SlideShare a Scribd company logo
Presented By 
MISS. KUSAL SONAL K. 
3RD year computer engineering 
Guided By 
Mrs.M.Kokate 
Government polytechnic pune .
1. INTRODUCTION OF HACKING. 
2. WHAT IS HACKING. 
3. TYPES OF HACKING. 
4. TECHNIQUE OF HACKING. 
5. WHAT SHOULD DO AFTER HACKED? 
6. ADVANTAGES AND DISADVANTAGES. 
7. CONCLUSION.
Hacking is the art of exploting computers to 
get access to otherwise unauthorized 
information. 
Now that the world is using IT system to 
gather, store and manipulate important 
information. 
There is also need to make data secure.
1. Hacking is the practice of 
modifying the feature of the system, 
in order to accomplish a goal outside 
of the creators original purpose 
2. A hacker is basically someone who 
breaks into computer networks 
personal computer system for the 
challenge of it.
1. Ethical hacking 
2. Unethical hacking.
1. White hat hacker 
2. Black hat hacker 
3. Grey hat hacker 
4. Elite hat hacker 
5. Neophyte 
6. Blue hat hacker
1. Password cracking 
2. Packet sniffer 
3. Social engineering 
4. Spoofing attack 
5. Rootkit
1. Shutdown the system Or turn off the system 
2. Separate the system from network 
3. Restore the system with the backup Or 
reinstall all program. 
4. Connect the system to the network.
 Can be used to recover lost information 
where the computer password has been 
lost.
 It can harm someone privacy.
Here conclude hacker is good as well as bad 
It is depend upon the minds of hacker. 
There's nothing wrong with the hacker 
knowledge itself, despite its potential 
applications.
Thank you…………!!!!! 
Any question…..?

More Related Content

PDF
Opaque Pointers Are Coming
PPTX
La théorie du multimédia
PPTX
Implantation and placenta formation
PDF
MISE EN PLACE D'UNE SOLUTION INFORMATIQUE ‘ ALSTOM _ ACCUEIL ’
PPTX
The Next Linux Superpower: eBPF Primer
PDF
Openerp pour les grossistes de médicament
PPT
04 implantation
PDF
Mise en place d’une solution de tests de sécurité pour les passerelles réside...
Opaque Pointers Are Coming
La théorie du multimédia
Implantation and placenta formation
MISE EN PLACE D'UNE SOLUTION INFORMATIQUE ‘ ALSTOM _ ACCUEIL ’
The Next Linux Superpower: eBPF Primer
Openerp pour les grossistes de médicament
04 implantation
Mise en place d’une solution de tests de sécurité pour les passerelles réside...

What's hot (20)

PDF
Rapport de stage PFE ( DUT) chez Synthèse Conseil - Jaiti Mohammed
PDF
OpenERP - Gestion de prix de revient
PDF
Rapport de stage
PDF
Administration des services réseaux
PPT
Lecture3
PPS
Implantation (General Embryology)
PDF
Mémoire de fin de formation pour l'obtention du diplome d'ingénieur des trava...
PDF
Le Pare-feu: Limites, Performances et Meilleures Pratiques
PDF
Systèmes d'Exploitation - chp3-gestion mémoire
DOCX
Rapport de PFE mastère PRO
PDF
Conception et réalisation d’un MINI SMART HOME
DOCX
MEMOIRE TIEMOKO BATHILY.docx
PDF
Rapport Mini-Projet Recherche Opérationnelle
PDF
Rapport de Stage PFE - Développement d'un Projet ALTEN MAROC Concernant le Sy...
PPTX
Gametogenisis
PPT
Access formulaires
PDF
Supervision d'un réseau informatique avec Nagios
PDF
T2 corrections-qc md
PDF
Rapport PFE ingénieur réseaux marwen SAADAOUI ( Juin 2018 )
Rapport de stage PFE ( DUT) chez Synthèse Conseil - Jaiti Mohammed
OpenERP - Gestion de prix de revient
Rapport de stage
Administration des services réseaux
Lecture3
Implantation (General Embryology)
Mémoire de fin de formation pour l'obtention du diplome d'ingénieur des trava...
Le Pare-feu: Limites, Performances et Meilleures Pratiques
Systèmes d'Exploitation - chp3-gestion mémoire
Rapport de PFE mastère PRO
Conception et réalisation d’un MINI SMART HOME
MEMOIRE TIEMOKO BATHILY.docx
Rapport Mini-Projet Recherche Opérationnelle
Rapport de Stage PFE - Développement d'un Projet ALTEN MAROC Concernant le Sy...
Gametogenisis
Access formulaires
Supervision d'un réseau informatique avec Nagios
T2 corrections-qc md
Rapport PFE ingénieur réseaux marwen SAADAOUI ( Juin 2018 )

