SlideShare uma empresa Scribd logo
1 de 14
Hacking refers to an array of activities which are
done to intrude some one else’s personal
information space so as to use it for
malicious, unwanted purposes.
Hacking is a term used to refer to activities aimed at
exploiting security flaws to obtain critical
information for gaining access to secured networks.
•Denial of Service.
•Trojans.
•Worms.
•Virus.
•Social Engineering.
•Password cracking.
•System Failure.
•Hacking Wireless
Networks.
•Hacking Mobile
Phones.
•Spam.
•Phishing.
•Identity Theft.
•System Hacking.
•Sniffing.
•E-mail Account Hacking.
• …etc.
1. Reconnaissance : The hacker seeks to gather as much
the information as possible about a target system prior
to lunching an attack.
2. Scanning: The hacker scans the network for specific
information gathered during reconnaissance.
3. Gaining Access: Refers to the penetration phase. The
hacker exploits the vulnerability in the system.
4. Maintaining Access: The hacker tries to retain his/her
ownership of the system.
5. Covering Tracks: Refers to the activities that the
hacker does to hide his misdeeds.
Robert Morris
• Graduated at Cornell University.
• He makes the worm as an attempt to measure the
size of the internet today.
• Following its release on November 2, 1988, the
Morris worm successfully infected 6000 systems
(approximately 10 percent of computers
connected to the internet at this time).
• The worm is designed to do no harm, but due to
an error in replication algorithm, the worm can
copy itself quickly, causing excessive load.
• In 1989, he became the first person charged with
the Act of Computer Fraud and Abuse in 1986.
Kevin Mitnick
•Kevin Mitnick is probably the most famous hacker in
the history of computers.
•As a master of social engineering, Mitnick was not just
computer hacking, he also did a hack on minds of
people.
•In 1979, when he was 16 years old, he made his way to
hack into computer systems and copying paid software.
•He involves himself with the personnel
administrator, such as through a phone call or an email
message and deceive them to provide passwords and
other security information.
•After two and a half years away, Mitnick was finally
caught and jailed for five years.
•He now runs a computer security consultant, Mitnick
Linus Torvalds
•Linus Torvalds is the other white hat hacker.
•On his QL machine he made his own Text Editor
program, even he made Pac-Man clone called Cool
man.
•In 1991, he has Intel 80836 PCs and began to create
Linux, the first has a limited license in its own
name, and then joined the GNU Project under the
GNU GPL.
•Torvalds did not originally intend to continue working
to build the kernel, because he considered it as a
hobby, but then said another history, and now Linux
operating system became the most familiar with
hackers and also the most secure ever available in the
• Perform required software updates for your operating system and
web browser.
• Install a firewall on your computer.
• Change your passwords every month.
• Purchase or download anti-virus software.
• Install anti-spyware/adware programs onto your system.
• Delete emails from unknown sources.
Hacking

Mais conteúdo relacionado

Mais procurados (20)

Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
N.vinodh
N.vinodhN.vinodh
N.vinodh
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
hacking
hackinghacking
hacking
 
Hacking
HackingHacking
Hacking
 

Semelhante a Hacking

Semelhante a Hacking (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ulfah
UlfahUlfah
Ulfah
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking
HackingHacking
Hacking
 

Mais de thabetabdulla

School’s atmosphere in yemen
School’s atmosphere in yemenSchool’s atmosphere in yemen
School’s atmosphere in yementhabetabdulla
 
Processed food in america
Processed food in america Processed food in america
Processed food in america thabetabdulla
 
Fishing industry pros and cons
Fishing industry pros and consFishing industry pros and cons
Fishing industry pros and consthabetabdulla
 
Perceived obsolescence
Perceived obsolescencePerceived obsolescence
Perceived obsolescencethabetabdulla
 
Science education importance
Science education importanceScience education importance
Science education importancethabetabdulla
 

Mais de thabetabdulla (7)

School’s atmosphere in yemen
School’s atmosphere in yemenSchool’s atmosphere in yemen
School’s atmosphere in yemen
 
Processed food in america
Processed food in america Processed food in america
Processed food in america
 
My role model
My role modelMy role model
My role model
 
Fishing industry pros and cons
Fishing industry pros and consFishing industry pros and cons
Fishing industry pros and cons
 
Perceived obsolescence
Perceived obsolescencePerceived obsolescence
Perceived obsolescence
 
Color psychology
Color psychologyColor psychology
Color psychology
 
Science education importance
Science education importanceScience education importance
Science education importance
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Hacking

  • 1.
  • 2. Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes. Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
  • 3.
  • 4. •Denial of Service. •Trojans. •Worms. •Virus. •Social Engineering. •Password cracking. •System Failure. •Hacking Wireless Networks. •Hacking Mobile Phones. •Spam. •Phishing. •Identity Theft. •System Hacking. •Sniffing. •E-mail Account Hacking. • …etc.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. 1. Reconnaissance : The hacker seeks to gather as much the information as possible about a target system prior to lunching an attack. 2. Scanning: The hacker scans the network for specific information gathered during reconnaissance. 3. Gaining Access: Refers to the penetration phase. The hacker exploits the vulnerability in the system. 4. Maintaining Access: The hacker tries to retain his/her ownership of the system. 5. Covering Tracks: Refers to the activities that the hacker does to hide his misdeeds.
  • 10. Robert Morris • Graduated at Cornell University. • He makes the worm as an attempt to measure the size of the internet today. • Following its release on November 2, 1988, the Morris worm successfully infected 6000 systems (approximately 10 percent of computers connected to the internet at this time). • The worm is designed to do no harm, but due to an error in replication algorithm, the worm can copy itself quickly, causing excessive load. • In 1989, he became the first person charged with the Act of Computer Fraud and Abuse in 1986.
  • 11. Kevin Mitnick •Kevin Mitnick is probably the most famous hacker in the history of computers. •As a master of social engineering, Mitnick was not just computer hacking, he also did a hack on minds of people. •In 1979, when he was 16 years old, he made his way to hack into computer systems and copying paid software. •He involves himself with the personnel administrator, such as through a phone call or an email message and deceive them to provide passwords and other security information. •After two and a half years away, Mitnick was finally caught and jailed for five years. •He now runs a computer security consultant, Mitnick
  • 12. Linus Torvalds •Linus Torvalds is the other white hat hacker. •On his QL machine he made his own Text Editor program, even he made Pac-Man clone called Cool man. •In 1991, he has Intel 80836 PCs and began to create Linux, the first has a limited license in its own name, and then joined the GNU Project under the GNU GPL. •Torvalds did not originally intend to continue working to build the kernel, because he considered it as a hobby, but then said another history, and now Linux operating system became the most familiar with hackers and also the most secure ever available in the
  • 13. • Perform required software updates for your operating system and web browser. • Install a firewall on your computer. • Change your passwords every month. • Purchase or download anti-virus software. • Install anti-spyware/adware programs onto your system. • Delete emails from unknown sources.