18
A PRESENTATION ON HACKING BY J NAGA SAI

Hacking

Embed Size (px)

Citation preview

Page 1: Hacking

A PRESENTATION ON HACKING

BY J NAGA SAI

Page 2: Hacking

INTRODUCTION :

• What is HACKING?• The Process of attempting to gain or successfully gaining,

unauthorized access to computer resources is called Hacking.• Hacking is technique in which, any one can access any one’s computer

without his/her permission.• A Hacker knows all about the operating system and different holes in

the system.

Page 3: Hacking

TYPES OF HACKING :

• Website Hacking

• Email Hacking

• Network Hacking

• Password hacking

• Online Banking Hacking

• Computer Hacking

Page 4: Hacking

WEBSITE HACKING :

Page 5: Hacking

WEBSITE HACKING :

• Hacking a website means taking control over the website from owner to a person who hacks the website.

• The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information database.

Page 6: Hacking

EMAIL HACKING :

Page 7: Hacking

EMAIL HACKING :• Email hacking is illicit access to an email account or email correspondence.

• Ways of Email Hacking

• Personal Information

• Social Hacking

• Phishing/ Hacking Software

• Trojan Virus etc.

• Email may be protected by methods such as a strong password, encryption of the contents or a digital signature.

• An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective

Page 8: Hacking

NETWORK HACKING :

Page 9: Hacking

NETWORK HACKING :

• Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network.

• It also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools.

• These are the three most common methods of hacking a wireless network:

• Sniffing

• Spoofing

• Encryption Cracking

Page 10: Hacking

PASSWORD HACKING:• Password cracking is the process of recovering secret passwords from data that

has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.

• Most passwords can be cracked by using following techniques:

• Hashing

• Guessing

• Default Passwords

• Brute Force

• Phishing

Page 11: Hacking

ONLINE BANKING HACKING :• Unauthorized accessing bank accounts without knowing the password or without

permission of account holder is known as Online banking hacking.

• A bank account can be accessed in many ways.

When someone gets access to your

account, that person can take

all your funds without your

knowledge.

Page 12: Hacking

HERE ARE FIVE SIMPLE TIPS THAT WILL HELP PROTECT YOUR ONLINE ACCOUNTS:

• Use Strong Password

• Protect your Computer

• Keep an eye on running processes

• Download with care

• Be careful when using unprotected public networks

Page 13: Hacking

COMPUTER HACKING :

Page 14: Hacking

COMPUTER HACKING :

• Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.

• People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them.

• Remote desktop connection technique.

Page 15: Hacking

ETHICAL HACKERS :

• A person who hacks into a computer network in order to test or evaluate its security, rather than with

malicious or criminal intent.

Page 16: Hacking

WHAT DO ETHICAL HACKERS DO?

• An ethical hacker’s evaluation of a system security seeks answers to these basic questions:

What can an intruder see on that target system?

What are you trying to protect?

What can an intruder do with that information?

Page 17: Hacking

CONCLUSION :

Proper ethical hackers should be employed.

Do not expose your passwords to untrusted sites.

Practice using exact web address.

Close your internet while not in use.

Page 18: Hacking

THANK YOU