SlideShare a Scribd company logo
Basic Concept - Hacking
Learning Community
Introduction
 Hacking is an Art of Exploitation. You can say that Getting unauthorized access to
Some Online Files, Websites, Emails etc is Hacking, Finding Defects, Flaws, and
Vulnerabilities and later exploiting them to get access.
 What do you think when you hear the word hacking? You actually think of breaking
the security through some Automatic Magical softwares and getting an
unauthorized access to systems. Actually it is wrong. We will classify it later and
will come to know different types of hacking and hackers.
 Cybersecurity is the body of technologies, processes and practices designed to
protect networks, computers, programs and data from attack, damage or
unauthorized access. In a computing context, the term security implies
cybersecurity.
 Hacking means to check for security holes in order to make security. For example
if you want to protect your house from thieves, you will first check the gates of
your house and weakness in it before the thieves in order to cover those
weakness. Same goes for computer, network and web application hacking.
Types of Hackers
Black Hat Hackers
 Black hat hackers are those
hackers that get an unauthorized
access to your computers,
networks and web applications for
their own profit. They are intended
to cause damage and steal data.
These type of hackers are known
as cyber criminals.The most
Dangerous Type of Hackers.
White Hat Hackers
 White hat hackers are known as
ethical hackers or the security
guys. They check for vulnerabilities
and weaknesses in a system in
order to patch those flaws legally.
They get the permission from the
owner of companies in order to
test the security.
Magic of Facebook Hacking
 Well If you are here to learn Facebook hacking, then you are wrong and
shouldn’t be here. Hacking is much more than that. Facebook hacking or
social networks hacking is not really an easy process. It’s not like that you will
be given a software through which you will be able to hack all people. This is
absolutely wrong concept. If somebody offers you a software to hack
Facebook then he must be spamming or giving you a Trojan. Nothing is
impossible. Facebook accounts and all those social networking IDs can be
hacked and there are many ways to do so.
 Phishing
 Keylogging
 Ratting
 Social Engineering (the art of Human Hacking)
What is Phishing?
 The fraudulent practice of sending emails purporting to be from reputable
companies in order to induce individuals to reveal personal information, such
as passwords and credit card numbers, online”
 This is definition of phishing. Through phishing, somebody can hack your
Facebook account. For example you receive a link from your best friend
asking you to join a community or something else. When you open that link, a
Facebook login page opens which asks you for your username and password
and you fill those fields, these credentials will directly go to your friend. This
is an example of phishing. Basically a fake page pretending to be original.
Keylogging
 Key logging means to capture keystrokes of keyboard.
 This is most simplest definition of key logging. This can be done through
plenty of softwares available on internet. For example if your friend sends
you a file which is actually a virus or a keylogger, when you open it. You are
now trapped and all of your keystrokes will be recorded and will be send back
to the attacker. This is how attackers normally hacks Facebook.
Ratting
 RAT stands for remote administration tool. It is a piece of software that hacks
down the computer system and normally an attacker can steal everything
from your computer. He/she can upload, delete copy, move and can perform
different unauthorized actions. It can also capture keystrokes. Basically the
difference between key logger and ratting is that keylogger can only record
keystrokes while RAT gives complete access to the attacker. Same is the
scenario of your friend sending you a file and then you open it and that’s it.
You are now victim. Thousands of rats and keyloggers are being binded with
other softwares in order to make things look real while they are not.
Thanks for Watching
Clear your Concept, Open your mind for Hacking, and wait for next lecture. :-)

More Related Content

PPTX
Β. Hucking
PPTX
Preventions of Email Hacking
PDF
How to choose a password that’s hard to crack
PPTX
Ethical hacking
PDF
Attack chaining for web exploitation #c0c0n2015
PPTX
Webspoofing
DOCX
hire a hacker
PPTX
Β. Hucking
Preventions of Email Hacking
How to choose a password that’s hard to crack
Ethical hacking
Attack chaining for web exploitation #c0c0n2015
Webspoofing
hire a hacker

What's hot (20)

PDF
Hackingppt 160730081605
PDF
Passwords for sale
PDF
Five habits that might be a cyber security risk
DOC
Kinds of hackers
PPT
Internet Security
PPTX
Cybersecurity Awareness
PPT
Web spoofing (1)
PDF
Social Engineering
PPTX
h@kin9 & vulnerability assessment in android
DOCX
Assignment 4
PPTX
Phishing Attack : A big Threat
PDF
Fire eye spearphishing
PDF
14 tips to increase cybersecurity awareness
PPTX
A presentation on Phishing
PPTX
Email phishing and countermeasures
PPTX
Access control attacks by Yaakub bin Idris
PPTX
Cybersecurity Essentials - Part 2
PDF
Spear phishing attacks-by-hari_krishna
PPTX
security privacy,security,web,internet,prevention from hackers,the onion rout...
Hackingppt 160730081605
Passwords for sale
Five habits that might be a cyber security risk
Kinds of hackers
Internet Security
Cybersecurity Awareness
Web spoofing (1)
Social Engineering
h@kin9 & vulnerability assessment in android
Assignment 4
Phishing Attack : A big Threat
Fire eye spearphishing
14 tips to increase cybersecurity awareness
A presentation on Phishing
Email phishing and countermeasures
Access control attacks by Yaakub bin Idris
Cybersecurity Essentials - Part 2
Spear phishing attacks-by-hari_krishna
security privacy,security,web,internet,prevention from hackers,the onion rout...

