SlideShare a Scribd company logo
1 of 10
WHAT IS HACKING?
• Hacking often refers to the unauthorized intrusion into a
network or computer; normally carried out by one or more
“hackers.” However, a hacker can be anyone. They can
be an individual like you or me. They can work solo or be
employed by an organization that has the motive to
disrupt something or cause havoc––unnecessarily. Often,
they look to alter security systems to achieve their goal,
which differs from the actual purpose of the system.
WHY HACK?
• PROFIT
• -Information can be sold
• -Information can be used to steal
• PROTEST
• -Hactivism : A Hacktivist is someone utilized technology to
announce a social, ideological, religious or political message.
• CHALLANGE
• - Fun , problem - solvingskill, the thrill of power
EFFECTS OF HACKING
• Damage to information
• Theft of information
- Credit card details , social security numbers, identity fraud, email addressed
• Compromise/damage of system
• Use of victim machines as “zombies”
• Businesses may suffer from damage reputation and lawsuits
• Business secrets could be stolen and sold to competitors
• Computing system/ infrastucture could suffer from performance degrading as the
resources used for malicious activites
TYPES OF HACKER
White, black, and grey refer to the relationship between the
hacker and the systems they are attacking.
Black Hat’ Hackers
A black-hat hacker is an individual who attempts to gain
unauthorized entry into a system or network to exploit them for
malicious reasons. The black-hat hacker does not have any
permission or authority to compromise their targets. They try to
inflict damage by compromising security systems, altering
functions of websites and networks, or shutting down systems.
They often do so to steal or gain access to passwords, financial
information, and other personal data.
TYPES OF HACKER
‘White Hat’ Hackers
White-hat hackers, on the other hand, are deemed to be the good guys, working
with organizations to strengthen the security of a system. A white hat has
permission to engage the targets and to compromise them within the prescribed
rules of engagement.
They are often referred to as ethical hackers. This individual specializes in ethical
hacking tools, techniques, and methodologies to secure an organization’s
information systems.
Unlike black-hat hackers, ethical hackers exploit security networks and look for
backdoors when they are legally permitted to do so. White-hat hackers always
disclose every vulnerability they find in the company’s security system so that it can
be fixed before they are being exploited by malicious actors.
TYPES OF HACKER
‘Grey Hat’ Hackers
Grey hats exploit networks and computer systems in the
way that black hats do, but do so without any malicious
intent, disclosing all loopholes and vulnerabilities to law
enforcement agencies or intelligence agencies.
Usually, grey-hat hackers surf the net and hack into
computer systems to notify the administrator or the owner
that their system/network contains one or more
vulnerabilities that must be fixed immediately. Grey hats
may also extort the hacked, offering to correct the defect
for a nominal fee.
TYPES OF ATTACKS
 Password Cracking Attacks
 Network Attacks
 Man-in-the-middle Attcks
 Identity Spoofing
 Interception
 Eacesdropping
 Backdoor Attacks and many more..
HOW TO HACK?
• Many of the hacking tools and guides are available on
the internet
• BackTrack is a Linux distro with many tools :
Metasploits, SQL map Nmap, Ophcrack, Wireshark,
Hydra and many more
• The real reason for BackTrack development are for
digital forensics and penetration testing
KALI LINUX
Kali Linux is an open source project that is maintained and funded by Offensive
Security, a provider of world-class information security training and penetration
testing services. In addition to Kali Linux, Offensive Security also maintains the
Exploit Database and the free online course, Metasploit Unleashed.
 DOWNLOAD VIRTUAL MACHINE : -
https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-
download/#1572305786515-43ed3ee1-b9c8
THANK YOU

More Related Content

What's hot (20)

Cyber crime1 vaibhavi
Cyber crime1 vaibhaviCyber crime1 vaibhavi
Cyber crime1 vaibhavi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
About hackers
About hackersAbout hackers
About hackers
 
