SlideShare a Scribd company logo
4
Most read
5
Most read
7
Most read
Hackers and
Crackers
Name:- Ashish Duggal
Qualification:- M.C.A.
Topics
 Hackers Definition
 Crackers Definition
 What motivates Hackers &Crackers
 Type of Hackers
 Type of Crackers
Hackers
A hacker is someone who uses his/her
skills and knowledge to find vulnerabilities
in computer systems and helps improve
and patch those vulnerabilities.
They are normally security professionals
who can be hired by organizations to try
and break into their systems, so they can
identify any flaws they may have.
Crackers
A cracker is an individual who attempts to
access computer systems without authorization.
They look for backdoors in programs and
systems, exploit those backdoors, and steal
private information for use in a malicious way.
What motivates Hackers &Crackers
Hackers
 They build secure
environments.
 Know your attacker-
they use same tools,
software and
techniques as
crackers.
 Purely non malicious
and Ethical.
 Utilize their skills for
positive benefits.
Crackers
 They break and
destroy it.
 Are familiar with
ransomware attacks
like phishing email &
malicious
attachment.
 Unethical
 To show off and gain
publicity, or to exploit
and financial motives.
Types of Hackers
1)Black Hats:- A person who violates computer
security for personal gain or maliciousness.
2)White Hats:- A person who hacks into a
computer network in order to test or evaluate
its security systems.
3)Grey Hats:-A person who may sometimes
violates laws but does not have the malicious
intent typical of a black hat hacker.
Types of Crackers
1)Script Kiddie:- A person who uses existing computer
scripts or codes to hack into computers, lacking the
expertise to write their own.
2)Packet Monkey:- A person who intentionally inundates
a website or network with data packets, resulting in a
denial-of-service situation for users of the attacked site or
network.
3)Waret doodz:- Waret doodz get illegal copies of
copyrighted software. Then they distribute it around the
world via several gateways.
Thankyou

More Related Content

PPT
Threats to an information system
PPTX
File Management (1).pptx
PPT
3.2.1 computer security risks
PPTX
Computer Science & Information Systems
PDF
Introduction to Internet
PPT
Emerging trends in it technology
PPTX
Chapter 9 communications and networks
Threats to an information system
File Management (1).pptx
3.2.1 computer security risks
Computer Science & Information Systems
Introduction to Internet
Emerging trends in it technology
Chapter 9 communications and networks

What's hot (20)

PPTX
Ethical Hacking
PPT
Ethical hacking
PPTX
Encryption ppt
PDF
Ethical Hacking Tools
PPTX
MALWARE AND ITS TYPES
PPTX
cyber crime
PPTX
Introduction to cyber security
PPTX
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
PPTX
PPTX
presentation on hacking
PPTX
Cyber crime against property
PPTX
Cyber security system presentation
PPSX
Hacking
PDF
Malicious software
PDF
Society_law_and_ethics.pdf
PPTX
Computer network
PPTX
CYBER SECURITY
PPTX
Hacking and Hacktivism
PPTX
Cyber crime and its types
Ethical Hacking
Ethical hacking
Encryption ppt
Ethical Hacking Tools
MALWARE AND ITS TYPES
cyber crime
Introduction to cyber security
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
presentation on hacking
Cyber crime against property
Cyber security system presentation
Hacking
Malicious software
Society_law_and_ethics.pdf
Computer network
CYBER SECURITY
Hacking and Hacktivism
Cyber crime and its types

Similar to Ethical Hacking - Hackers and crackers (20)

PPTX
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
PPT
Cyber Crime
DOCX
Application of computer to legal practice (hacking)
PPT
CO1-Concept of ethical hacking Explained
PPTX
Types of Hacker
PPT
Hacking Kishor
PPTX
hacker-180906055756.pptx
PPTX
Hacking and privacy threats
PPTX
1861229635078720084665000 131012131913-phpapp02
PPTX
ethical hacking in the modern times
PPTX
Hack and Crack Slide
PPTX
Hacking
PPTX
Ethical hacking 2016
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
About hacker
PPTX
About hackers
PDF
What is a Hacker (part 1): Types, tools and techniques
PPT
Introduction to hackers
PPTX
Mohammed Al Hadi Hacking And Hackers
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
Cyber Crime
Application of computer to legal practice (hacking)
CO1-Concept of ethical hacking Explained
Types of Hacker
Hacking Kishor
hacker-180906055756.pptx
Hacking and privacy threats
1861229635078720084665000 131012131913-phpapp02
ethical hacking in the modern times
Hack and Crack Slide
Hacking
Ethical hacking 2016
Ethical hacking
Ethical hacking
About hacker
About hackers
What is a Hacker (part 1): Types, tools and techniques
Introduction to hackers
Mohammed Al Hadi Hacking And Hackers

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
Computing-Curriculum for Schools in Ghana
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Empowerment Technology for Senior High School Guide
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Final Presentation General Medicine 03-08-2024.pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Computing-Curriculum for Schools in Ghana
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Empowerment Technology for Senior High School Guide
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Paper A Mock Exam 9_ Attempt review.pdf.
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Final Presentation General Medicine 03-08-2024.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Orientation - ARALprogram of Deped to the Parents.pptx
Weekly quiz Compilation Jan -July 25.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx

Ethical Hacking - Hackers and crackers

  • 1. Hackers and Crackers Name:- Ashish Duggal Qualification:- M.C.A.
  • 2. Topics  Hackers Definition  Crackers Definition  What motivates Hackers &Crackers  Type of Hackers  Type of Crackers
  • 3. Hackers A hacker is someone who uses his/her skills and knowledge to find vulnerabilities in computer systems and helps improve and patch those vulnerabilities. They are normally security professionals who can be hired by organizations to try and break into their systems, so they can identify any flaws they may have.
  • 4. Crackers A cracker is an individual who attempts to access computer systems without authorization. They look for backdoors in programs and systems, exploit those backdoors, and steal private information for use in a malicious way.
  • 5. What motivates Hackers &Crackers Hackers  They build secure environments.  Know your attacker- they use same tools, software and techniques as crackers.  Purely non malicious and Ethical.  Utilize their skills for positive benefits. Crackers  They break and destroy it.  Are familiar with ransomware attacks like phishing email & malicious attachment.  Unethical  To show off and gain publicity, or to exploit and financial motives.
  • 6. Types of Hackers 1)Black Hats:- A person who violates computer security for personal gain or maliciousness. 2)White Hats:- A person who hacks into a computer network in order to test or evaluate its security systems. 3)Grey Hats:-A person who may sometimes violates laws but does not have the malicious intent typical of a black hat hacker.
  • 7. Types of Crackers 1)Script Kiddie:- A person who uses existing computer scripts or codes to hack into computers, lacking the expertise to write their own. 2)Packet Monkey:- A person who intentionally inundates a website or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network. 3)Waret doodz:- Waret doodz get illegal copies of copyrighted software. Then they distribute it around the world via several gateways.