all about hacking.!!
TRANSCRIPT
![Page 1: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/1.jpg)
![Page 2: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/2.jpg)
What is
“HACKING”
![Page 3: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/3.jpg)
Its just breaking the
computer security system to
access computer network
legally or illegally.
![Page 4: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/4.jpg)
Methods of hacking
![Page 5: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/5.jpg)
PHISHING
BRUTE FORCE POWER ATTACK
SQL INJECTION
SOCIAL ENGINEERING
APPLICATION BASE ATTACK
MISCONFIGURATION ATTACK
![Page 6: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/6.jpg)
PHISHING
1
![Page 7: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/7.jpg)
Phishing is the most
simplest way the hacker
can access your
personal Information.
![Page 8: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/8.jpg)
Beware• ALWAYS CHECK THE ADDRESS BAR OF
THE BROWSER AND THEN ENTER THE DETAILS.
![Page 9: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/9.jpg)
BRUTE FORCE
POWER ATTACK
2
![Page 10: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/10.jpg)
In this process, an
application is used which
literally guesses passwords
and ultimately tries to crack
the actual password.
![Page 11: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/11.jpg)
![Page 12: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/12.jpg)
SQL INJECTION
3
![Page 13: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/13.jpg)
It’s the most
commonest method
to hack websites..
![Page 14: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/14.jpg)
In order to protect yourselves this
type of attack, you need to secure
your website programmatically.
This technique is also used for
penetration testing.
![Page 15: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/15.jpg)
SOCIAL ENGINEERING
4
![Page 16: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/16.jpg)
It is mainly used for
hacking social
networking sites.
![Page 17: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/17.jpg)
DO NOT EVER SHARE
ANY INFORMATION
ABOUT YOUR SOCIAL
NETWORKING ACCOUNT
WITH ANYONE.
![Page 18: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/18.jpg)
APPLICATION
BASE ATTACK
5
![Page 19: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/19.jpg)
In this method normally an
application is used for either creating
a phishing page or a brute force
power attack.
In simple words there are
typically MALWARE.
![Page 20: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/20.jpg)
MISCONFIGURATION ATTACK
6
![Page 21: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/21.jpg)
This usually occurs if you
have misconfigured your
system such that the
valuable information gets
exposed.
![Page 22: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/22.jpg)
TYPES OF
HACKERS!!!
![Page 23: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/23.jpg)
WHITE HAT HACKER.BLACK HAT HACKER.GREY HAT HACKER.ELITE HACKER.SCRIPT KIDDIE.
![Page 24: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/24.jpg)
![Page 25: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/25.jpg)
They use their skills for good purposes. They work for organizations to stop the illegal activities through black hat hackers.
![Page 26: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/26.jpg)
A white hat hacker breaks security for non-malicious reasons, perhapsto test their own security system.
The term "white hat" in Internet slang refers to an Ethical Hacker.
![Page 27: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/27.jpg)
![Page 28: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/28.jpg)
A Black Hat Hacker is a hacker who violates computer security foR little reason beyond maliciousness or for personal gain.
![Page 29: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/29.jpg)
BLACK HAT HACKERS ALWAYS DO ILLEGAL WORK.
THEY ARE PROFESSIONALS IN THEIR FIELDS.
![Page 30: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/30.jpg)
![Page 31: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/31.jpg)
GREY HAT HACKERS HAVE BOTH QUALITIES LIKE BLACK HAT HACKERS AND WHITE HAT HACKERS .
THEY USE THEIR KNOWLEDGE FOR BAD PURPOSES AND GOODPURPOSES TOO.
![Page 32: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/32.jpg)
![Page 33: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/33.jpg)
A SOCIAL STATUS AMONG HACKERS, ELITE IS USED TO DESCRIBE THE MOST SKILLED. NEWLY DISCOVERED EXPLOITS CIRCULATE AMONG THESE HACKERS. ELITE GROUPS SUCH AS MASTERS OF DECEPTIONCONFERRED A KIND OF CREDIBILITY ON THEIR MEMBERS.
![Page 34: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/34.jpg)
![Page 35: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/35.jpg)
A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, hence the term script kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature),usually with little understanding of the underlying concept.
![Page 36: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/36.jpg)
SCRIPT KIDDIES HACKS INTO
COMPUTER OR WEBSITES USING
THE TOOLS AVAILABLE ON THE
INTERNET .
THEY DON’T HAVE KNOWLEDGE
OF PROGRAMMING .
![Page 37: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/37.jpg)
How to Hack???Hacking = manipulating a system to do something it wasn’t designed to do.
Like hot wiring a car.
Hacking computers isoften simple (once youknow how computers work).
![Page 38: All About Hacking.!!](https://reader033.vdocument.in/reader033/viewer/2022052700/55a202991a28ab3d268b4700/html5/thumbnails/38.jpg)
Thankyou!