Hacking
HackingHacking
Hacking
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
 
Hacking
HackingHacking
Hacking
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
Hackers ESP
Hackers ESPHackers ESP
Hackers ESP
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Similar to Intro

hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptxAlefya1
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackersinfosavvy
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2mubeenm50
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016 arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationMidhun
 

Similar to Intro (20)

hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Hacking
HackingHacking
Hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Hacking
HackingHacking
Hacking
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Hackers
HackersHackers
Hackers
 
Hacking
HackingHacking
Hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 

More from Kalkey

Docker swarm
Docker swarmDocker swarm
Docker swarmKalkey
 
Docker advance topic (2)
Docker advance topic (2)Docker advance topic (2)
Docker advance topic (2)Kalkey
 
Docker introduction (1)
Docker introduction (1)Docker introduction (1)
Docker introduction (1)Kalkey
 
Sonarqube
SonarqubeSonarqube
SonarqubeKalkey
 
Introduction of tomcat
Introduction of tomcatIntroduction of tomcat
Introduction of tomcatKalkey
 
Jenkins advance topic
Jenkins advance topicJenkins advance topic
Jenkins advance topicKalkey
 
Jenkins introduction
Jenkins introductionJenkins introduction
Jenkins introductionKalkey
 
Terraform day 3
Terraform day 3Terraform day 3
Terraform day 3Kalkey
 
Terraform day 2
Terraform day 2Terraform day 2
Terraform day 2Kalkey
 
Terraform day 1
Terraform day 1Terraform day 1
Terraform day 1Kalkey
 
Ansible day 3
Ansible day 3Ansible day 3
Ansible day 3Kalkey
 
Cloud computing 1
Cloud computing  1Cloud computing  1
Cloud computing 1Kalkey
 
Shell programming 2
Shell programming 2Shell programming 2
Shell programming 2Kalkey
 
Adnible day 2.ppt
Adnible day   2.pptAdnible day   2.ppt
Adnible day 2.pptKalkey
 
Shell programming 1.ppt
Shell programming  1.pptShell programming  1.ppt
Shell programming 1.pptKalkey
 
Debasihish da final.ppt
Debasihish da final.pptDebasihish da final.ppt
Debasihish da final.pptKalkey
 
Linux day 3ppt
Linux day 3pptLinux day 3ppt
Linux day 3pptKalkey
 
Ansible day 1.ppt
Ansible day 1.pptAnsible day 1.ppt
Ansible day 1.pptKalkey
 
Linux day 2.ppt
Linux day  2.pptLinux day  2.ppt
Linux day 2.pptKalkey
 

More from Kalkey (20)

Docker swarm
Docker swarmDocker swarm
Docker swarm
 
Docker advance topic (2)
Docker advance topic (2)Docker advance topic (2)
Docker advance topic (2)
 
Docker introduction (1)
Docker introduction (1)Docker introduction (1)
Docker introduction (1)
 
Nexus
NexusNexus
Nexus
 
Sonarqube
SonarqubeSonarqube
Sonarqube
 
Introduction of tomcat
Introduction of tomcatIntroduction of tomcat
Introduction of tomcat
 
Jenkins advance topic
Jenkins advance topicJenkins advance topic
Jenkins advance topic
 
Jenkins introduction
Jenkins introductionJenkins introduction
Jenkins introduction
 
Terraform day 3
Terraform day 3Terraform day 3
Terraform day 3
 
Terraform day 2
Terraform day 2Terraform day 2
Terraform day 2
 
Terraform day 1
Terraform day 1Terraform day 1
Terraform day 1
 
Ansible day 3
Ansible day 3Ansible day 3
Ansible day 3
 
Cloud computing 1
Cloud computing  1Cloud computing  1
Cloud computing 1
 
Shell programming 2
Shell programming 2Shell programming 2
Shell programming 2
 
Adnible day 2.ppt
Adnible day   2.pptAdnible day   2.ppt
Adnible day 2.ppt
 
Shell programming 1.ppt
Shell programming  1.pptShell programming  1.ppt
Shell programming 1.ppt
 
