SlideShare a Scribd company logo
1 of 32
Group Members:
Muhammad Abbas
Hadir janan,
Asmia basher.
Uasma Ahmad.
Fahad Rehan.
Arbaz Cheema.
• History.
• What is hacking.
• Who are hacker.
• Categories of hacking.
• Types of hacking.
• Famous hackers.
• Why they hack.
• How to secure your data.
• Advantages and dis advantages of hacking.
• Conclusion.
• It all began in the 1960s at MIT, origin of the term
“hacker”, where extremely skilled individuals practiced
hardcore programming in FORTRAN and other older
languages.
• And start hacking.
• In simple words to access someone data with put his
permission and view it. Called hacking.
• In the computer security context, a hacker is
someone who seeks and exploits weaknesses in a
computer system or computer network.
• The term hacker is reclaimed by computer
programmers who argue that someone breaking into
computers is better called a cracker.
• White hat hacking.
• Grey hat hacking.
• Black hat hacking.
• Website Hacking.
• Network hacking.
• Email hacking.
• Password Hacking.
• Online Banking Hacking.
• Computer Hacking.
• Hacking a website means taking control from the website
owner to a person who hacks the website.
• Network Hacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
• Email hacking is illicit access to an email account or
email correspondence.
Password Hacking Password cracking is the process of
recovering secret passwords from data that has been
stored in or transmitted by a computer system.
• Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without
permission of account holder is known as Online banking
hacking.
• Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.
• Gary McKinnon
• LulzSec .
• Adrian Lamo
• Gary McKinnon must’ve been a curious, restless child,
for to gain information on UFOs, he thought it better to
get a direct access into the channels of NASA. He
infiltrated 97 US military and NASA computers, by
installing virus and deleting a few files.
• LulzSec or Lulz Security, a high profile, Black Hat hacker
group, gained credentials for hacking into Sony, News
International, CIA, FBI, Scotland Yard, and several
noteworthy accounts.
• Adrian Lamo decided to switch careers when he realized
the potentials of his skills. He became a news when he
hacked into Yahoo!, Microsoft, Google, and The New
York Times.
• Just for fun.
• Show off.
• Hack other system Secretly.
• Steal important Data.
• Destroy Enemy computer during war.
• Shutdown your Computer.
• Separate your computer from network.
• It be batter to call police.
• Use unique passwords for your accounts.
• Choose a combination of letters, numbers, or symbols to
create a unique password.
• Can be used to recover lost information where the
computer password has been lost.
• Teaches you that no technology is 100% secure.
• To test how good security is on your own network.
• They call it white hat computer hacking.
• Criminals can use it to their advantage.
• It can harm someone's privacy
• It's Illegal
• Keep your password protected. Write your password
should be with combination of characters, digits, special
symbols. Do not respond to feck on fishing email. when
you are doing any online transection always keep watch
on site whether the protocol of site is https & whether
there is a lock symbol .
Hacking

More Related Content

What's hot

Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
tanqn_hut
 

What's hot (18)

Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
Drooger, jack cyber security
Drooger, jack   cyber securityDrooger, jack   cyber security
Drooger, jack cyber security
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
hacking
hackinghacking
hacking
 
Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference Jameel Nabbo Cyber Security conference
Jameel Nabbo Cyber Security conference
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Hacking
HackingHacking
Hacking
 
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Hacking
Hacking Hacking
Hacking
 
Hacking-coffee and latte
Hacking-coffee and latteHacking-coffee and latte
Hacking-coffee and latte
 

Viewers also liked (7)

NB1
NB1NB1
NB1
 
Margaret Kahoilua - Resume
Margaret Kahoilua - ResumeMargaret Kahoilua - Resume
Margaret Kahoilua - Resume
 
Yourprezi
YourpreziYourprezi
Yourprezi
 
CARO lucknow
CARO lucknowCARO lucknow
CARO lucknow
 
FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS
FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS
FDI POLICY IN INDIA: RECENT RELAXATION OF NORMS
 
Drugs & crime
Drugs & crimeDrugs & crime
Drugs & crime
 
DPNC Insight CARO 2016 vs 2015
DPNC Insight CARO 2016 vs 2015DPNC Insight CARO 2016 vs 2015
DPNC Insight CARO 2016 vs 2015
 

Similar to Hacking

Similar to Hacking (20)

Hacking
HackingHacking
Hacking
 
HACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptxHACKING AND ITS TYPES.pptx
HACKING AND ITS TYPES.pptx
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
hacking
hackinghacking
hacking
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Hacking
HackingHacking
Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
HACKING
HACKINGHACKING
HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking
HackingHacking
Hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 

Recently uploaded

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Recently uploaded (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Hacking

  • 1. Group Members: Muhammad Abbas Hadir janan, Asmia basher. Uasma Ahmad. Fahad Rehan. Arbaz Cheema.
  • 2. • History. • What is hacking. • Who are hacker. • Categories of hacking. • Types of hacking. • Famous hackers. • Why they hack. • How to secure your data. • Advantages and dis advantages of hacking. • Conclusion.
  • 3. • It all began in the 1960s at MIT, origin of the term “hacker”, where extremely skilled individuals practiced hardcore programming in FORTRAN and other older languages. • And start hacking.
  • 4. • In simple words to access someone data with put his permission and view it. Called hacking.
  • 5. • In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. • The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 6. • White hat hacking. • Grey hat hacking. • Black hat hacking.
  • 7. • Website Hacking. • Network hacking. • Email hacking. • Password Hacking. • Online Banking Hacking. • Computer Hacking.
  • 8.
  • 9. • Hacking a website means taking control from the website owner to a person who hacks the website.
  • 10.
  • 11. • Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  • 12.
  • 13. • Email hacking is illicit access to an email account or email correspondence.
  • 14. Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 15.
  • 16. • Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 17.
  • 18. • Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 19. • Gary McKinnon • LulzSec . • Adrian Lamo
  • 20.
  • 21. • Gary McKinnon must’ve been a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files.
  • 22.
  • 23. • LulzSec or Lulz Security, a high profile, Black Hat hacker group, gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts.
  • 24.
  • 25. • Adrian Lamo decided to switch careers when he realized the potentials of his skills. He became a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times.
  • 26. • Just for fun. • Show off. • Hack other system Secretly. • Steal important Data. • Destroy Enemy computer during war.
  • 27. • Shutdown your Computer. • Separate your computer from network. • It be batter to call police.
  • 28. • Use unique passwords for your accounts. • Choose a combination of letters, numbers, or symbols to create a unique password.
  • 29. • Can be used to recover lost information where the computer password has been lost. • Teaches you that no technology is 100% secure. • To test how good security is on your own network. • They call it white hat computer hacking.
  • 30. • Criminals can use it to their advantage. • It can harm someone's privacy • It's Illegal
  • 31. • Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .