KEMBAR78
Hacking | PPTX
(CO-3G)
HACKING
By
DEVI MAHALAXMI POLYTECHNIC COLLEGE
WHAT IS HACKING ?
 Hacking is the act of breaking in to a
computersystem and is a criminal offence under
the computer misuse.unauthorized access to
computer resources is called Hacking.
 Computer hacking is the most popular form of
hacking now a days, especially in the field of
computer security, but hacking exists in many other
forms, such as phone hacking, brain hacking, etc.
and it's not limited to either of them.
WHO IS A HACKER?
TYPES OF HACKER WHITE HAT HACKERS = Who Specializes In Penetration
Testing And In Other Testing Methodologies To Ensure The
Sequrity Of An Organization’s Information Systems.(White
Hackers Save People By Blocking Black Hackers.)
 BLACK HAT HACKERS = A Black Hat Is The Villan Or Bad
Guy, Especially In A Western Movie In Which Such A Character
Would Stereotypically Wear A Black Hat In Contrast To The Hero’s
White Hat.
 GREY HAT HACKERS = A Grey, Hat Is The Hacking
Community, Refers To A Skilled Hacker Whose Activities Fall
Somewhere Between White And Black Hat Hackers On A Variety
Of Spectra.
 In 1878, just two years after the telephone was invented by
Alexander Graham Bell, a group of teenage boys hired to run
the switchboards were kicked off of a telephone system in
NewYork.The reason? The boys were more interested in
knowing how the phone system worked than in making
proper connections and directing calls to the correct place. In
essence, they were trying to "hack" the system to see how it
worked.
 Hacking has been a part of computing for 40 years.
 The first computer hacker emerged at MIT.
 Hacking is began in the 1960s at MIT , origin of the
term “hacker”.
MIT=Massachusetts Institute of Technology
ADVANTAGES DISADVANTAGES
1) Teaches you that no
technology is 100% secure.
Criminals can use it to their
advantage.
2) To test how good security is
on your own network.
It can harm someone's privacy
3) Can be used to recover lost
information where the computer
password has been lost.
It destroys other people work.
4) It provides security to banking
and financial establishments.
It's Illegal.
5) They call it white hat computer
hacking.
Hiring professional is expensive.
There Are 7 Types Of Hacking
1)  WEBSITE HACKING
2)  NETWORK HACKING
3)  ETHICAL HACKING
4)  EMAIL HACKING
5)  PASSWORD HACKING
6)  ONLINE BANKING HACKING
7)  COMPUTER HACKING
EXPLAINATION ON TYPES OF HACKING
 WEBSITE HACKING = Hacking A Website Means Taking Control Form The Website
Owner To A Person Who Hacks The Website.
 NETWORK HACKING =Generally Means Gathering Information About Domain
By Using Tools Like Telnet,nslookup,ping,tracert,netstat Etc.
 ETHICAL HACKING --An ethical hacker is a computer and networking expert who
systematically attempts to penetrate a computer system or network on behalf of its
owners for the purpose of finding security vulnerabilities that a malicious hacker could
potentially exploit..
= Email hacker is a free Email hacking tool capable of hacking email
accounts of the most popular service provider. Email hacking is a illicit access to an
email account or email correspondence.
 PASSWORD HACKING= A password can be secret word,pharase or string of character used to
gain access to secured data.password hacking is sometimes password sometimes referred to as a
password cracking is a method of recovering passwords from data transmitted by or stored on a
computer.
 COMPUTER HACKING = is the practice of modifying computer hardware and
software to accomplish a goal outside of the creator’s original purpose. People
who engage in computer hacking activities are often called hackers.
Ian Murphy Kevin Mitnick
Johan HelsinguisLinusTorvalds Mark Abene
Robert Morris
WHY DO HACKERS HACK ?
Just for fun.
Show off.
Hack other system
secretly.
Notice many people their
thought.
Steal important
information.
Destroy’s enemy’s
computer network during
the war.
92%
7% 1%
HACKERS
1st Qtr 2nd Qtr 3th Qtr
 Amateurs (cyber
joy riders).
■ Potential
professional
hackers for hire
(corporate spies).
■ World-class cyber
criminals.
BASE=ABOUT 100,000
HACKERS WORLDWIDE.
WHAT TO DO AFTERYOU'VE BEENHACKED
1) SHUT DOWN THE
SYSTEM.
OR Turn off the system.
2) SEPRATE THE SYSTEM FROM NETWORK.
3) RESTORE THE SYSTEM WITH
THE BACKUP.
