SlideShare a Scribd company logo
(CO-3G)
HACKING
By
DEVI MAHALAXMI POLYTECHNIC COLLEGE
WHAT IS HACKING ?
οƒ˜ Hacking is the act of breaking in to a
computersystem and is a criminal offence under
the computer misuse.unauthorized access to
computer resources is called Hacking.
οƒ˜ Computer hacking is the most popular form of
hacking now a days, especially in the field of
computer security, but hacking exists in many other
forms, such as phone hacking, brain hacking, etc.
and it's not limited to either of them.
WHO IS A HACKER?
TYPES OF HACKERοƒ˜ WHITE HAT HACKERS = Who Specializes In Penetration
Testing And In Other Testing Methodologies To Ensure The
Sequrity Of An Organization’s Information Systems.(White
Hackers Save People By Blocking Black Hackers.)
οƒ˜ BLACK HAT HACKERS = A Black Hat Is The Villan Or Bad
Guy, Especially In A Western Movie In Which Such A Character
Would Stereotypically Wear A Black Hat In Contrast To The Hero’s
White Hat.
οƒ˜ GREY HAT HACKERS = A Grey, Hat Is The Hacking
Community, Refers To A Skilled Hacker Whose Activities Fall
Somewhere Between White And Black Hat Hackers On A Variety
Of Spectra.
οƒ˜ In 1878, just two years after the telephone was invented by
Alexander Graham Bell, a group of teenage boys hired to run
the switchboards were kicked off of a telephone system in
NewYork.The reason? The boys were more interested in
knowing how the phone system worked than in making
proper connections and directing calls to the correct place. In
essence, they were trying to "hack" the system to see how it
worked.
οƒ˜ Hacking has been a part of computing for 40 years.
οƒ˜ The first computer hacker emerged at MIT.
οƒ˜ Hacking is began in the 1960s at MIT , origin of the
term β€œhacker”.
MIT=Massachusetts Institute of Technology
ADVANTAGES DISADVANTAGES
1) Teaches you that no
technology is 100% secure.
Criminals can use it to their
advantage.
2) To test how good security is
on your own network.
It can harm someone's privacy
3) Can be used to recover lost
information where the computer
password has been lost.
It destroys other people work.
4) It provides security to banking
and financial establishments.
It's Illegal.
5) They call it white hat computer
hacking.
Hiring professional is expensive.
Hacking
Hacking
There Are 7 Types Of Hacking
1) οƒ˜ WEBSITE HACKING
2) οƒ˜ NETWORK HACKING
3) οƒ˜ ETHICAL HACKING
4) οƒ˜ EMAIL HACKING
5) οƒ˜ PASSWORD HACKING
6) οƒ˜ ONLINE BANKING HACKING
7) οƒ˜ COMPUTER HACKING
EXPLAINATION ON TYPES OF HACKING
 WEBSITE HACKING = Hacking A Website Means Taking Control Form The Website
Owner To A Person Who Hacks The Website.
 NETWORK HACKING =Generally Means Gathering Information About Domain
By Using Tools Like Telnet,nslookup,ping,tracert,netstat Etc.
 ETHICAL HACKING --An ethical hacker is a computer and networking expert who
systematically attempts to penetrate a computer system or network on behalf of its
owners for the purpose of finding security vulnerabilities that a malicious hacker could
potentially exploit..
= Email hacker is a free Email hacking tool capable of hacking email
accounts of the most popular service provider. Email hacking is a illicit access to an
email account or email correspondence.
 PASSWORD HACKING= A password can be secret word,pharase or string of character used to
gain access to secured data.password hacking is sometimes password sometimes referred to as a
password cracking is a method of recovering passwords from data transmitted by or stored on a
