SlideShare a Scribd company logo
1 of 23
Name :- Smit Shah -140410109096
T.Y Electrical 2 Sem 5
Subject:-CYBER SECURITY
Topic :-
1
Contents :
Meaning of Hacking.
Why do people Hack??
Types of Hacking.
Types of Hackers.
Conclusion.
2
HACKING??
The Process of attempting to gain
or successfully gaining,
unauthorized access to computer
resources for the purpose of help or
secure system is called Hacking.
Hacking is technique in which,
any one can access any one’s
computer without his permission.
3
Why do people hack ?
 To make security stronger ( Ethical Hacking ).
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network.
4
Types Of Hacking :
Website Hacking.
Email Hacking.
Network Hacking.
Password Hacking.
Online Banking Hacking.
Computer Hacking.
5
Website Hacking:
 Hacking a website means taking control from the
website owner to a person who hacks the website.
 The hacker will get the username and password and
the hacker will use that website for any purpose
which may sometimes to destroy some valuable
information database.
6
Email Hacking :
 Email hacking is illicit access to an email account or email
correspondence.
 Ways of Email Hacking:
• Personal Information.
• Social Hacking.
• Phishing/ Hacking Software.
• Trojan Virus etc.
 Email may be protected by methods such as a strong
password, encryption of the contents or a digital signature.
An email disclaimer may be used to warn unauthorized readers
but these are thought to be ineffective.
7
Network Hacking:
 Network Hacking is generally means gathering information
about domain by using tools like Telnet, NslookUP, Ping,
Tracert, Netstat, etc… over the network.
 It also include OS Fingerprinting, Port Scanning, Port Surfing
using various Tools.
 These are the three most common methods of hacking
a wireless network:
• Sniffing
• Spoofing
• Encryption Cracking
8
Password Hacking:
 Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted by a
computer system. A common approach is to repeatedly try
guesses for the password.
 Most passwords can be cracked by using following techniques:
• Hashing
• Guessing
• Default Passwords
• Brute Force
• Phishing
9
Online banking Hacking:
 Unauthorized accessing bank accounts without knowing the
password or without permission of account holder is known as
Online banking hacking.
 A bank account can be accessed in many ways. When someone
gets access to your account, that person can take all your funds
without your knowledge.
Here are five simple tips that will help Protect Your Online Accounts:
• Use Strong Password
• Protect your Computer
• Keep an eye on running processes
• Download with care
• Be careful when using unprotected public networks 10
Computer Hacking:
 Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.
 People can gain complete access to your computer
from any where in the world if your computer is
turned on, unprotected, and has an internet
connection. What they do, is up to them.
 Remote desktop connection technique.
11
Types of Hackers
12
White-hat Hackers :
The good guys who identify the security
weakness of the system or network and inform
the owner about them.
13
Black-hat Hackers:
A black hat is the villain or bad guy,
who crash into victim’s security to steal
information and destroy the victims
security network.
Also known as ‘cracker’.
14
Grey hat Hackers:
A Grey hat, in the hacking community,
refers to a skilled hacker who is somewhere
in between white and black hat hackers.
15
Language of hackers:
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x 16
Example:
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3|| 1 h4ck3d 1n
I did not hack this page, it was like this
when I hacked in.
17
World Famous hackers:
 Stephen Wozniac
 Tsutomu Shimomura
18
Kevin Mitnick
Kevin Poulsen
19
Random Fact !!!!
The average age group of hackers are
aged between 14-24 yrs.…
20
Preventive measures :
Install a strong anti-virus
Always run a anti-virus check before you
download a program or a file from the internet.
Avoid disclosing personal details like phone
number, credit card details to strangers.
21
Conclusion:
 Proper ethical hackers should be employed.
 Do not expose your passwords to untrusted sites.
 Practice using exact web address.
 Close your internet while not in use.
22
THANK YOU
23

More Related Content

What's hot

What's hot (18)

Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Hacker
HackerHacker
Hacker
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Hacking
HackingHacking
Hacking
 
Hacking & Hackers
Hacking & HackersHacking & Hackers
Hacking & Hackers
 
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 

Viewers also liked

Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)
Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)
Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)Eric D. Schabell
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Open shift enterprise 3.1 paas on kubernetes
Open shift enterprise 3.1   paas on kubernetesOpen shift enterprise 3.1   paas on kubernetes
Open shift enterprise 3.1 paas on kubernetesSamuel Terburg
 
