SlideShare a Scribd company logo
1 of 28
GOOD AFTERNOON
A
PRESENTATION
ON
HACKINGBY
OLANREWAJUGEORGEBABATUNDE
OUTLINE:
WHAT IS HACKING?
WHO IS AN HACKER?
HISTORY OF HACKING
TYPES OF HACKING
HACKING TECHNIQUES
HACKING TOOLS
WHAT CAN BE HACKED?
CERTIFICATIONS IN HACKING
HOW HACKING ATTACK WORKS
EFFECTS OF HACKING
PREVENTION AND DETECTION OF HACKING
CONCLUSION
Hacking is an activity that is engaged in by
people who use their knowledge of the internet,
computers, firewalls and security preferences to
break into other people's computers, allowing
them to view private information, alter data and
steal files, information or programs.
In computer networking, hacking is any
technical effort to manipulate the normal
behavior of network connections and connected
systems.
WHAT IS
HACKING
WHO IS AN
HACKER
In computer security and everyday
language, a hacker is someone who
breaks into computers and computer
networks. A hacker is an individual that
attempts to take control over someone
else's computer by using viruses,
worms, and other types of Internet
attacks.
DAWN OF HACKING
M.I.T. engineers in the 1960s first
popularized the term and concept
of HACKING. The so-called "hacks"
perpetrated by these hackers were
intended to be harmless technical
experiments and fun learning
activities.
Password cracking: The process of recovering
passwords from data that has been stored in or
transmitted by a computer system.
Spoofing attack (Phishing):One program or
website successfully masquerading as another by
falsifying data and thereby being treated as a trusted
system by a user .
Rootkit: A Rootkit is designed to conceal the
compromise of a computer's security.
TYPES OF
HACKING
Trojan horses: A program which seems to be doing
one thing, but is actually doing another. A Trojan horse
can be used to set up a backdoor
Viruses: A self-replicating program that spreads by
inserting copies of itself into other executable code or
documents .Some viruses are considered malicious.
Worms: A worm is also a self-replicating program. A
worm differs from a virus in that it propagates through
computer networks without user intervention.
TYPES OF
HACKING CONT’D
LEGAL HACKERS
ILLEGAL HACKERS
TYPES OF
HACKERS
TYPES OF
HACKERS LEGAL HACKERS
White hat
Breaks security for non-malicious reasons,
for instance testing their own security
system. Also includes individuals who
perform penetration tests and vulnerability
assessments within a contractual
agreement. Often, this type of 'white hat'
hacker is called an ETHICAL HACKER.
TYPES OF
HACKERS ILLEGAL HACKERS
Black hat
Break into secure networks to destroy data or make the
network unusable for those who are authorized to use
the network.
Script kiddie
A non-expert who breaks into computer systems by
using pre-packaged automated tools written by others.
Elite hacker
A social status among hackers, elite is used to describe
the most skilled. Newly discovered exploits will circulate
among these hackers.
SOURCE:NELLY DAY, www.ehow.com
August 2012
HACKING
TECHNIQUES
DENIAL of SERVICE (DoS)
Give hackers a way to bring down a network without
gaining internal access by flooding the access routers
with bogus traffic causing the network to slow down or
shut down . Using a third party (Transmission Control
Protocol(TCP) or packets).
SOCIAL ENGINEERING
Is the act of manipulation and the skill of exploiting
human weakness, into performing actions or divulging
confidential information rather than by using technical
cracking techniques
Dictionary attack
A dictionary file is loaded into a cracking application
which is run against user accounts located by the
application.
Hybrid attack
Add numbers or symbols to the filename to crack a
password. Many people change their passwords by
simply adding a number to the end of their current
password
Brute force attack
A comprehensive form of attack, often take a long time
to work depending on the complexity of the password.
HACKING
TECHNIQUES
SOURCE:NELLY DAY, www.ehow.com
N map:(Network Mapper) A tool designed to rapidly scan
large networks, uses raw IP packets in novel ways to determine
what hosts are available on the network
Cain and Abel: A password recovery tool. It allows easy
recovery of various kind of passwords by sniffing the network,
cracking encrypted passwords.
Key loggers: A tool designed to record every keystroke on
an affected machine for later retrieval. Its purpose is usually to
allow the user of this tool to gain access to confidential
information typed on the affected machine
HACKING
TOOLS
WHAT CAN
BE HACKED
Basically anything can be hacked as long as it has
vulnerabilities examples include;
Networks
Servers
Personal computers
ATM’S
Dispenser machines
Websites
Mobile phones
Government
Organizations….etc.
CEH Certification
A CERTIFIED ETHICAL HACKER is a skilled professional who
understands and knows how to look for the weaknesses and
vulnerabilities in target systems and uses the same knowledge
and tools as a malicious hacker .To achieve the Certified Ethical
Hacker Certification, you must pass the CEH exam 312-50
CHFI Certification
COMPUTER HACKING FORENSIC INVESTIGATION is the process of
detecting hacking attacks and properly extracting evidence to
report the crime and conduct audits to prevent future attacks.
The CHFI certification is awarded after successfully passing the
exam EC0 312-49.
INTERNATIONAL COUNCIL OF ELECTRONIC COMMERCE CONSULTANTS(ICECC)
CERTIFICATIONS IN
HACKING
HACKING IN ORGANISATIONS
mcmaster.ca
SOURCE:NELLY DAY, www.ehow.com
HOW HACKING
ATTACK WORKS
The first thing an hacker does on gaining
access to you is to install a Rootkit to
facilitate durable influence on your system .
Using these to create new accounts or
networks. Then he tries to obscure his
presence, surveys the network then tries to
carry out his devious act. He then creates a
backdoor he can always use to have access
to your system. The hacker may use a third
party to hack into you .
BOTNETWORK
EFFECTS OF HACKING
Denial of Service (DoS)
Exploitation
Sales Losses
Defacement (websites)
Data Loss
Remote File Execution
Network Traffic
Loss of Control
Additional Cost
Fraud…. etc.
PREVENTION AND DETECTION
OF HACKING
SECURITY AWARENESS
Is the knowledge and attitude members of an
organization possess regarding the protection of the
physical and especially information asset of the
organization. These include the following:
Physical security
Desktop security
Networks security(Cyber security)
Password security
Antiviruses
Antispyware's
E-mail security
Firewall
Security software called intrusion
detection systems may be used in
computers to detect unusual and suspicious
activity and, in some cases, stop a variety of
harmful actions by authorized or
unauthorized persons. Abuse and misuse of
sensitive system and application programs
and data such as password, inventory,
financial, engineering, and personnel files
can be detected by these systems.
Microsoft®Encarta®2009.©
INTRUSION DETECTION SYSTEMS
CONCLUSION
The question therefore is, is Hacking a
crime?
From the afore discussion its obvious
hacking(illegal hacking) is a CRIME.
Hacking can be prevented or minimized if
proper security measures and computer
ethics are adhered to.
Therefore be careful not to get hacked
because this can be detrimental.
Thank you