computer.
 COMPUTER HACKING = is the practice of modifying computer hardware and
software to accomplish a goal outside of the creator’s original purpose. People
who engage in computer hacking activities are often called hackers.
Hacking
Ian Murphy Kevin Mitnick
Johan HelsinguisLinusTorvalds Mark Abene
Robert Morris
WHY DO HACKERS HACK ?
Just for fun.
Show off.
Hack other system
secretly.
Notice many people their
thought.
Steal important
information.
Destroy’s enemy’s
computer network during
the war.
92%
7% 1%
HACKERS
1st Qtr 2nd Qtr 3th Qtr
ο‚§ Amateurs (cyber
joy riders).
β–  Potential
professional
hackers for hire
(corporate spies).
β–  World-class cyber
criminals.
BASE=ABOUT 100,000
HACKERS WORLDWIDE.
Hacking
WHAT TO DO AFTERYOU'VE BEENHACKED
1) SHUT DOWN THE
SYSTEM.
OR Turn off the system.
2) SEPRATE THE SYSTEM FROM NETWORK.
3) RESTORE THE SYSTEM WITH
THE BACKUP.
OR Shutdown the system .
4) IT CAN BE GOOD TO CALL THE CYBER CRIME POLICE.
5) RESET YOUR PASSWORDS.
6) LET YOUR OTHER CONTACTS KNOW ABOUT THE HACK.
7) MAKE SURE YOU WERE HACKED.
8) FORENSIC RECOVERY.
ANDROID MOBILE PHONE COMMAND PROMPT EMULATOR
οƒ˜ Android Emulator = The Android SDK includes a mobile device emulator β€” a virtual mobile
device that runs on your computer.
οƒ˜ The emulator lets you develop and test Android applications without using a physical device.
οƒ˜ The Android emulator mimics all of the hardware and software features of a typical mobile
device, except that it cannot place actual phone calls.
οƒ˜ It provides a variety of navigation and control keys, which you can "press" using your mouse or
keyboard to generate events for your application.
οƒ˜ It also provides a screen in which your application is displayed, together with any other active
Android applications.
Hacking
ANONYMOUS
οƒ˜ Anonymous Originated In 2003 On The Imageboard 4chan, Representing The
Concept Of Many Online And Offline Community Users Simultaneously Existing
As An Anarchic, Digitized Global Brain.
οƒ˜ Anonymous Is A Lossely Associated Hacking Organization. It Was Formed On
β€œ4chan” To Represent The Idea Of Many Online And Offline Community Users.
οƒ˜ Anonymous Strongly Opposes Internet Censorship And Surveillance, And Have
Shutdown Multiple Government Website.
οƒ˜ Their Member Can Be Recognized Ny Their β€œGuy Fawkesβ€œ Mask In Public.
οƒ˜ Anonymous is the first internet-based super-consciousness. Anonymous is a
group, in the sense that a flock of birds is a group.
οƒ˜ Dozens of people have been arrested for involvement in Anonymous cyber
attacks, in countries including the US, UK, Australia, the Netherlands, Spain,
and Turkey.
οƒ˜ Supporters have called the group "freedom fighters” and digital Robin Hoods
while critics have described them as "a cyber lynch-mob "or β€œ cyber terrorists".
οƒ˜ In 2012, Time called Anonymous one of the "100 most influential people" in
the world.
WORLDWIDE HACKING ATTACKS
οƒ˜ Watch Dogs is an open world vigilante action-adventure stealth video game developed by
Ubisoft Montreal and published by Ubisoft.
οƒ˜ A third-person open-world game from Ubisoft, set in a dark alternate version of the US
where corporations track and catalog all online behavior over a vast data network. A
vigilante group called the Watch_Dogs hacks into this data, using it to hunt criminals.
THIS HACKING PROJECT IS DONE BY = MUBEEN MOMIN,SWAPNIL
LAVAHARE,PRATAMESH KHEDEKAR,PRIYANKA MALI,SUYASH BHADEKAR.