Similar to Introduction to Hacking (20)

PDF
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PPTX
Ethical hacking Chapter 1 - Overview.pptx
PDF
Visual hacking is used to visually capture private,sensitive informa.pdf
PPTX
Introduction to intelligence cybersecurity_3
PPT
Virus
PPT
Home cyber security
PDF
Malware and malicious programs
PPTX
What is cyber security
PPTX
Hacking ppt
PPTX
Hacking ppt
PPTX
Ethical hacking ppt
PPTX
Hacking vs cracking
PPTX
Hacking 1
PPTX
Security Pp Cis
PPT
Hacking
PPTX
Kinds of Online-WPS empowerment technologies
PPTX
Hacking
PPTX
CYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTS
DOCX
Ethical hacking
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Ethical hacking Chapter 1 - Overview.pptx
Visual hacking is used to visually capture private,sensitive informa.pdf
Introduction to intelligence cybersecurity_3
Virus
Home cyber security
Malware and malicious programs
What is cyber security
Hacking ppt
Hacking ppt
Ethical hacking ppt
Hacking vs cracking
Hacking 1
Security Pp Cis
Hacking
Kinds of Online-WPS empowerment technologies
Hacking
CYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTS
Ethical hacking

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Cell Types and Its function , kingdom of life
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Complications of Minimal Access Surgery at WLH
PPTX
GDM (1) (1).pptx small presentation for students
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Basic Mud Logging Guide for educational purpose
VCE English Exam - Section C Student Revision Booklet
Cell Types and Its function , kingdom of life
PPH.pptx obstetrics and gynecology in nursing
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
2.FourierTransform-ShortQuestionswithAnswers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Computing-Curriculum for Schools in Ghana
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
RMMM.pdf make it easy to upload and study
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Microbial diseases, their pathogenesis and prophylaxis
102 student loan defaulters named and shamed – Is someone you know on the list?
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Module 4: Burden of Disease Tutorial Slides S2 2025
Complications of Minimal Access Surgery at WLH
GDM (1) (1).pptx small presentation for students

Introduction to Hacking

  • 1. Basic Concept - Hacking Learning Community
  • 2. Introduction  Hacking is an Art of Exploitation. You can say that Getting unauthorized access to Some Online Files, Websites, Emails etc is Hacking, Finding Defects, Flaws, and Vulnerabilities and later exploiting them to get access.  What do you think when you hear the word hacking? You actually think of breaking the security through some Automatic Magical softwares and getting an unauthorized access to systems. Actually it is wrong. We will classify it later and will come to know different types of hacking and hackers.  Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cybersecurity.  Hacking means to check for security holes in order to make security. For example if you want to protect your house from thieves, you will first check the gates of your house and weakness in it before the thieves in order to cover those weakness. Same goes for computer, network and web application hacking.
  • 3. Types of Hackers Black Hat Hackers  Black hat hackers are those hackers that get an unauthorized access to your computers, networks and web applications for their own profit. They are intended to cause damage and steal data. These type of hackers are known as cyber criminals.The most Dangerous Type of Hackers. White Hat Hackers  White hat hackers are known as ethical hackers or the security guys. They check for vulnerabilities and weaknesses in a system in order to patch those flaws legally. They get the permission from the owner of companies in order to test the security.
  • 4. Magic of Facebook Hacking  Well If you are here to learn Facebook hacking, then you are wrong and shouldn’t be here. Hacking is much more than that. Facebook hacking or social networks hacking is not really an easy process. It’s not like that you will be given a software through which you will be able to hack all people. This is absolutely wrong concept. If somebody offers you a software to hack Facebook then he must be spamming or giving you a Trojan. Nothing is impossible. Facebook accounts and all those social networking IDs can be hacked and there are many ways to do so.  Phishing  Keylogging  Ratting  Social Engineering (the art of Human Hacking)
  • 5. What is Phishing?  The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online”  This is definition of phishing. Through phishing, somebody can hack your Facebook account. For example you receive a link from your best friend asking you to join a community or something else. When you open that link, a Facebook login page opens which asks you for your username and password and you fill those fields, these credentials will directly go to your friend. This is an example of phishing. Basically a fake page pretending to be original.
  • 6. Keylogging  Key logging means to capture keystrokes of keyboard.  This is most simplest definition of key logging. This can be done through plenty of softwares available on internet. For example if your friend sends you a file which is actually a virus or a keylogger, when you open it. You are now trapped and all of your keystrokes will be recorded and will be send back to the attacker. This is how attackers normally hacks Facebook.
  • 7. Ratting  RAT stands for remote administration tool. It is a piece of software that hacks down the computer system and normally an attacker can steal everything from your computer. He/she can upload, delete copy, move and can perform different unauthorized actions. It can also capture keystrokes. Basically the difference between key logger and ratting is that keylogger can only record keystrokes while RAT gives complete access to the attacker. Same is the scenario of your friend sending you a file and then you open it and that’s it. You are now victim. Thousands of rats and keyloggers are being binded with other softwares in order to make things look real while they are not.
  • 8. Thanks for Watching Clear your Concept, Open your mind for Hacking, and wait for next lecture. :-)