SlideShare a Scribd company logo
2
Most read
3
Most read
11
Most read
A PRESENTATION ON
HACKING
BY J NAGA SAI
INTRODUCTION :
• What is HACKING?
• The Process of attempting to gain or successfully gaining,
unauthorized access to computer resources is called Hacking.
• Hacking is technique in which, any one can access any one’s computer
without his/her permission.
• A Hacker knows all about the operating system and different holes in
the system.
TYPES OF HACKING :
• Website Hacking
• Email Hacking
• Network Hacking
• Password hacking
• Online Banking Hacking
• Computer Hacking
WEBSITE HACKING :
WEBSITE HACKING :
• Hacking a website means taking control over the website from owner to a
person who hacks the website.
• The hacker will get the username and password and the hacker will use that
website for any purpose which may sometimes to destroy some valuable
information database.
EMAIL HACKING :
EMAIL HACKING :
• Email hacking is illicit access to an email account or email correspondence.
• Ways of Email Hacking
• Personal Information
• Social Hacking
• Phishing/ Hacking Software
• Trojan Virus etc.
• Email may be protected by methods such as a strong password, encryption of
the contents or a digital signature.
• An email disclaimer may be used to warn unauthorized readers but these are
thought to be ineffective
NETWORK HACKING :
NETWORK HACKING :
• Network Hacking is generally means gathering information about domain by
using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the
network.
• It also include OS Fingerprinting, Port Scanning, Port Surfing using various
Tools.
• These are the three most common methods of hacking a wireless network:
• Sniffing
• Spoofing
• Encryption Cracking
PASSWORD HACKING:
• Password cracking is the process of recovering secret passwords from data that
has been stored in or transmitted by a computer system. A common approach is
to repeatedly try guesses for the password.
• Most passwords can be cracked by using following techniques:
• Hashing
• Guessing
• Default Passwords
• Brute Force
• Phishing
ONLINE BANKING HACKING :
• Unauthorized accessing bank accounts without knowing the password or without
permission of account holder is known as Online banking hacking.
• A bank account can be accessed in many ways.
When someone gets access to your
account, that person can take
all your funds without your
knowledge.
HERE ARE FIVE SIMPLE TIPS THAT WILL HELP
PROTECT YOUR ONLINE ACCOUNTS:
• Use Strong Password
• Protect your Computer
• Keep an eye on running processes
• Download with care
• Be careful when using unprotected public networks
COMPUTER HACKING :
COMPUTER HACKING :
• Computer Hacking is when files on your computer are viewed, created, or
edited without your authorization.
• People can gain complete access to your computer from any where in the
world if your computer is turned on, unprotected, and has an internet
connection. What they do, is up to them.
• Remote desktop connection technique.
ETHICAL HACKERS :
• A person who hacks into a computer network in order to test or evaluate its
security, rather than with
malicious or criminal intent.
WHAT DO ETHICAL HACKERS DO?
• An ethical hacker’s evaluation of a system security seeks answers to these
basic questions:
What can an intruder see on that target system?
What are you trying to protect?
What can an intruder do with that information?
CONCLUSION :
Proper ethical hackers should be employed.
Do not expose your passwords to untrusted sites.
Practice using exact web address.
Close your internet while not in use.
THANK YOU

More Related Content

PPTX
Hacking
PPT
All about Hacking
PPSX
Information Security and Ethical Hacking
PPSX
Hacking
PPTX
Ethical hacking ppt by shantanu arora
PPTX
Hacking
PPTX
Ethical Hacking
PPT
Ethical Hacking
Hacking
All about Hacking
Information Security and Ethical Hacking
Hacking
Ethical hacking ppt by shantanu arora
Hacking
Ethical Hacking
Ethical Hacking

What's hot (20)

PPT
PPTX
Ethical hacking presentation
PPT
hacking
PPTX
Ethical Hacking
PPTX
Ethical hacking
PPT
Ethical Hacking Powerpoint
PPTX
Phishing
PPT
Ethical hacking
PPTX
ethical hacking in the modern times
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPTX
Ethical hacking
PPT
Course on Ehtical Hacking - Introduction
PPTX
Hacking
PPTX
An introduction to denial of service attacks
PPTX
Ethical Hacking
PPTX
PPTX
Cyber Crime And Security
DOCX
ethical hacking report
PPTX
Presentation on Ethical Hacking ppt
Ethical hacking presentation
hacking
Ethical Hacking
Ethical hacking
Ethical Hacking Powerpoint
Phishing
Ethical hacking
ethical hacking in the modern times
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Ethical hacking
Course on Ehtical Hacking - Introduction
Hacking
An introduction to denial of service attacks
Ethical Hacking
Cyber Crime And Security
ethical hacking report
Presentation on Ethical Hacking ppt

Viewers also liked (20)

