  • 4. 4. Early 1980s the term carding has been used to describe the practices surrounding credit card fraud. 5. ARPANET adopted TCP/IP on January 1, 1983, and from there researchers began to assemble the “network of networks” that became the modern Internet. 6. 1987: Herbert Zinn, a 17-year-old high-school student. He breaking into AT&T's computer network after bragging about it on an electronic bulletin board.
  • 5. 7. 1988: Robert Morris, a 22-year-old graduate student from Cornell University releases a self-replicating virus on the Internet designed to exploit security holes in UNIX systems. The virus eventually infects more than 6,000 systems. 8. 1990: Four members of a band of hackers from the Southeastern United States stealing the technical specifications for BellSouth's 911 emergency telephone network. they hack of lifting login accounts, passwords and connect addresses for its computer networks.
  • 6.
  • 7. Definition: Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorized access to or control over computer network security systems for some illicit purpose.
  • 8.
  • 9. A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for known weaknesses. In plain words, these scanners are used to discover the weak points or poorly constructed parts. This allows the vulnerability scanner to access details of the host operating system. It’s then able to provide detailed and accurate information about the operating system and installed software. This allows the vulnerability scanner to access low-level data, such as specific services and configuration details. It is unable to provide detailed information about the assets operating system and installed software. 1.Vulnerability scanner: i. Authenticated Scans ii. Unauthenticated Scans
  • 10. Password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A hacker uses a computer program or script to try to log in with possible password combinations, usually starting with the easiest-to-guess passwords. A hacker uses a program or script to try to login by cycling through combinations of common words. Generally, dictionary attacks succeed because many people have a tendency to choose passwords which are short. 2.Password cracking: i. Brute-force cracking ii. Dictionary attacks
  • 11. Definition: A set of software tools that enable an unauthorized user to gain control of a computer system without being detected. I. Rootkit installation can be automated, or an attacker can install it once they've obtained root or Administrator access. II. Full control over a system means that existing software can be Modified, Deleted, Copied and Blocked. III. Rootkit detection is difficult. IV. Removal can be complicated or practically impossible. V. When dealing with firmware rootkits, removal may require hardware replacement, or specialized equipment. 4.Root kit:
  • 12. Definition: A program designed to breach the security of a computer system while performing any pre defined function. It is a virus which is inserted into a Computer or Network to take effect after a particular time or certain number of operations. Trojan Horse can: I. Delete Data II. Block Data III. Modify Data 5.Trojan Horse
  • 13. Edward Joseph Snowden is an American computer professional, former Central Intelligence Agency employee, and former contractor for the United States government who copied and leaked classified information. Julian Paul Assange is an Australian computer programmer and the founder of WikiLeaks an organization which he founded in 2006. He has won accolades including the Sam Adams Award. Kevin David Mitnick is an American computer security consultant, author and hacker, best known for his high-profile and for various computer and communications- related crimes Albert Gonzalez is an American computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers.
  • 14. 1. Black Hat Hacker 2. Grey Hat Hacker 3. White Hat Hacker
  • 15.
  • 16.
  • 17.
  • 18. Whenever we hear a word “Hacker”, by default we get a negative impact in our minds. Today there will be a great Demand of ethical Hackers For internet Security purpose. Criminal hacking is a great problem in the world. Only Ethical hackers engage criminal hackers and fight against them to protect a internet world. If you are Interested in Ethical hacking for success in this field you must become a IT Security Expert through formal or informal method.
  • 19. Ethical Hacking is a complex, technical and difficult field .But in Pakistan different Organization have need of Ethical Hackers. Macro IT companies. Banks. Financial Institutions etc. Law enforcement Agencies also hire IT experts. Last Five years Internet world spend 50 billions dollars for improvement of security.
  • 21.
  • 22.
  • 23.
  • 25.
  • 26. 1. UPDATE OS FREQUENTLY: Update your OS and other software frequently, if not automatically. This keeps hackers from accessing your computer through vulnerabilities in outdated programs. 2. DO NOT USE OPEN WIFI Do not use open wifi; it makes it too easy for hackers to steal your connection and download illegal files. Protect your wifi with an encrypted password. 3. CHANGE PASSWORD FREQUENTLY: Sensing a pattern here? Create difficult passwords and change them frequently. In addition, never use the same passwords across multiple services.
  • 27. 4. Check before you download: Before downloading apps onto your phone or software on your computer do some research - check what it's asking for access to (look for apps permissions in Settings). 5. Use anti-virus software: If you use a Windows computer you should protect it using anti-virus software, such as AVG or Sophos. 6. Keep it private Check the privacy settings on all of your social media accounts so that only the people you want to share your information with can see it.
  • 28. 7. Beware of public mobile charging points: It's possible to hack into a smartphone that is charging via USB in a public place, such as an airport, cafe or on public transport. To avoid being a victim, only plug your phone into trusted computers when using a USB cable. 8. Be suspicious of your messages: Never open or forward a suspicious looking email or respond to a social media message from someone you don't know.
  • 29. 9. Log off, log out: Always make sure you log out of your accounts when you’ve finished with them and log off a computer when you’ve finished using it. 10. Use encrypted messaging apps: End-to-end encrypted messaging apps such as WhatsApp, iMessage and Telegram protect your privacy by masking the contents of your messages from would-be eavesdroppers.