Build a PaaS with OpenShift Origin
Build a PaaS with OpenShift OriginBuild a PaaS with OpenShift Origin
Build a PaaS with OpenShift OriginSteven Pousty
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connectionsguest85e156e
 
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1Etsuji Nakai
 
Achieving CI/CD with Kubernetes
Achieving CI/CD with KubernetesAchieving CI/CD with Kubernetes
Achieving CI/CD with KubernetesRamit Surana
 
OpenShift Enterprise 3.1 vs kubernetes
OpenShift Enterprise 3.1 vs kubernetesOpenShift Enterprise 3.1 vs kubernetes
OpenShift Enterprise 3.1 vs kubernetesSamuel Terburg
 
An Introduction to Kubernetes
An Introduction to KubernetesAn Introduction to Kubernetes
An Introduction to KubernetesImesh Gunaratne
 
Containerize! Between Docker and Jube.
Containerize! Between Docker and Jube.Containerize! Between Docker and Jube.
Containerize! Between Docker and Jube.Henryk Konsek
 
fabric8 ... and Docker, Kubernetes & OpenShift
fabric8 ... and Docker, Kubernetes & OpenShiftfabric8 ... and Docker, Kubernetes & OpenShift
fabric8 ... and Docker, Kubernetes & OpenShiftroland.huss
 

Viewers also liked (14)

Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)
Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)
Mastering xPaaS - get down and dirty in the OpenShift Cloud (part I)
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Open shift enterprise 3.1 paas on kubernetes
Open shift enterprise 3.1   paas on kubernetesOpen shift enterprise 3.1   paas on kubernetes
Open shift enterprise 3.1 paas on kubernetes
 
Introducing Akka
Introducing AkkaIntroducing Akka
Introducing Akka
 
Build a PaaS with OpenShift Origin
Build a PaaS with OpenShift OriginBuild a PaaS with OpenShift Origin
Build a PaaS with OpenShift Origin
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
 
Achieving CI/CD with Kubernetes
Achieving CI/CD with KubernetesAchieving CI/CD with Kubernetes
Achieving CI/CD with Kubernetes
 
OpenShift Enterprise 3.1 vs kubernetes
OpenShift Enterprise 3.1 vs kubernetesOpenShift Enterprise 3.1 vs kubernetes
OpenShift Enterprise 3.1 vs kubernetes
 
An Introduction to Kubernetes
An Introduction to KubernetesAn Introduction to Kubernetes
An Introduction to Kubernetes
 
Containerize! Between Docker and Jube.
Containerize! Between Docker and Jube.Containerize! Between Docker and Jube.
Containerize! Between Docker and Jube.
 
fabric8 ... and Docker, Kubernetes & OpenShift
fabric8 ... and Docker, Kubernetes & OpenShiftfabric8 ... and Docker, Kubernetes & OpenShift
fabric8 ... and Docker, Kubernetes & OpenShift
 

Similar to Hacking & Attack vector

Similar to Hacking & Attack vector (20)

Hacking
HackingHacking
Hacking
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 

More from Smit Shah

Flow chart & Program for CAAD of choke coil
Flow chart & Program for CAAD of choke coilFlow chart & Program for CAAD of choke coil
Flow chart & Program for CAAD of choke coilSmit Shah
 
Line to Line & Double Line to Ground Fault On Power System
Line to Line & Double Line to Ground Fault On Power SystemLine to Line & Double Line to Ground Fault On Power System
Line to Line & Double Line to Ground Fault On Power SystemSmit Shah
 
Finite difference method for charge calculation
Finite difference method for charge calculationFinite difference method for charge calculation
Finite difference method for charge calculationSmit Shah
 
Parallel Inverter
Parallel InverterParallel Inverter
Parallel InverterSmit Shah
 
Dry Type Transformer
Dry  Type TransformerDry  Type Transformer
Dry Type TransformerSmit Shah
 
Half wave control rectifier with RL load
Half wave control rectifier with RL loadHalf wave control rectifier with RL load
Half wave control rectifier with RL loadSmit Shah
 
Pipeline & Nonpipeline Processor
Pipeline & Nonpipeline ProcessorPipeline & Nonpipeline Processor
Pipeline & Nonpipeline ProcessorSmit Shah
 