Debasihish da final.ppt
Debasihish da final.pptDebasihish da final.ppt
Debasihish da final.ppt
 
Linux day 3ppt
Linux day 3pptLinux day 3ppt
Linux day 3ppt
 
Ansible day 1.ppt
Ansible day 1.pptAnsible day 1.ppt
Ansible day 1.ppt
 
Linux day 2.ppt
Linux day  2.pptLinux day  2.ppt
Linux day 2.ppt
 

Recently uploaded

Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

Intro

  • 1. WHAT IS HACKING? • Hacking often refers to the unauthorized intrusion into a network or computer; normally carried out by one or more “hackers.” However, a hacker can be anyone. They can be an individual like you or me. They can work solo or be employed by an organization that has the motive to disrupt something or cause havoc––unnecessarily. Often, they look to alter security systems to achieve their goal, which differs from the actual purpose of the system.
  • 2. WHY HACK? • PROFIT • -Information can be sold • -Information can be used to steal • PROTEST • -Hactivism : A Hacktivist is someone utilized technology to announce a social, ideological, religious or political message. • CHALLANGE • - Fun , problem - solvingskill, the thrill of power
  • 3. EFFECTS OF HACKING • Damage to information • Theft of information - Credit card details , social security numbers, identity fraud, email addressed • Compromise/damage of system • Use of victim machines as “zombies” • Businesses may suffer from damage reputation and lawsuits • Business secrets could be stolen and sold to competitors • Computing system/ infrastucture could suffer from performance degrading as the resources used for malicious activites
  • 4. TYPES OF HACKER White, black, and grey refer to the relationship between the hacker and the systems they are attacking. Black Hat’ Hackers A black-hat hacker is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. The black-hat hacker does not have any permission or authority to compromise their targets. They try to inflict damage by compromising security systems, altering functions of websites and networks, or shutting down systems. They often do so to steal or gain access to passwords, financial information, and other personal data.
  • 5. TYPES OF HACKER ‘White Hat’ Hackers White-hat hackers, on the other hand, are deemed to be the good guys, working with organizations to strengthen the security of a system. A white hat has permission to engage the targets and to compromise them within the prescribed rules of engagement. They are often referred to as ethical hackers. This individual specializes in ethical hacking tools, techniques, and methodologies to secure an organization’s information systems. Unlike black-hat hackers, ethical hackers exploit security networks and look for backdoors when they are legally permitted to do so. White-hat hackers always disclose every vulnerability they find in the company’s security system so that it can be fixed before they are being exploited by malicious actors.
  • 6. TYPES OF HACKER ‘Grey Hat’ Hackers Grey hats exploit networks and computer systems in the way that black hats do, but do so without any malicious intent, disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies. Usually, grey-hat hackers surf the net and hack into computer systems to notify the administrator or the owner that their system/network contains one or more vulnerabilities that must be fixed immediately. Grey hats may also extort the hacked, offering to correct the defect for a nominal fee.
  • 7. TYPES OF ATTACKS  Password Cracking Attacks  Network Attacks  Man-in-the-middle Attcks  Identity Spoofing  Interception  Eacesdropping  Backdoor Attacks and many more..
  • 8. HOW TO HACK? • Many of the hacking tools and guides are available on the internet • BackTrack is a Linux distro with many tools : Metasploits, SQL map Nmap, Ophcrack, Wireshark, Hydra and many more • The real reason for BackTrack development are for digital forensics and penetration testing
  • 9. KALI LINUX Kali Linux is an open source project that is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. In addition to Kali Linux, Offensive Security also maintains the Exploit Database and the free online course, Metasploit Unleashed.  DOWNLOAD VIRTUAL MACHINE : - https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image- download/#1572305786515-43ed3ee1-b9c8