SlideShare uma empresa Scribd logo
1 de 10
->HACK<-
By MIDHUN
HACKING!
Hacking is the gaining of access(wanted or
unwanted) to a computer and viewing,
copying, or creating data without the
intention of destroying data or maliciously
harming the computer.
METHODS OF HACKING
hackers intention to stole critical
information of users like account
passwords, MasterCard detail, etc
PHISHING
Hackers will get your credentials
through a follow known as
key-logging.
CRACK PASSWORD
Code injection is the exploitation
of a computer bug that is caused
by processing invalid data
MALWARE INJECTING
Distributed Denial-of-Service is aimed
toward taking down a website or wifi so
that it cannot accesed by user.
DDoS ATTACK
Hackers access the website exploitation
malicious codes and steal cookies that
contain tips, login passwords, etc.
COOKIE THEFT
Social engineering is an attempt to
share personal info, sometimes by
impersonating a trustworthy supply.
SOCIAL ENGINEERING
AND MORE…
HACKER 💻
 A hacker is any person engaged in hacking.
 A hacker is someone who seeks and exploits
weakness in a computer system or computer network.
TYPES OF HACKERS
fun hacker, cybersecurity expert
who hack into network & systems,
but without malicious intent.
GREY HAT
Criminal hackers, who breaks
into computer systems malicious
or criminal intent.
BLACK HAT
Government Heired hacker, with
specific focus on finding and
disarming black hat hackers.
RED HAT
Authorized hackers, cybersecurity
experts who use their skills to find
vulnerabilities in networks,system.
WHITE HAT
AND MORE…
ETHICAL HACKING
 Ethical Hacking is testing the
resources for a good cause and for
the betterment of technology.
 Technically Ethical Hacking means
penetration testing which is focused
on securing and protecting IT
systems.
 Perform all the same activities done
by black hat hacker but with the
owner’s permission.
CRACKING
 Hacking with Malicious intention
is CRACKING
 Cracking is Crime.
 Cyber crime are the result of
cracking, not hacking
PREVENT HACKING
IMPLEMENT FIREWALL
BE AWARE OF PHISHING
KEEP OS UP TO DATE
INSTALL ANTI-VIRUS VULNERABILITY TEST
DON’T RUN UNNESSERY
NETWORK SERVICES
DON’T ACCESS PRESONAL
DATA IN PUBLIC WIFI
TURN OFF ANYTHING
YOU DON’T NEED
LEARN
Best Operating System:
Kali Linux, Parrot OS, Backbox,
Fedora etc.
Learn Hacking, not to hack others, To
secure yourselffrom Hackers…!
Tools:
Nmap, Metaspoit, Ngrok, Social
Engineering Tool-kit(SET) etc.
THANKS!

Mais conteúdo relacionado

Semelhante a Hacking Presentation

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 

Semelhante a Hacking Presentation (20)

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking
HackingHacking
Hacking
 
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking..!!
 
All About Hacking.!!
All About Hacking.!! All About Hacking.!!
All About Hacking.!!
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking
HackingHacking
Hacking
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Hacking Presentation

  • 2. HACKING! Hacking is the gaining of access(wanted or unwanted) to a computer and viewing, copying, or creating data without the intention of destroying data or maliciously harming the computer.
  • 3. METHODS OF HACKING hackers intention to stole critical information of users like account passwords, MasterCard detail, etc PHISHING Hackers will get your credentials through a follow known as key-logging. CRACK PASSWORD Code injection is the exploitation of a computer bug that is caused by processing invalid data MALWARE INJECTING Distributed Denial-of-Service is aimed toward taking down a website or wifi so that it cannot accesed by user. DDoS ATTACK Hackers access the website exploitation malicious codes and steal cookies that contain tips, login passwords, etc. COOKIE THEFT Social engineering is an attempt to share personal info, sometimes by impersonating a trustworthy supply. SOCIAL ENGINEERING AND MORE…
  • 4. HACKER 💻  A hacker is any person engaged in hacking.  A hacker is someone who seeks and exploits weakness in a computer system or computer network.
  • 5. TYPES OF HACKERS fun hacker, cybersecurity expert who hack into network & systems, but without malicious intent. GREY HAT Criminal hackers, who breaks into computer systems malicious or criminal intent. BLACK HAT Government Heired hacker, with specific focus on finding and disarming black hat hackers. RED HAT Authorized hackers, cybersecurity experts who use their skills to find vulnerabilities in networks,system. WHITE HAT AND MORE…
  • 6. ETHICAL HACKING  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration testing which is focused on securing and protecting IT systems.  Perform all the same activities done by black hat hacker but with the owner’s permission.
  • 7. CRACKING  Hacking with Malicious intention is CRACKING  Cracking is Crime.  Cyber crime are the result of cracking, not hacking
  • 8. PREVENT HACKING IMPLEMENT FIREWALL BE AWARE OF PHISHING KEEP OS UP TO DATE INSTALL ANTI-VIRUS VULNERABILITY TEST DON’T RUN UNNESSERY NETWORK SERVICES DON’T ACCESS PRESONAL DATA IN PUBLIC WIFI TURN OFF ANYTHING YOU DON’T NEED
  • 9. LEARN Best Operating System: Kali Linux, Parrot OS, Backbox, Fedora etc. Learn Hacking, not to hack others, To secure yourselffrom Hackers…! Tools: Nmap, Metaspoit, Ngrok, Social Engineering Tool-kit(SET) etc.