AC Supply system, Comparison Between AC-DC System, Advantage HV transmission
AC Supply system, Comparison Between AC-DC System, Advantage HV transmissionAC Supply system, Comparison Between AC-DC System, Advantage HV transmission
AC Supply system, Comparison Between AC-DC System, Advantage HV transmissionSmit Shah
 
Lap winding for AC machine
Lap winding for AC machineLap winding for AC machine
Lap winding for AC machineSmit Shah
 
Block Reduction Method
Block Reduction MethodBlock Reduction Method
Block Reduction MethodSmit Shah
 
Frequency spectrum of periodic signal..
Frequency spectrum of periodic signal..    Frequency spectrum of periodic signal..
Frequency spectrum of periodic signal.. Smit Shah
 
Divergence Theorem & Maxwell’s First Equation
Divergence  Theorem & Maxwell’s  First EquationDivergence  Theorem & Maxwell’s  First Equation
Divergence Theorem & Maxwell’s First EquationSmit Shah
 
Solar Dryer & Solar Distillation
Solar Dryer & Solar DistillationSolar Dryer & Solar Distillation
Solar Dryer & Solar DistillationSmit Shah
 
Parallel Adder and Subtractor
Parallel Adder and SubtractorParallel Adder and Subtractor
Parallel Adder and SubtractorSmit Shah
 
Type of Single phase induction Motor
Type of Single phase induction MotorType of Single phase induction Motor
Type of Single phase induction MotorSmit Shah
 
Fluid Properties Density , Viscosity , Surface tension & Capillarity
Fluid Properties Density , Viscosity , Surface tension & Capillarity Fluid Properties Density , Viscosity , Surface tension & Capillarity
Fluid Properties Density , Viscosity , Surface tension & Capillarity Smit Shah
 
Application of different types of dc generator and dc motor
Application of different types of dc generator and dc motorApplication of different types of dc generator and dc motor
Application of different types of dc generator and dc motorSmit Shah
 
Initial Conditions
Initial ConditionsInitial Conditions
Initial ConditionsSmit Shah
 
Laplace Transform And Its Applications
Laplace Transform And Its ApplicationsLaplace Transform And Its Applications
Laplace Transform And Its ApplicationsSmit Shah
 
Transistor Configuration
Transistor Configuration Transistor Configuration
Transistor Configuration Smit Shah
 

More from Smit Shah (20)

Flow chart & Program for CAAD of choke coil
Flow chart & Program for CAAD of choke coilFlow chart & Program for CAAD of choke coil
Flow chart & Program for CAAD of choke coil
 
Line to Line & Double Line to Ground Fault On Power System
Line to Line & Double Line to Ground Fault On Power SystemLine to Line & Double Line to Ground Fault On Power System
Line to Line & Double Line to Ground Fault On Power System
 
Finite difference method for charge calculation
Finite difference method for charge calculationFinite difference method for charge calculation
Finite difference method for charge calculation
 
Parallel Inverter
Parallel InverterParallel Inverter
Parallel Inverter
 
Dry Type Transformer
Dry  Type TransformerDry  Type Transformer
Dry Type Transformer
 
Half wave control rectifier with RL load
Half wave control rectifier with RL loadHalf wave control rectifier with RL load
Half wave control rectifier with RL load
 
Pipeline & Nonpipeline Processor
Pipeline & Nonpipeline ProcessorPipeline & Nonpipeline Processor
Pipeline & Nonpipeline Processor
 
AC Supply system, Comparison Between AC-DC System, Advantage HV transmission
AC Supply system, Comparison Between AC-DC System, Advantage HV transmissionAC Supply system, Comparison Between AC-DC System, Advantage HV transmission
AC Supply system, Comparison Between AC-DC System, Advantage HV transmission
 
Lap winding for AC machine
Lap winding for AC machineLap winding for AC machine
Lap winding for AC machine
 
Block Reduction Method
Block Reduction MethodBlock Reduction Method
Block Reduction Method
 
Frequency spectrum of periodic signal..
Frequency spectrum of periodic signal..    Frequency spectrum of periodic signal..
Frequency spectrum of periodic signal..
 
Divergence Theorem & Maxwell’s First Equation
Divergence  Theorem & Maxwell’s  First EquationDivergence  Theorem & Maxwell’s  First Equation
Divergence Theorem & Maxwell’s First Equation
 
Solar Dryer & Solar Distillation
Solar Dryer & Solar DistillationSolar Dryer & Solar Distillation
Solar Dryer & Solar Distillation
 
Parallel Adder and Subtractor
Parallel Adder and SubtractorParallel Adder and Subtractor
Parallel Adder and Subtractor
 
Type of Single phase induction Motor
Type of Single phase induction MotorType of Single phase induction Motor
Type of Single phase induction Motor
 
Fluid Properties Density , Viscosity , Surface tension & Capillarity
Fluid Properties Density , Viscosity , Surface tension & Capillarity Fluid Properties Density , Viscosity , Surface tension & Capillarity
Fluid Properties Density , Viscosity , Surface tension & Capillarity
 
Application of different types of dc generator and dc motor
Application of different types of dc generator and dc motorApplication of different types of dc generator and dc motor
Application of different types of dc generator and dc motor
 
Initial Conditions
Initial ConditionsInitial Conditions
Initial Conditions
 
Laplace Transform And Its Applications
Laplace Transform And Its ApplicationsLaplace Transform And Its Applications
Laplace Transform And Its Applications
 
Transistor Configuration
Transistor Configuration Transistor Configuration
Transistor Configuration
 

Recently uploaded

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 

Recently uploaded (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

Hacking & Attack vector

  • 1. Name :- Smit Shah -140410109096 T.Y Electrical 2 Sem 5 Subject:-CYBER SECURITY Topic :- 1
  • 2. Contents : Meaning of Hacking. Why do people Hack?? Types of Hacking. Types of Hackers. Conclusion. 2
  • 3. HACKING?? The Process of attempting to gain or successfully gaining, unauthorized access to computer resources for the purpose of help or secure system is called Hacking. Hacking is technique in which, any one can access any one’s computer without his permission. 3
  • 4. Why do people hack ?  To make security stronger ( Ethical Hacking ).  Just for fun.  Show off.  Hack other systems secretly.  Notify many people their thought.  Steal important information.  Destroy enemy’s computer network. 4
  • 5. Types Of Hacking : Website Hacking. Email Hacking. Network Hacking. Password Hacking. Online Banking Hacking. Computer Hacking. 5
  • 6. Website Hacking:  Hacking a website means taking control from the website owner to a person who hacks the website.  The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information database. 6
  • 7. Email Hacking :  Email hacking is illicit access to an email account or email correspondence.  Ways of Email Hacking: • Personal Information. • Social Hacking. • Phishing/ Hacking Software. • Trojan Virus etc.  Email may be protected by methods such as a strong password, encryption of the contents or a digital signature. An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective. 7
  • 8. Network Hacking:  Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network.  It also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools.  These are the three most common methods of hacking a wireless network: • Sniffing • Spoofing • Encryption Cracking 8
  • 9. Password Hacking:  Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.  Most passwords can be cracked by using following techniques: • Hashing • Guessing • Default Passwords • Brute Force • Phishing 9
  • 10. Online banking Hacking:  Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.  A bank account can be accessed in many ways. When someone gets access to your account, that person can take all your funds without your knowledge. Here are five simple tips that will help Protect Your Online Accounts: • Use Strong Password • Protect your Computer • Keep an eye on running processes • Download with care • Be careful when using unprotected public networks 10
  • 11. Computer Hacking:  Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.  People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them.  Remote desktop connection technique. 11
  • 13. White-hat Hackers : The good guys who identify the security weakness of the system or network and inform the owner about them. 13
  • 14. Black-hat Hackers: A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network. Also known as ‘cracker’. 14
  • 15. Grey hat Hackers: A Grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers. 15
  • 16. Language of hackers: 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x 16
  • 17. Example: 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|| 1 h4ck3d 1n I did not hack this page, it was like this when I hacked in. 17
  • 18. World Famous hackers:  Stephen Wozniac  Tsutomu Shimomura 18
  • 20. Random Fact !!!! The average age group of hackers are aged between 14-24 yrs.… 20
  • 21. Preventive measures : Install a strong anti-virus Always run a anti-virus check before you download a program or a file from the internet. Avoid disclosing personal details like phone number, credit card details to strangers. 21
  • 22. Conclusion:  Proper ethical hackers should be employed.  Do not expose your passwords to untrusted sites.  Practice using exact web address.  Close your internet while not in use. 22