Professional Documents
Culture Documents
Presented by Rajan - Mrug 6 IT - (Roll No:-6037) : Hacking
Presented by Rajan - Mrug 6 IT - (Roll No:-6037) : Hacking
Presented By…
Rajan.Mrug
6th IT-(Roll No:-6037)
12/08/21
HACKING
Definition Of Hacking.
The opposite word of security is known as
hacking, generally breaking of computer
security is known as Hacking.
e.g use another’s email id by hacking
their password.
Every man made systems have a loop
hole so that we can break the security by
the technique of hacking.
Hacking requires long time period.
12/08/21
HACKING
Conti.....
First step of hacking is to study on the
target.
Then understand the security of the
target.
Then find out the loop holes on the
security.
Then the last step is to break the
security.
so that hacking is crime.
12/08/21
HACKING
12/08/21
HACKING
Define Hacker..
Hackers are those computer experts who
know many different computer languages,
software and tools.
A person who can break computer security
easily.
Hackers are very powerful in computer
programming.
Hacker always trying to work in opposite on
technology.
12/08/21
HACKING
Types of Hacker.
Main types of
hackers are given
hare.
White hat Hacker
Black hat Hacker
Grey hat Hacker
Script kiddies
Carders
Phishers
Spammers
12/08/21
HACKING
12/08/21
HACKING
Conti…
In 1970’s the group of white hat hacker
are created, and it is known as Tiger
team.
They give permission to break the
network security.
Many big companies invite the ethical
hacker to check their network security
12/08/21
HACKING
12/08/21
HACKING
12/08/21
HACKING
12/08/21
HACKING
Script Kiddies
Script kiddies uses automatic tools for
hacking.
This type of hackers are expanding in
cyber world.
Script kiddies work for money and
statues.
They hack by the use of tools so that they
have not an exact idea of hacking.
they uses the technology in illegal way.
12/08/21
HACKING
Carders
Carders are expert in shopping with the
use of illegal credit cards and bank
account.
First BHH or Script kiddies hack user
detail by the phishing and than they sell to
the carders community.
Carders have no idea about hacking but
they can buy online anything by hiding
their identity.
12/08/21
HACKING
Phishers
The another
community of
script kiddies is
Phishers.
The main purpose
of it is hacking of
email and bank
accounts.
12/08/21
HACKING
Spammers
The main purpose
of spammer is to
send the fake
messages.
Spammers buy the
dump of email
from the hackers.
Then they send
fake emails or
page on these
mails.
12/08/21
HACKING
Knowledge
Hacker uses lots of tools, software and
programming language.
Knowledge of prog language like C,C++,
PERL, JAVA, ASP.NET, RUBY, PYTHON etc.
Ability to use of all operating systems.
They must have ability for the use of
readymade hacking tool so that they can
make easy their hacking.
12/08/21
HACKING
Hacker attacks
Spoofing Attack
Online fraud and phishing
Brute force Attack
Spamming Attack
Hoaxes
Identity theft
DOS Attack
12/08/21
HACKING
Spoofing attack
In spoofing attack hacker confused the
target, various types of spoofing available
like MAC address, email, call, sms, ip,
webcam etc..
In spoofing hackers uses social
engineering.
They uses another’s resource for their
purpose like mailing anyone as a company
owner.
12/08/21
HACKING
12/08/21
HACKING
Spamming attack
Specially
spamming attack
occurs due to
spammers.
In spamming
attack spammers
send lots of emails
to the users.
Spam filter.
12/08/21
HACKING
Hoaxes
Hoax is nothing but
a one type of
spam.
Hoax have an
email with wrong
information.
12/08/21
HACKING
Identity theft
Identity theft is a
one type of crime.
Here hacker uses
chat rooms and
puts trojan horse
in your computer.
With the use of
trojan they install
key logger.
12/08/21
HACKING
DOS attack
Denial of service
attack
It is very powerful
attack.
With the use of this
attack hacker
sends a lots of
traffic on any web
server and down
the web site.
12/08/21
HACKING
12/08/21
HACKING
Conti…
Turn on windows internet firewall.
Use automatic updates to keep software up-
to-date.
Install and maintain antivirus software.
Install and maintain antispyware software.
Use the read “X” to close pop-ups.
Think before you click.
12/08/21
HACKING
Study on faults
http://www.packetstormsecurity.org
http://www.securityfocus.com
http://www.securitytracker.com
http://www.securiteam.com
12/08/21
HACKING
12/08/21
HACKING
12/08/21