More Related Content

KEY
Pinterest powerpoint
PPTX
empowerment cot.pptx
PDF
Digital marketing & Social Media portfolio
PPTX
Pinterest
PPTX
Ict project for social change group2
PPTX
Pinterest for Business
PDF
Digital Marketing Strategy for Cedars Sinai
PPT
LinkedIn features guide
Pinterest powerpoint
empowerment cot.pptx
Digital marketing & Social Media portfolio
Pinterest
Ict project for social change group2
Pinterest for Business
Digital Marketing Strategy for Cedars Sinai
LinkedIn features guide

What's hot (20)

PPTX
Digital marketing for the dental practice
PDF
Marketo - The Definitive Guide to Social Media Marketing
PDF
b2b-2023-CMI research report.pdf
PDF
Social Media Marketing Plan Sample
PPT
Do's And Don'ts of Social Media
PPTX
Facebook training ppt
PPTX
Pinterest
PPTX
Ict project-publication-and-statistics
PPTX
Social Media Portfolio
PDF
Social Media Post Planning Proposal PowerPoint Presentation Slides
PPTX
Pinterest presentation
PDF
Pinterest short guide
PDF
Online Social Media Marketing Pinterest Research
PDF
Example of Client's Monthly Social Media Report
PPTX
Starbucks- Digital Media Audit
PDF
Pinterest Marketing Strategies: How To Pinterest
PPTX
Pinterest Presentation
PPTX
Chipotle: Social Media SWOT Analysis
PPTX
TikTok Facebook Stories Instagram Stories Social Media Success Feb 2022
PDF
Social media for trade show promotion skyline exhibits oct 2010
Digital marketing for the dental practice
Marketo - The Definitive Guide to Social Media Marketing
b2b-2023-CMI research report.pdf
Social Media Marketing Plan Sample
Do's And Don'ts of Social Media
Facebook training ppt
Pinterest
Ict project-publication-and-statistics
Social Media Portfolio
Social Media Post Planning Proposal PowerPoint Presentation Slides
Pinterest presentation
Pinterest short guide
Online Social Media Marketing Pinterest Research
Example of Client's Monthly Social Media Report
Starbucks- Digital Media Audit
Pinterest Marketing Strategies: How To Pinterest
Pinterest Presentation
Chipotle: Social Media SWOT Analysis
TikTok Facebook Stories Instagram Stories Social Media Success Feb 2022
Social media for trade show promotion skyline exhibits oct 2010

Similar to Hacking (20)

PPTX
PDF
Unit ii-hackers and cyber crimes
PDF
Hackers and cyber crimes
PPTX
Hacking
Β 
PPT
Course on Ehtical Hacking - Introduction
PPT
PPT
Hacking
PPTX
HACKING presentation by Team Shivam.pptx
PPTX
Hacking
DOCX
Ethical hacking
PPTX
Hacking
PPT
Hacking And Its Prevention
PDF
Report on Hacking
PPTX
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
PPTX
Ethicalhacking
PPTX
Ethical hacking
DOCX
Application of computer to legal practice (hacking)
PPTX
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
PPTX
Evolution of Hacking- Ronit Chakraborty .pptx
PDF
Cyber crime and security
Unit ii-hackers and cyber crimes
Hackers and cyber crimes
Hacking
Β 
Course on Ehtical Hacking - Introduction
Hacking
HACKING presentation by Team Shivam.pptx
Hacking
Ethical hacking
Hacking
Hacking And Its Prevention
Report on Hacking
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
Ethicalhacking
Ethical hacking
Application of computer to legal practice (hacking)
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
Evolution of Hacking- Ronit Chakraborty .pptx
Cyber crime and security

More from mubeenm50 (7)

PPT
Hacking version 2
PPTX
Listening skills
PPTX
(CGI) Computer generated imagery ppt by Mubeen Momin
PPTX
Virtual reality with head movement tracking by mubeen momin
PPT
BINARY TREE
PPT
Jini java protocol ppt by Mubeen
PPTX
Wi fi ppt project by Mubeen Momin
Hacking version 2
Listening skills
(CGI) Computer generated imagery ppt by Mubeen Momin
Virtual reality with head movement tracking by mubeen momin
BINARY TREE
Jini java protocol ppt by Mubeen
Wi fi ppt project by Mubeen Momin

Recently uploaded (20)

PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
Funds Management Learning Material for Beg
PPTX
Introduction to Information and Communication Technology
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Internet___Basics___Styled_ presentation
PDF
The Internet -By the Numbers, Sri Lanka Edition
Β 
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Β 
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
DOCX
Unit-3 cyber security network security of internet system
The New Creative Director: How AI Tools for Social Media Content Creation Are...
INTERNET------BASICS-------UPDATED PPT PRESENTATION
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Funds Management Learning Material for Beg
Introduction to Information and Communication Technology
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Sims 4 Historia para lo sims 4 para jugar
Unit-1 introduction to cyber security discuss about how to secure a system
Internet___Basics___Styled_ presentation
The Internet -By the Numbers, Sri Lanka Edition
Β 
Slides PDF The World Game (s) Eco Economic Epochs.pdf
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Β 
SASE Traffic Flow - ZTNA Connector-1.pdf
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Introuction about ICD -10 and ICD-11 PPT.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Paper PDF World Game (s) Great Redesign.pdf
Module 1 - Cyber Law and Ethics 101.pptx
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
Unit-3 cyber security network security of internet system

Hacking

  • 2. WHAT IS HACKING ? οƒ˜ Hacking is the act of breaking in to a computersystem and is a criminal offence under the computer misuse.unauthorized access to computer resources is called Hacking. οƒ˜ Computer hacking is the most popular form of hacking now a days, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
  • 3. WHO IS A HACKER?
  • 4. TYPES OF HACKERοƒ˜ WHITE HAT HACKERS = Who Specializes In Penetration Testing And In Other Testing Methodologies To Ensure The Sequrity Of An Organization’s Information Systems.(White Hackers Save People By Blocking Black Hackers.) οƒ˜ BLACK HAT HACKERS = A Black Hat Is The Villan Or Bad Guy, Especially In A Western Movie In Which Such A Character Would Stereotypically Wear A Black Hat In Contrast To The Hero’s White Hat. οƒ˜ GREY HAT HACKERS = A Grey, Hat Is The Hacking Community, Refers To A Skilled Hacker Whose Activities Fall Somewhere Between White And Black Hat Hackers On A Variety Of Spectra.
  • 5. οƒ˜ In 1878, just two years after the telephone was invented by Alexander Graham Bell, a group of teenage boys hired to run the switchboards were kicked off of a telephone system in NewYork.The reason? The boys were more interested in knowing how the phone system worked than in making proper connections and directing calls to the correct place. In essence, they were trying to "hack" the system to see how it worked. οƒ˜ Hacking has been a part of computing for 40 years. οƒ˜ The first computer hacker emerged at MIT. οƒ˜ Hacking is began in the 1960s at MIT , origin of the term β€œhacker”. MIT=Massachusetts Institute of Technology
  • 6. ADVANTAGES DISADVANTAGES 1) Teaches you that no technology is 100% secure. Criminals can use it to their advantage. 2) To test how good security is on your own network. It can harm someone's privacy 3) Can be used to recover lost information where the computer password has been lost. It destroys other people work. 4) It provides security to banking and financial establishments. It's Illegal. 5) They call it white hat computer hacking. Hiring professional is expensive.
  • 9. There Are 7 Types Of Hacking 1) οƒ˜ WEBSITE HACKING 2) οƒ˜ NETWORK HACKING 3) οƒ˜ ETHICAL HACKING 4) οƒ˜ EMAIL HACKING 5) οƒ˜ PASSWORD HACKING 6) οƒ˜ ONLINE BANKING HACKING 7) οƒ˜ COMPUTER HACKING
