38

All About Hacking.!!

Embed Size (px)

Citation preview

Page 1: All About Hacking.!!
Page 2: All About Hacking.!!

What is

“HACKING”

Page 3: All About Hacking.!!

Its just breaking the

computer security system to

access computer network

legally or illegally.

Page 4: All About Hacking.!!

Methods of hacking

Page 5: All About Hacking.!!

PHISHING

BRUTE FORCE POWER ATTACK

SQL INJECTION

SOCIAL ENGINEERING

APPLICATION BASE ATTACK

MISCONFIGURATION ATTACK

Page 6: All About Hacking.!!

PHISHING

1

Page 7: All About Hacking.!!

Phishing is the most

simplest way the hacker

can access your

personal Information.

Page 8: All About Hacking.!!

Beware• ALWAYS CHECK THE ADDRESS BAR OF

THE BROWSER AND THEN ENTER THE DETAILS.

Page 9: All About Hacking.!!

BRUTE FORCE

POWER ATTACK

2

Page 10: All About Hacking.!!

In this process, an

application is used which

literally guesses passwords

and ultimately tries to crack

the actual password.

Page 11: All About Hacking.!!
Page 12: All About Hacking.!!

SQL INJECTION

3

Page 13: All About Hacking.!!

It’s the most

commonest method

to hack websites..

Page 14: All About Hacking.!!

In order to protect yourselves this

type of attack, you need to secure

your website programmatically.

This technique is also used for

penetration testing.

Page 15: All About Hacking.!!

SOCIAL ENGINEERING

4

Page 16: All About Hacking.!!

It is mainly used for

hacking social

networking sites.

Page 17: All About Hacking.!!

DO NOT EVER SHARE

ANY INFORMATION

ABOUT YOUR SOCIAL

NETWORKING ACCOUNT

WITH ANYONE.

Page 18: All About Hacking.!!

APPLICATION

BASE ATTACK

5

Page 19: All About Hacking.!!

In this method normally an

application is used for either creating

a phishing page or a brute force

power attack.

In simple words there are

typically MALWARE.

Page 20: All About Hacking.!!

MISCONFIGURATION ATTACK

6

Page 21: All About Hacking.!!

This usually occurs if you

have misconfigured your

system such that the

valuable information gets

exposed.

Page 22: All About Hacking.!!

TYPES OF

HACKERS!!!

Page 23: All About Hacking.!!

WHITE HAT HACKER.BLACK HAT HACKER.GREY HAT HACKER.ELITE HACKER.SCRIPT KIDDIE.

Page 24: All About Hacking.!!
Page 25: All About Hacking.!!

They use their skills for good purposes. They work for organizations to stop the illegal activities through black hat hackers.

Page 26: All About Hacking.!!

A white hat hacker breaks security for non-malicious reasons, perhapsto test their own security system.

The term "white hat" in Internet slang refers to an Ethical Hacker.

Page 27: All About Hacking.!!
Page 28: All About Hacking.!!

A Black Hat Hacker is a hacker who violates computer security foR little reason beyond maliciousness or for personal gain.

Page 29: All About Hacking.!!

BLACK HAT HACKERS ALWAYS DO ILLEGAL WORK.

THEY ARE PROFESSIONALS IN THEIR FIELDS.

Page 30: All About Hacking.!!
Page 31: All About Hacking.!!

GREY HAT HACKERS HAVE BOTH QUALITIES LIKE BLACK HAT HACKERS AND WHITE HAT HACKERS .

THEY USE THEIR KNOWLEDGE FOR BAD PURPOSES AND GOODPURPOSES TOO.

Page 32: All About Hacking.!!
Page 33: All About Hacking.!!

A SOCIAL STATUS AMONG HACKERS, ELITE IS USED TO DESCRIBE THE MOST SKILLED. NEWLY DISCOVERED EXPLOITS CIRCULATE AMONG THESE HACKERS. ELITE GROUPS SUCH AS MASTERS OF DECEPTIONCONFERRED A KIND OF CREDIBILITY ON THEIR MEMBERS.

Page 34: All About Hacking.!!
Page 35: All About Hacking.!!

A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, hence the term script kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature),usually with little understanding of the underlying concept.

Page 36: All About Hacking.!!

SCRIPT KIDDIES HACKS INTO

COMPUTER OR WEBSITES USING

THE TOOLS AVAILABLE ON THE

INTERNET .

THEY DON’T HAVE KNOWLEDGE

OF PROGRAMMING .

Page 37: All About Hacking.!!

How to Hack???Hacking = manipulating a system to do something it wasn’t designed to do.

Like hot wiring a car.

Hacking computers isoften simple (once youknow how computers work).

Page 38: All About Hacking.!!

Thankyou!