SlideShare uma empresa Scribd logo
1 de 13
WEB DEFACEMENT
Presented By-Vikas Pandey
CS IITM
0526CS101013
Contents:
• Definitions of Hacking
• Definition of Hacker
• Hackers And Crackers
• What is Web Defacement
• Types of Hacking
• Effect of Hacking
• How to prevent Hacking
Definition of Hacking :
• Hacking is unauthorized use of Computer and Network resources.
• Computer Hacking is the practice of modifying computer hardware and
software to accomplish a goal outside of the creator’s original purpose.
• Stealing of the data and information from someone else’s computer or
network without the prior permission of the owner.
• Breaking into someone else’s Computer System, Often on a network.
• Bypasses password or licenses in computer program.
Definition of Hacker :
• A hacker is defined as an expert computer programmer, who
breaks computer and network security and is involved in the
Process of Hacking.
• Hacker is a dedicated programming expert who believes in sharing
his expertise and experiences with other hacker.
• A hacker does not believe in vandalizing or maliciously destroying
data, or in stealing data of any kind.
Hackers And Crackers : Hackers -
• A hacker is a person intensely interested in the arcane and
recondite working of any computer operating system. Hackers are
most often programmer. As such hackers obtain advanced
knowledge of operating system and programming Language. They
might discover holes within system and the reasons for such
holes. Hackers constantly seek further knowledge , freely share
what they have discovered and never intentionally damage data.
Hackers And Crackers : Crackers -
• A Cracker is one who breaks into or otherwise violates the system
integrity of remote machines with malicious intent. Having
gained, Crackers destroy data, deny legitimate users service , or
cause problems for their target. Cracker can easily be-identified
because their actions are malicious.
What is Web Defacement :
• Website Defacement is an attack on a website that changes the
visual appearance of the site or a webpage.
• Website defacement is when a hacker compromises a web server
and changes the data on the page.
Types f Hacking :
So many types of Computer hacking are there, like………..
Password hacking
Email hacking ( yahoo,g-mail,hotmail…….)
Site hacking
Online banking Hacking
Network Hacking
Types f Hacking : Password Hacking
A password is a combination of characters that a user uses for
protecting information. Once a file or a determined section of a
hard disk is protected by a password, only those that know it can
access it.
• There are many types of password hacking like….
 Email password hacking
 Windows password hacking
 Bios password hacking
Types f Hacking : Email Hacking
Yes, almost anything can be hacked in the Internet. There are
several methods for hacking yahoo, msn email accounts.
 One of these methods is social engineering.
 Hacking yahoo messenger or any other messenger is quite easy if
you know the person’s Email ID.
Types f Hacking : Web Hacking
SQL Injection Attacks –
• Using SQL injections, attackers can:
• Add new data to the database
• Could be embarrassing to find yourself selling politically incorrect items on
an eCommerce site
• Username – 1’ or ‘1’=‘1 Password - 1’ or ‘1’=‘1
• Modify data currently in the database
• Could be very costly to have an expensive item suddenly be deeply
‘discounted’
• Perform an UPDATE in the injected SQL
Effects of Hacking :
How to prevent Hacking :
• Perform required software update for your operating system and
web browser.
• Follow good security practices on your network.
• Install a firewall on your Computer.
• Change your password every Month.
• Purchase or download anti-virus software.
• Install anti-spyware/adware programs onto your system
• Delete E-mails from unknown sources.

Mais conteúdo relacionado

Mais procurados

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 

Mais procurados (20)

Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Unit 1
Unit 1Unit 1
Unit 1
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Data breach
Data breachData breach
Data breach
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Hacking
Hacking Hacking
Hacking
 

Destaque

Cross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement TechniquesCross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement Techniques
Ronan Dunne, CEH, SSCP
 
Website Defacement Explained
Website Defacement ExplainedWebsite Defacement Explained
Website Defacement Explained
Aung Khant
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
andynova
 
Defcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hackerDefcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hacker
DefCamp
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarika
Sarika Dyne
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
tangytangling
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
Bhagya Bgk
 

Destaque (20)

Cross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement TechniquesCross Site Scripting - Web Defacement Techniques
Cross Site Scripting - Web Defacement Techniques
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Website Defacement Explained
Website Defacement ExplainedWebsite Defacement Explained
Website Defacement Explained
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
 
Defcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hackerDefcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hacker
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarika
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking Psychology
Hacking PsychologyHacking Psychology
Hacking Psychology
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Introduction to Growth Hacking
Introduction to Growth HackingIntroduction to Growth Hacking
Introduction to Growth Hacking
 
Hacking
HackingHacking
Hacking
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Tracing an email by Amin Pathan
Tracing an email by Amin PathanTracing an email by Amin Pathan
Tracing an email by Amin Pathan
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 

Semelhante a Web defacement

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
BilmyRikas
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
sumita02
 

Semelhante a Web defacement (20)

How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 
ethicalhacking1 final.pdf
ethicalhacking1 final.pdfethicalhacking1 final.pdf
ethicalhacking1 final.pdf
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Computer security
Computer securityComputer security
Computer security
 
Hacking 2018
Hacking 2018Hacking 2018
Hacking 2018
 
Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf file
 
hackers.pptx
hackers.pptxhackers.pptx
hackers.pptx
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Hacking
HackingHacking
Hacking
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 

Último

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Web defacement

  • 1. WEB DEFACEMENT Presented By-Vikas Pandey CS IITM 0526CS101013
  • 2. Contents: • Definitions of Hacking • Definition of Hacker • Hackers And Crackers • What is Web Defacement • Types of Hacking • Effect of Hacking • How to prevent Hacking
  • 3. Definition of Hacking : • Hacking is unauthorized use of Computer and Network resources. • Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. • Stealing of the data and information from someone else’s computer or network without the prior permission of the owner. • Breaking into someone else’s Computer System, Often on a network. • Bypasses password or licenses in computer program.
  • 4. Definition of Hacker : • A hacker is defined as an expert computer programmer, who breaks computer and network security and is involved in the Process of Hacking. • Hacker is a dedicated programming expert who believes in sharing his expertise and experiences with other hacker. • A hacker does not believe in vandalizing or maliciously destroying data, or in stealing data of any kind.
  • 5. Hackers And Crackers : Hackers - • A hacker is a person intensely interested in the arcane and recondite working of any computer operating system. Hackers are most often programmer. As such hackers obtain advanced knowledge of operating system and programming Language. They might discover holes within system and the reasons for such holes. Hackers constantly seek further knowledge , freely share what they have discovered and never intentionally damage data.
  • 6. Hackers And Crackers : Crackers - • A Cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained, Crackers destroy data, deny legitimate users service , or cause problems for their target. Cracker can easily be-identified because their actions are malicious.
  • 7. What is Web Defacement : • Website Defacement is an attack on a website that changes the visual appearance of the site or a webpage. • Website defacement is when a hacker compromises a web server and changes the data on the page.
  • 8. Types f Hacking : So many types of Computer hacking are there, like……….. Password hacking Email hacking ( yahoo,g-mail,hotmail…….) Site hacking Online banking Hacking Network Hacking
  • 9. Types f Hacking : Password Hacking A password is a combination of characters that a user uses for protecting information. Once a file or a determined section of a hard disk is protected by a password, only those that know it can access it. • There are many types of password hacking like….  Email password hacking  Windows password hacking  Bios password hacking
  • 10. Types f Hacking : Email Hacking Yes, almost anything can be hacked in the Internet. There are several methods for hacking yahoo, msn email accounts.  One of these methods is social engineering.  Hacking yahoo messenger or any other messenger is quite easy if you know the person’s Email ID.
  • 11. Types f Hacking : Web Hacking SQL Injection Attacks – • Using SQL injections, attackers can: • Add new data to the database • Could be embarrassing to find yourself selling politically incorrect items on an eCommerce site • Username – 1’ or ‘1’=‘1 Password - 1’ or ‘1’=‘1 • Modify data currently in the database • Could be very costly to have an expensive item suddenly be deeply ‘discounted’ • Perform an UPDATE in the injected SQL
  • 13. How to prevent Hacking : • Perform required software update for your operating system and web browser. • Follow good security practices on your network. • Install a firewall on your Computer. • Change your password every Month. • Purchase or download anti-virus software. • Install anti-spyware/adware programs onto your system • Delete E-mails from unknown sources.