Similar to Hacking (20)

PPTX
Haking PPT
PDF
Hackingppt 160730081605
PPTX
Hacking ppt
PPTX
Hacking ppt
PDF
ethicalhacking1 final.pdf
PPTX
Ethical hacking Presentation
PPTX
Hacking
PPTX
Hacking
PPTX
PPTX
Hacking 1
PPTX
Hacking final
PPTX
Hacking and its types
PPT
Hacking presentation
PPTX
Hacking (basic)
PPTX
PPTX
Hacking & Hackers
PPTX
Hacking & its types
PDF
Hacking
PPTX
how to prevent system from hacking...by sarika
PPTX
Hacking
Haking PPT
Hackingppt 160730081605
Hacking ppt
Hacking ppt
ethicalhacking1 final.pdf
Ethical hacking Presentation
Hacking
Hacking
Hacking 1
Hacking final
Hacking and its types
Hacking presentation
Hacking (basic)
Hacking & Hackers
Hacking & its types
Hacking
how to prevent system from hacking...by sarika
Hacking

Recently uploaded (20)

PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Cell Structure & Organelles in detailed.
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
RMMM.pdf make it easy to upload and study
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Institutional Correction lecture only . . .
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
human mycosis Human fungal infections are called human mycosis..pptx
01-Introduction-to-Information-Management.pdf
Anesthesia in Laparoscopic Surgery in India
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Sports Quiz easy sports quiz sports quiz
GDM (1) (1).pptx small presentation for students
Cell Structure & Organelles in detailed.
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
VCE English Exam - Section C Student Revision Booklet
Final Presentation General Medicine 03-08-2024.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Supply Chain Operations Speaking Notes -ICLT Program
O5-L3 Freight Transport Ops (International) V1.pdf
RMMM.pdf make it easy to upload and study

Hacking

  • 1. Presented By MISS. KUSAL SONAL K. 3RD year computer engineering Guided By Mrs.M.Kokate Government polytechnic pune .
  • 2. 1. INTRODUCTION OF HACKING. 2. WHAT IS HACKING. 3. TYPES OF HACKING. 4. TECHNIQUE OF HACKING. 5. WHAT SHOULD DO AFTER HACKED? 6. ADVANTAGES AND DISADVANTAGES. 7. CONCLUSION.
  • 3. Hacking is the art of exploting computers to get access to otherwise unauthorized information. Now that the world is using IT system to gather, store and manipulate important information. There is also need to make data secure.
  • 4. 1. Hacking is the practice of modifying the feature of the system, in order to accomplish a goal outside of the creators original purpose 2. A hacker is basically someone who breaks into computer networks personal computer system for the challenge of it.
  • 5. 1. Ethical hacking 2. Unethical hacking.
  • 6. 1. White hat hacker 2. Black hat hacker 3. Grey hat hacker 4. Elite hat hacker 5. Neophyte 6. Blue hat hacker
  • 7. 1. Password cracking 2. Packet sniffer 3. Social engineering 4. Spoofing attack 5. Rootkit
  • 8. 1. Shutdown the system Or turn off the system 2. Separate the system from network 3. Restore the system with the backup Or reinstall all program. 4. Connect the system to the network.
  • 9.  Can be used to recover lost information where the computer password has been lost.
  • 10.  It can harm someone privacy.
  • 11. Here conclude hacker is good as well as bad It is depend upon the minds of hacker. There's nothing wrong with the hacker knowledge itself, despite its potential applications.