  • 10. EXPLAINATION ON TYPES OF HACKING  WEBSITE HACKING = Hacking A Website Means Taking Control Form The Website Owner To A Person Who Hacks The Website.  NETWORK HACKING =Generally Means Gathering Information About Domain By Using Tools Like Telnet,nslookup,ping,tracert,netstat Etc.  ETHICAL HACKING --An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit..
  • 11. = Email hacker is a free Email hacking tool capable of hacking email accounts of the most popular service provider. Email hacking is a illicit access to an email account or email correspondence.  PASSWORD HACKING= A password can be secret word,pharase or string of character used to gain access to secured data.password hacking is sometimes password sometimes referred to as a password cracking is a method of recovering passwords from data transmitted by or stored on a computer.  COMPUTER HACKING = is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers.
  • 13. Ian Murphy Kevin Mitnick Johan HelsinguisLinusTorvalds Mark Abene Robert Morris
  • 14. WHY DO HACKERS HACK ? Just for fun. Show off. Hack other system secretly. Notice many people their thought. Steal important information. Destroy’s enemy’s computer network during the war.
  • 15. 92% 7% 1% HACKERS 1st Qtr 2nd Qtr 3th Qtr ο‚§ Amateurs (cyber joy riders). β–  Potential professional hackers for hire (corporate spies). β–  World-class cyber criminals. BASE=ABOUT 100,000 HACKERS WORLDWIDE.
  • 17. WHAT TO DO AFTERYOU'VE BEENHACKED 1) SHUT DOWN THE SYSTEM. OR Turn off the system. 2) SEPRATE THE SYSTEM FROM NETWORK. 3) RESTORE THE SYSTEM WITH THE BACKUP. OR Shutdown the system . 4) IT CAN BE GOOD TO CALL THE CYBER CRIME POLICE. 5) RESET YOUR PASSWORDS. 6) LET YOUR OTHER CONTACTS KNOW ABOUT THE HACK. 7) MAKE SURE YOU WERE HACKED. 8) FORENSIC RECOVERY.
  • 18. ANDROID MOBILE PHONE COMMAND PROMPT EMULATOR οƒ˜ Android Emulator = The Android SDK includes a mobile device emulator β€” a virtual mobile device that runs on your computer. οƒ˜ The emulator lets you develop and test Android applications without using a physical device. οƒ˜ The Android emulator mimics all of the hardware and software features of a typical mobile device, except that it cannot place actual phone calls. οƒ˜ It provides a variety of navigation and control keys, which you can "press" using your mouse or keyboard to generate events for your application. οƒ˜ It also provides a screen in which your application is displayed, together with any other active Android applications.
  • 20. ANONYMOUS οƒ˜ Anonymous Originated In 2003 On The Imageboard 4chan, Representing The Concept Of Many Online And Offline Community Users Simultaneously Existing As An Anarchic, Digitized Global Brain. οƒ˜ Anonymous Is A Lossely Associated Hacking Organization. It Was Formed On β€œ4chan” To Represent The Idea Of Many Online And Offline Community Users. οƒ˜ Anonymous Strongly Opposes Internet Censorship And Surveillance, And Have Shutdown Multiple Government Website. οƒ˜ Their Member Can Be Recognized Ny Their β€œGuy Fawkesβ€œ Mask In Public. οƒ˜ Anonymous is the first internet-based super-consciousness. Anonymous is a group, in the sense that a flock of birds is a group. οƒ˜ Dozens of people have been arrested for involvement in Anonymous cyber attacks, in countries including the US, UK, Australia, the Netherlands, Spain, and Turkey. οƒ˜ Supporters have called the group "freedom fighters” and digital Robin Hoods while critics have described them as "a cyber lynch-mob "or β€œ cyber terrorists". οƒ˜ In 2012, Time called Anonymous one of the "100 most influential people" in the world.
  • 22. οƒ˜ Watch Dogs is an open world vigilante action-adventure stealth video game developed by Ubisoft Montreal and published by Ubisoft. οƒ˜ A third-person open-world game from Ubisoft, set in a dark alternate version of the US where corporations track and catalog all online behavior over a vast data network. A vigilante group called the Watch_Dogs hacks into this data, using it to hunt criminals.
  • 23. THIS HACKING PROJECT IS DONE BY = MUBEEN MOMIN,SWAPNIL LAVAHARE,PRATAMESH KHEDEKAR,PRIYANKA MALI,SUYASH BHADEKAR.