More Related Content

What's hot (20)

Hacking
HackingHacking
Hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Hacking
HackingHacking
Hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Hacking and Anti Hacking
Hacking and Anti HackingHacking and Anti Hacking
Hacking and Anti Hacking
 
Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
 
Web defacement
Web defacementWeb defacement
Web defacement
 

Viewers also liked

What is hacking | Types of Hacking
What is hacking | Types of HackingWhat is hacking | Types of Hacking
What is hacking | Types of HackingGOPCSOFT
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hackingSainath Volam
 
Evaporation New Template
Evaporation New TemplateEvaporation New Template
Evaporation New Templatedloschiavo
 
AMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKSAMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKSMarc Jones
 
Soil Steady-State Evaporation
Soil Steady-State EvaporationSoil Steady-State Evaporation
Soil Steady-State EvaporationMorteza Sadeghi
 
Water evaporation reduction from lakes
Water evaporation reduction from lakesWater evaporation reduction from lakes
Water evaporation reduction from lakesguestb311d8
 
CFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation ApproachCFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation ApproachAli Abbasi
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profitDavid Stockton
 
hacking and its types
hacking and its typeshacking and its types
hacking and its typesBharath Reddy
 

Viewers also liked (20)

Hacking Movable Type
Hacking Movable TypeHacking Movable Type
Hacking Movable Type
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
What is hacking | Types of Hacking
What is hacking | Types of HackingWhat is hacking | Types of Hacking
What is hacking | Types of Hacking
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Hacking
HackingHacking
Hacking
 
Evaporation
EvaporationEvaporation
Evaporation
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Evaporation New Template
Evaporation New TemplateEvaporation New Template
Evaporation New Template
 
AMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKSAMAZING COMPUTER TRICKS
AMAZING COMPUTER TRICKS
 
Science - Evaporation
Science - EvaporationScience - Evaporation
Science - Evaporation
 
Soil Steady-State Evaporation
Soil Steady-State EvaporationSoil Steady-State Evaporation
Soil Steady-State Evaporation
 
Group 4 (evaporation)
Group 4 (evaporation)Group 4 (evaporation)
Group 4 (evaporation)
 
Water evaporation reduction from lakes
Water evaporation reduction from lakesWater evaporation reduction from lakes
Water evaporation reduction from lakes
 
CFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation ApproachCFD-based Evaporation Estimation Approach
CFD-based Evaporation Estimation Approach
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profit
 
Evaporation 4 slides
Evaporation 4 slidesEvaporation 4 slides
Evaporation 4 slides
 
hacking and its types
hacking and its typeshacking and its types
hacking and its types
 
Evaporation
EvaporationEvaporation
Evaporation
 
Evaporation Rates
Evaporation RatesEvaporation Rates
Evaporation Rates
 
Evaporation
EvaporationEvaporation
Evaporation
 

Similar to my new HACKING

PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hackingBeing Uniq Sonu
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationMidhun
 

Similar to my new HACKING (20)

PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
EthicalHacking.pptx
EthicalHacking.pptxEthicalHacking.pptx
EthicalHacking.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptxCYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptx
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 

my new HACKING

  • 3. OUTLINE: WHAT IS HACKING? WHO IS AN HACKER? HISTORY OF HACKING TYPES OF HACKING HACKING TECHNIQUES HACKING TOOLS WHAT CAN BE HACKED? CERTIFICATIONS IN HACKING HOW HACKING ATTACK WORKS EFFECTS OF HACKING PREVENTION AND DETECTION OF HACKING CONCLUSION
  • 4. Hacking is an activity that is engaged in by people who use their knowledge of the internet, computers, firewalls and security preferences to break into other people's computers, allowing them to view private information, alter data and steal files, information or programs. In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. WHAT IS HACKING
  • 5. WHO IS AN HACKER In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. A hacker is an individual that attempts to take control over someone else's computer by using viruses, worms, and other types of Internet attacks.
  • 6. DAWN OF HACKING M.I.T. engineers in the 1960s first popularized the term and concept of HACKING. The so-called "hacks" perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities.
  • 7. Password cracking: The process of recovering passwords from data that has been stored in or transmitted by a computer system. Spoofing attack (Phishing):One program or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user . Rootkit: A Rootkit is designed to conceal the compromise of a computer's security. TYPES OF HACKING
  • 8. Trojan horses: A program which seems to be doing one thing, but is actually doing another. A Trojan horse can be used to set up a backdoor Viruses: A self-replicating program that spreads by inserting copies of itself into other executable code or documents .Some viruses are considered malicious. Worms: A worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. TYPES OF HACKING CONT’D
  • 10. TYPES OF HACKERS LEGAL HACKERS White hat Breaks security for non-malicious reasons, for instance testing their own security system. Also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. Often, this type of 'white hat' hacker is called an ETHICAL HACKER.
  • 11. TYPES OF HACKERS ILLEGAL HACKERS Black hat Break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. Script kiddie A non-expert who breaks into computer systems by using pre-packaged automated tools written by others. Elite hacker A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers.
  • 13. HACKING TECHNIQUES DENIAL of SERVICE (DoS) Give hackers a way to bring down a network without gaining internal access by flooding the access routers with bogus traffic causing the network to slow down or shut down . Using a third party (Transmission Control Protocol(TCP) or packets). SOCIAL ENGINEERING Is the act of manipulation and the skill of exploiting human weakness, into performing actions or divulging confidential information rather than by using technical cracking techniques
  • 14. Dictionary attack A dictionary file is loaded into a cracking application which is run against user accounts located by the application. Hybrid attack Add numbers or symbols to the filename to crack a password. Many people change their passwords by simply adding a number to the end of their current password Brute force attack A comprehensive form of attack, often take a long time to work depending on the complexity of the password. HACKING TECHNIQUES
  • 16. N map:(Network Mapper) A tool designed to rapidly scan large networks, uses raw IP packets in novel ways to determine what hosts are available on the network Cain and Abel: A password recovery tool. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords. Key loggers: A tool designed to record every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine HACKING TOOLS
  • 17. WHAT CAN BE HACKED Basically anything can be hacked as long as it has vulnerabilities examples include; Networks Servers Personal computers ATM’S Dispenser machines Websites Mobile phones Government Organizations….etc.
  • 18. CEH Certification A CERTIFIED ETHICAL HACKER is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker .To achieve the Certified Ethical Hacker Certification, you must pass the CEH exam 312-50 CHFI Certification COMPUTER HACKING FORENSIC INVESTIGATION is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. The CHFI certification is awarded after successfully passing the exam EC0 312-49. INTERNATIONAL COUNCIL OF ELECTRONIC COMMERCE CONSULTANTS(ICECC) CERTIFICATIONS IN HACKING
  • 21. HOW HACKING ATTACK WORKS The first thing an hacker does on gaining access to you is to install a Rootkit to facilitate durable influence on your system . Using these to create new accounts or networks. Then he tries to obscure his presence, surveys the network then tries to carry out his devious act. He then creates a backdoor he can always use to have access to your system. The hacker may use a third party to hack into you .
  • 23. EFFECTS OF HACKING Denial of Service (DoS) Exploitation Sales Losses Defacement (websites) Data Loss Remote File Execution Network Traffic Loss of Control Additional Cost Fraud…. etc.
  • 24.
  • 25. PREVENTION AND DETECTION OF HACKING SECURITY AWARENESS Is the knowledge and attitude members of an organization possess regarding the protection of the physical and especially information asset of the organization. These include the following: Physical security Desktop security Networks security(Cyber security) Password security Antiviruses Antispyware's E-mail security Firewall
  • 26. Security software called intrusion detection systems may be used in computers to detect unusual and suspicious activity and, in some cases, stop a variety of harmful actions by authorized or unauthorized persons. Abuse and misuse of sensitive system and application programs and data such as password, inventory, financial, engineering, and personnel files can be detected by these systems. Microsoft®Encarta®2009.© INTRUSION DETECTION SYSTEMS
  • 27. CONCLUSION The question therefore is, is Hacking a crime? From the afore discussion its obvious hacking(illegal hacking) is a CRIME. Hacking can be prevented or minimized if proper security measures and computer ethics are adhered to. Therefore be careful not to get hacked because this can be detrimental.