KEMBAR78
Hacking | PDF
‫سەرۆكايەتى‬‫ئەنجومەنى‬‫وەزيران‬
‫وەزارەتى‬‫خوێندنى‬‫بااڵ‬‫و‬‫توێژينەوەى‬‫زانستى‬
‫سەرۆكايەتى‬‫زانكۆى‬‫پۆليتەكنيكى‬‫سلێمانى‬
‫كۆلێجى‬‫تەكنيكي‬‫اينفۆرماتيك‬/‫سلێمانی‬
‫بەشی‬‫ێوەبردنى‬ ِ‫بەر‬‫نێتوۆرک‬
Date : 22 / may / 2015
Contents:-
 History of Hacking
 What is Hacking?
 Who is Hacker?
 Famous hackers in history
 Why do Hackers hack?
 Types of Hacking
 How to give a password to account
 What should do after hacked
 How to secure our data
 Advantages of Hacking
 Disadvantages of Hacking
 Conclusion
 References
History of Hacking
 The first computer hacker emerged at MIT(Massachusetts Institute of
Technology).
 Hacking is began in the 1960s at MIT, origin of the term “hacker”.
 The truth hacker amongst our societies have thirst for the knowledge.
 Boredom is never an object of challenge for the hacker
What is Hacking?
The definition of HACK is "Break into computer systems or software"
The Process of attempting to gain or successfully gaining, unauthorized
access to computer resources is called Hacking.
Computer hacking is the most popular formof hacking nowadays, especially
in the field of computer security, but hacking exists in many other forms, such as
phone hacking, brain hacking, etc. and it's not limited to either of them.
Who is a hacker?
In the computer security context, a hacker is someone who seeks and
exploits weaknesses in a computer system or computer network.
The term hacker is reclaimed by computer programmers who argue
that someone breaking into computers is better called a cracker.
Why do hackers hack?
 Just for fun.
 Hackers may be motivated by a multitude of reasons, such as profit,
protest, challenge.
 Hack other systems secretly.
 Notify many people their thought.
 Steal importantinformation.
 Destroy enemy’s computer network during the war.

Famous Hackers inHistory
Types of Hacking:-
 Website Hacking
 Network Hacking
 Ethical Hacking
 Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
Types of Hacking:-
 Website Hacking
Hacking a website means taking control from the website owner to a person who hacks
the website.
 Network Hacking
Network Hacking is generally means gathering information about domain by using tools
like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
 Ethical Hacking
Ethical hacking is where a person hacks to find weaknesses in a system and then usually
patches them.
 Email Hacking
Email hacking is illicit access to an email account or email correspondence.
 Password Hacking
Password Hacking Password cracking is the process of recovering secret passwords from
data that has been stored in or transmitted by a computer system.
 Online Banking Hacking
Online banking Hacking Unauthorized accessing bank accounts without knowing the
password or without permission of account holder is known as online banking hacking.
 Computer Hacking
Computer Hacking is when files on your computer are viewed, created, or edited
without your authorization.
What should do after hacked?
 Shutdown the system Or turn off the system
 Separate the systemfromnetwork
 Restore the systemwith the backup Or reinstall all programs
 Connect the systemto the network
 Itcan be good to call the police
How to give a passwordto account
Use unique passwordsfor your accounts.
Choosea combination of letters, numbers, or symbols to
create a unique password.
How to secure our data
How to secure our data
 Ex.
 1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+, $0 90 4h43d 4$
0ur pi4||.
1 -> i or l
3 -> e
4 -> a
+ -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
c -> [
f -> ph
ph -> f
x -> ck
ck -> x
 I transferred Rs.100000to your account, So go ahead as our
plan.
Advantages of hacking
Can be used to recover lost information where the computer password has
been lost.
Teaches you that no technology is 100% secure.
To test how good security is on your own network.
They call it white hat computer hacking.
Disadvantages of Hacking
Criminals can use it to their advantage.
Itcan harmsomeone's privacy
It’s Illega
Conclusion
Keep your password protected. Writeyour password should bewith
combination of characters, digits, special symbols. Do notrespond to feck
on fishing email. When you are doing any online transection always keep
watch on site whether the protocolof site is https & whether there is a lock
symbol.

Hacking

  • 1.
  • 2.
    Contents:-  History ofHacking  What is Hacking?  Who is Hacker?  Famous hackers in history  Why do Hackers hack?  Types of Hacking  How to give a password to account  What should do after hacked  How to secure our data  Advantages of Hacking  Disadvantages of Hacking  Conclusion  References
  • 3.
    History of Hacking The first computer hacker emerged at MIT(Massachusetts Institute of Technology).  Hacking is began in the 1960s at MIT, origin of the term “hacker”.  The truth hacker amongst our societies have thirst for the knowledge.  Boredom is never an object of challenge for the hacker What is Hacking? The definition of HACK is "Break into computer systems or software" The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking. Computer hacking is the most popular formof hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them. Who is a hacker? In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 4.
    Why do hackershack?  Just for fun.  Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge.  Hack other systems secretly.  Notify many people their thought.  Steal importantinformation.  Destroy enemy’s computer network during the war.  Famous Hackers inHistory
  • 5.
    Types of Hacking:- Website Hacking  Network Hacking  Ethical Hacking  Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking Types of Hacking:-  Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website.
  • 6.
     Network Hacking NetworkHacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.  Ethical Hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.  Email Hacking Email hacking is illicit access to an email account or email correspondence.  Password Hacking Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.  Online Banking Hacking Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as online banking hacking.  Computer Hacking Computer Hacking is when files on your computer are viewed, created, or edited without your authorization. What should do after hacked?  Shutdown the system Or turn off the system  Separate the systemfromnetwork  Restore the systemwith the backup Or reinstall all programs  Connect the systemto the network  Itcan be good to call the police
  • 7.
    How to givea passwordto account Use unique passwordsfor your accounts. Choosea combination of letters, numbers, or symbols to create a unique password. How to secure our data How to secure our data  Ex.  1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+, $0 90 4h43d 4$ 0ur pi4||. 1 -> i or l 3 -> e 4 -> a + -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z c -> [ f -> ph ph -> f x -> ck ck -> x
  • 8.
     I transferredRs.100000to your account, So go ahead as our plan. Advantages of hacking Can be used to recover lost information where the computer password has been lost. Teaches you that no technology is 100% secure. To test how good security is on your own network. They call it white hat computer hacking. Disadvantages of Hacking Criminals can use it to their advantage. Itcan harmsomeone's privacy It’s Illega Conclusion Keep your password protected. Writeyour password should bewith combination of characters, digits, special symbols. Do notrespond to feck on fishing email. When you are doing any online transection always keep watch on site whether the protocolof site is https & whether there is a lock symbol.