Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 30

HACKING

Presented By…
Rajan.Mrug
6th IT-(Roll No:-6037)
12/08/21
HACKING

Definition Of Hacking.
 The opposite word of security is known as
hacking, generally breaking of computer
security is known as Hacking.
 e.g use another’s email id by hacking
their password.
 Every man made systems have a loop
hole so that we can break the security by
the technique of hacking.
 Hacking requires long time period.

12/08/21
HACKING

Conti.....
 First step of hacking is to study on the
target.
 Then understand the security of the
target.
 Then find out the loop holes on the
security.
 Then the last step is to break the
security.
 so that hacking is crime.

12/08/21
HACKING

What is Ethical hacking?


 Ethical hacking is also a opposite word of
Hacking.
 Work of ethical hacking is also to break
the system but by the taking of
permission.
 Generally it is a technique which is used
by the big organization to find the faults or
loop hole on their security system.
 so that it is not illegal.

12/08/21
HACKING

Define Hacker..
 Hackers are those computer experts who
know many different computer languages,
software and tools.
 A person who can break computer security
easily.
 Hackers are very powerful in computer
programming.
 Hacker always trying to work in opposite on
technology.
12/08/21
HACKING

Types of Hacker.
 Main types of
hackers are given
hare.
 White hat Hacker
 Black hat Hacker
 Grey hat Hacker
 Script kiddies
 Carders
 Phishers
 Spammers

12/08/21
HACKING

White hat Hacker


 White hacker is one
type of Ethical
hacker.
 we always think
that hackers are bad
but we don’t know
the the real mean of
hacker
 Ethical hacker have
a legal permission of
hacking.

12/08/21
HACKING

Conti…
 In 1970’s the group of white hat hacker
are created, and it is known as Tiger
team.
 They give permission to break the
network security.
 Many big companies invite the ethical
hacker to check their network security

12/08/21
HACKING

Some white hat hacker


 Tim Berners-Lee Linus Torvalds

12/08/21
HACKING

Black hat Hacker


 Black hat hackers
are also known as
cracker .
 Crackers misuses
their knowledge.
 They do that for
money, fun or
experiment.
 They expands virus
by the internet.

12/08/21
HACKING

Some black hat Hacker


 Jonathan James Kevin Mitnick

12/08/21
HACKING

Gray hat Hacker


 This works on both
side either legally
or illegally.
 BHH works for
money, fun or
political reasons
but gray hat
hacker works for
the purpose of
research
12/08/21
HACKING

Script Kiddies
 Script kiddies uses automatic tools for
hacking.
 This type of hackers are expanding in
cyber world.
 Script kiddies work for money and
statues.
 They hack by the use of tools so that they
have not an exact idea of hacking.
 they uses the technology in illegal way.

12/08/21
HACKING

Carders
 Carders are expert in shopping with the
use of illegal credit cards and bank
account.
 First BHH or Script kiddies hack user
detail by the phishing and than they sell to
the carders community.
 Carders have no idea about hacking but
they can buy online anything by hiding
their identity.

12/08/21
HACKING

Phishers
 The another
community of
script kiddies is
Phishers.
 The main purpose
of it is hacking of
email and bank
accounts.

12/08/21
HACKING

Spammers
 The main purpose
of spammer is to
send the fake
messages.
 Spammers buy the
dump of email
from the hackers.
 Then they send
fake emails or
page on these
mails.
12/08/21
HACKING

Knowledge
 Hacker uses lots of tools, software and
programming language.
 Knowledge of prog language like C,C++,
PERL, JAVA, ASP.NET, RUBY, PYTHON etc.
 Ability to use of all operating systems.
 They must have ability for the use of
readymade hacking tool so that they can
make easy their hacking.

12/08/21
HACKING

Hacker attacks
 Spoofing Attack
 Online fraud and phishing
 Brute force Attack
 Spamming Attack
 Hoaxes
 Identity theft
 DOS Attack

12/08/21
HACKING

Spoofing attack
 In spoofing attack hacker confused the
target, various types of spoofing available
like MAC address, email, call, sms, ip,
webcam etc..
 In spoofing hackers uses social
engineering.
 They uses another’s resource for their
purpose like mailing anyone as a company
owner.

12/08/21
HACKING

Online fraud and phishing


 In phishing attack
hacker creates any
web page’s dummy
page.
 This page shows
like a real website
page.
 For this hacker
uses free hosting
web sites.
12/08/21
HACKING

Brute force attack


 In this method hacker creates their own
programs, in this he loads their text file.
 In this text file hacker puts as possible
words then with the use of this
programme he applies username and
password in the website.
 Brute forcing technique require lots of
time.
 Tools Brutus, Obivan

12/08/21
HACKING

Spamming attack
 Specially
spamming attack
occurs due to
spammers.
 In spamming
attack spammers
send lots of emails
to the users.
 Spam filter.

12/08/21
HACKING

Hoaxes
 Hoax is nothing but
a one type of
spam.
 Hoax have an
email with wrong
information.

12/08/21
HACKING

Identity theft
 Identity theft is a
one type of crime.
 Here hacker uses
chat rooms and
puts trojan horse
in your computer.
 With the use of
trojan they install
key logger.

12/08/21
HACKING

DOS attack
 Denial of service
attack
 It is very powerful
attack.
 With the use of this
attack hacker
sends a lots of
traffic on any web
server and down
the web site.

12/08/21
HACKING

Online safety tips


 Never reveal personal information online.
 Never share your password with other
people.
 Never arrange meeting with stranger.
 Don’t believe everything you read or see
online.
 Don’t respond to inappropriate message or
email.
 Be leery of personal questions from
strangers.

12/08/21
HACKING

Conti…
 Turn on windows internet firewall.
 Use automatic updates to keep software up-
to-date.
 Install and maintain antivirus software.
 Install and maintain antispyware software.
 Use the read “X” to close pop-ups.
 Think before you click.

12/08/21
HACKING

Study on faults
 http://www.packetstormsecurity.org
 http://www.securityfocus.com
 http://www.securitytracker.com
 http://www.securiteam.com

12/08/21
HACKING

12/08/21
HACKING

12/08/21

You might also like