OR Shutdown the system .
4) IT CAN BE GOOD TO CALL THE CYBER CRIME POLICE.
5) RESET YOUR PASSWORDS.
6) LET YOUR OTHER CONTACTS KNOW ABOUT THE HACK.
7) MAKE SURE YOU WERE HACKED.
8) FORENSIC RECOVERY.
ANDROID MOBILE PHONE COMMAND PROMPT EMULATOR
 Android Emulator = The Android SDK includes a mobile device emulator — a virtual mobile
device that runs on your computer.
 The emulator lets you develop and test Android applications without using a physical device.
 The Android emulator mimics all of the hardware and software features of a typical mobile
device, except that it cannot place actual phone calls.
 It provides a variety of navigation and control keys, which you can "press" using your mouse or
keyboard to generate events for your application.
 It also provides a screen in which your application is displayed, together with any other active
Android applications.
ANONYMOUS
 Anonymous Originated In 2003 On The Imageboard 4chan, Representing The
Concept Of Many Online And Offline Community Users Simultaneously Existing
As An Anarchic, Digitized Global Brain.
 Anonymous Is A Lossely Associated Hacking Organization. It Was Formed On
“4chan” To Represent The Idea Of Many Online And Offline Community Users.
 Anonymous Strongly Opposes Internet Censorship And Surveillance, And Have
Shutdown Multiple Government Website.
 Their Member Can Be Recognized Ny Their “Guy Fawkes“ Mask In Public.
 Anonymous is the first internet-based super-consciousness. Anonymous is a
group, in the sense that a flock of birds is a group.
 Dozens of people have been arrested for involvement in Anonymous cyber
attacks, in countries including the US, UK, Australia, the Netherlands, Spain,
and Turkey.
 Supporters have called the group "freedom fighters” and digital Robin Hoods
while critics have described them as "a cyber lynch-mob "or “ cyber terrorists".
 In 2012, Time called Anonymous one of the "100 most influential people" in
the world.
WORLDWIDE HACKING ATTACKS
 Watch Dogs is an open world vigilante action-adventure stealth video game developed by
Ubisoft Montreal and published by Ubisoft.
 A third-person open-world game from Ubisoft, set in a dark alternate version of the US
where corporations track and catalog all online behavior over a vast data network. A
vigilante group called the Watch_Dogs hacks into this data, using it to hunt criminals.
THIS HACKING PROJECT IS DONE BY = MUBEEN MOMIN,SWAPNIL
LAVAHARE,PRATAMESH KHEDEKAR,PRIYANKA MALI,SUYASH BHADEKAR.

Hacking

  • 1.
  • 2.
    WHAT IS HACKING?  Hacking is the act of breaking in to a computersystem and is a criminal offence under the computer misuse.unauthorized access to computer resources is called Hacking.  Computer hacking is the most popular form of hacking now a days, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
  • 3.
    WHO IS AHACKER?
  • 4.
    TYPES OF HACKERWHITE HAT HACKERS = Who Specializes In Penetration Testing And In Other Testing Methodologies To Ensure The Sequrity Of An Organization’s Information Systems.(White Hackers Save People By Blocking Black Hackers.)  BLACK HAT HACKERS = A Black Hat Is The Villan Or Bad Guy, Especially In A Western Movie In Which Such A Character Would Stereotypically Wear A Black Hat In Contrast To The Hero’s White Hat.  GREY HAT HACKERS = A Grey, Hat Is The Hacking Community, Refers To A Skilled Hacker Whose Activities Fall Somewhere Between White And Black Hat Hackers On A Variety Of Spectra.
  • 5.
     In 1878,just two years after the telephone was invented by Alexander Graham Bell, a group of teenage boys hired to run the switchboards were kicked off of a telephone system in NewYork.The reason? The boys were more interested in knowing how the phone system worked than in making proper connections and directing calls to the correct place. In essence, they were trying to "hack" the system to see how it worked.  Hacking has been a part of computing for 40 years.  The first computer hacker emerged at MIT.  Hacking is began in the 1960s at MIT , origin of the term “hacker”. MIT=Massachusetts Institute of Technology
  • 6.
    ADVANTAGES DISADVANTAGES 1) Teachesyou that no technology is 100% secure. Criminals can use it to their advantage. 2) To test how good security is on your own network. It can harm someone's privacy 3) Can be used to recover lost information where the computer password has been lost. It destroys other people work. 4) It provides security to banking and financial establishments. It's Illegal. 5) They call it white hat computer hacking. Hiring professional is expensive.
  • 9.