PPSX
Ethical Hacking, Its relevance and Its Prospects
PDF
Hackers vs Hackers
PDF
7 Signs that Tell your Computer has been Hacked
PPTX
Unblocking the brain so you can think creatively
PPTX
Hacking and Anti Hacking
PPTX
How the camera on your cellphone can be captured and used to spy on you
PPTX
Social media privacy
PPTX
PDF
Privacy and Social Media
PDF
How to know you was hacked
PPTX
hacking presentation slide
PDF
Amplitude Modulation using Multipliers and Envelope Detector
PPTX
Spies and secret codes gisela palenzuela
PPTX
Protection from hacking attacks
PDF
Hackers and Hacking a brief overview 5-26-2016
PPTX
PSK (PHASE SHIFT KEYING )
PDF
Mobile Hacking
PDF
Wi-fi Hacking
PPT
Blue eye technology
PPTX
Blue brain
Ethical Hacking, Its relevance and Its Prospects
Hackers vs Hackers
7 Signs that Tell your Computer has been Hacked
Unblocking the brain so you can think creatively
Hacking and Anti Hacking
How the camera on your cellphone can be captured and used to spy on you
Social media privacy
Privacy and Social Media
How to know you was hacked
hacking presentation slide
Amplitude Modulation using Multipliers and Envelope Detector
Spies and secret codes gisela palenzuela
Protection from hacking attacks
Hackers and Hacking a brief overview 5-26-2016
PSK (PHASE SHIFT KEYING )
Mobile Hacking
Wi-fi Hacking
Blue eye technology
Blue brain

Similar to Hacking (20)

PPTX
Hacking
PPTX
Hacking & Hackers
PPTX
Hacking
PPTX
PowerPoint Presentation: Hacking
PPTX
Hacking & Attack vector
PPTX
Hacking- Ethical/ Non-ethical, Cyber Security.
PDF
Hacking
PDF
Hacking
PDF
ethicalhacking1 final.pdf
PPTX
Ethical hacking Presentation
PPTX
Haking PPT
PPTX
Hacking and Online Security
PPT
Hacking
PPTX
Hacking
PPTX
Hacking & its types
PPTX
Hacking Presentation v2 By Raffi
DOCX
Unit II .docx
PPTX
Hacking 1
PPTX
Hacking and its types
Hacking
Hacking & Hackers
Hacking
PowerPoint Presentation: Hacking
Hacking & Attack vector
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking
Hacking
ethicalhacking1 final.pdf
Ethical hacking Presentation
Haking PPT
Hacking and Online Security
Hacking
Hacking
Hacking & its types
Hacking Presentation v2 By Raffi
Unit II .docx
Hacking 1
Hacking and its types

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
KodekX | Application Modernization Development
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
Teaching material agriculture food technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
Reach Out and Touch Someone: Haptics and Empathic Computing
The AUB Centre for AI in Media Proposal.docx
sap open course for s4hana steps from ECC to s4
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KodekX | Application Modernization Development
Per capita expenditure prediction using model stacking based on satellite ima...
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Teaching material agriculture food technology
MIND Revenue Release Quarter 2 2025 Press Release
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation

Hacking

  • 2. INTRODUCTION : • What is HACKING? • The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking. • Hacking is technique in which, any one can access any one’s computer without his/her permission. • A Hacker knows all about the operating system and different holes in the system.
  • 3. TYPES OF HACKING : • Website Hacking • Email Hacking • Network Hacking • Password hacking • Online Banking Hacking • Computer Hacking
  • 5. WEBSITE HACKING : • Hacking a website means taking control over the website from owner to a person who hacks the website. • The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information database.
  • 7. EMAIL HACKING : • Email hacking is illicit access to an email account or email correspondence. • Ways of Email Hacking • Personal Information • Social Hacking • Phishing/ Hacking Software • Trojan Virus etc. • Email may be protected by methods such as a strong password, encryption of the contents or a digital signature. • An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective
  • 9. NETWORK HACKING : • Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network. • It also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools. • These are the three most common methods of hacking a wireless network: • Sniffing • Spoofing • Encryption Cracking
  • 10. PASSWORD HACKING: • Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. • Most passwords can be cracked by using following techniques: • Hashing • Guessing • Default Passwords • Brute Force • Phishing
  • 11. ONLINE BANKING HACKING : • Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking. • A bank account can be accessed in many ways. When someone gets access to your account, that person can take all your funds without your knowledge.
  • 12. HERE ARE FIVE SIMPLE TIPS THAT WILL HELP PROTECT YOUR ONLINE ACCOUNTS: • Use Strong Password • Protect your Computer • Keep an eye on running processes • Download with care • Be careful when using unprotected public networks
  • 14. COMPUTER HACKING : • Computer Hacking is when files on your computer are viewed, created, or edited without your authorization. • People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them. • Remote desktop connection technique.
  • 15. ETHICAL HACKERS : • A person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent.
  • 16. WHAT DO ETHICAL HACKERS DO? • An ethical hacker’s evaluation of a system security seeks answers to these basic questions: What can an intruder see on that target system? What are you trying to protect? What can an intruder do with that information?
  • 17. CONCLUSION : Proper ethical hackers should be employed. Do not expose your passwords to untrusted sites. Practice using exact web address. Close your internet while not in use.