    There Are 7Types Of Hacking 1)  WEBSITE HACKING 2)  NETWORK HACKING 3)  ETHICAL HACKING 4)  EMAIL HACKING 5)  PASSWORD HACKING 6)  ONLINE BANKING HACKING 7)  COMPUTER HACKING
  • 10.
    EXPLAINATION ON TYPESOF HACKING  WEBSITE HACKING = Hacking A Website Means Taking Control Form The Website Owner To A Person Who Hacks The Website.  NETWORK HACKING =Generally Means Gathering Information About Domain By Using Tools Like Telnet,nslookup,ping,tracert,netstat Etc.  ETHICAL HACKING --An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit..
  • 11.
    = Email hackeris a free Email hacking tool capable of hacking email accounts of the most popular service provider. Email hacking is a illicit access to an email account or email correspondence.  PASSWORD HACKING= A password can be secret word,pharase or string of character used to gain access to secured data.password hacking is sometimes password sometimes referred to as a password cracking is a method of recovering passwords from data transmitted by or stored on a computer.  COMPUTER HACKING = is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers.
  • 13.
    Ian Murphy KevinMitnick Johan HelsinguisLinusTorvalds Mark Abene Robert Morris
  • 14.
    WHY DO HACKERSHACK ? Just for fun. Show off. Hack other system secretly. Notice many people their thought. Steal important information. Destroy’s enemy’s computer network during the war.
  • 15.
    92% 7% 1% HACKERS 1st Qtr2nd Qtr 3th Qtr  Amateurs (cyber joy riders). ■ Potential professional hackers for hire (corporate spies). ■ World-class cyber criminals. BASE=ABOUT 100,000 HACKERS WORLDWIDE.
  • 17.
    WHAT TO DOAFTERYOU'VE BEENHACKED 1) SHUT DOWN THE SYSTEM. OR Turn off the system. 2) SEPRATE THE SYSTEM FROM NETWORK. 3) RESTORE THE SYSTEM WITH THE BACKUP. OR Shutdown the system . 4) IT CAN BE GOOD TO CALL THE CYBER CRIME POLICE. 5) RESET YOUR PASSWORDS. 6) LET YOUR OTHER CONTACTS KNOW ABOUT THE HACK. 7) MAKE SURE YOU WERE HACKED. 8) FORENSIC RECOVERY.
  • 18.
    ANDROID MOBILE PHONECOMMAND PROMPT EMULATOR  Android Emulator = The Android SDK includes a mobile device emulator — a virtual mobile device that runs on your computer.  The emulator lets you develop and test Android applications without using a physical device.  The Android emulator mimics all of the hardware and software features of a typical mobile device, except that it cannot place actual phone calls.  It provides a variety of navigation and control keys, which you can "press" using your mouse or keyboard to generate events for your application.  It also provides a screen in which your application is displayed, together with any other active Android applications.
  • 20.
    ANONYMOUS  Anonymous OriginatedIn 2003 On The Imageboard 4chan, Representing The Concept Of Many Online And Offline Community Users Simultaneously Existing As An Anarchic, Digitized Global Brain.  Anonymous Is A Lossely Associated Hacking Organization. It Was Formed On “4chan” To Represent The Idea Of Many Online And Offline Community Users.  Anonymous Strongly Opposes Internet Censorship And Surveillance, And Have Shutdown Multiple Government Website.  Their Member Can Be Recognized Ny Their “Guy Fawkes“ Mask In Public.  Anonymous is the first internet-based super-consciousness. Anonymous is a group, in the sense that a flock of birds is a group.  Dozens of people have been arrested for involvement in Anonymous cyber attacks, in countries including the US, UK, Australia, the Netherlands, Spain, and Turkey.  Supporters have called the group "freedom fighters” and digital Robin Hoods while critics have described them as "a cyber lynch-mob "or “ cyber terrorists".  In 2012, Time called Anonymous one of the "100 most influential people" in the world.
  • 21.
  • 22.
     Watch Dogsis an open world vigilante action-adventure stealth video game developed by Ubisoft Montreal and published by Ubisoft.  A third-person open-world game from Ubisoft, set in a dark alternate version of the US where corporations track and catalog all online behavior over a vast data network. A vigilante group called the Watch_Dogs hacks into this data, using it to hunt criminals.
  • 23.
    THIS HACKING PROJECTIS DONE BY = MUBEEN MOMIN,SWAPNIL LAVAHARE,PRATAMESH KHEDEKAR,PRIYANKA MALI,SUYASH BHADEKAR.