SlideShare a Scribd company logo
Hamza Javed
BCS 4th
2121-115001
Hacking
Preston University Kohat
HACKING
Contents
 History of Hacking
 What is Hacking?
 Who is Hacker?
 Famous hackers in history
 Why do Hackers hack?
 Types of Hacking
 How to give a password to account
 What should do after hacked
 How to secure our data
 Advantages of Hacking
 Disadvantages of Hacking
 Conclusion
 References
History of Hacking
Hacking has been a part of computing for 40 years.
The first computer hacker emerged at MIT.
Hacking is began in the 1960s at MIT , origin of the term
“hacker”.
The truth hacker amongst our societies have thirst for the
knowledge .
Boredom is never an object of challenge for the hacker
What is Hacking ?
The Process of attempting to gain or successfully
gaining, unauthorized access to computer resources is
called Hacking.
Hacking and its types
Who is a hacker?
In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
The term hacker is reclaimed by computer programmers who
argue that someone breaking into computers is better called a
cracker.
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds
Mark Abene Robert Morris
Why do hackers hack ?
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network
during the war.
Types of Hacking
 Website Hacking
 Network Hacking
 Ethical Hacking
 Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
Hacking and its types
Website Hacking
Hacking a website means taking control from the
website owner to a person who hacks the website.
Network Hacking
Network Hacking
 Network Hacking is generally means gathering
information about domain by using tools like Telnet, Ns
look UP, Ping, Tracert, Netstat, etc… over the network.
Hacking and its types
Ethical Hacking
Ethical hacking is where a person hacks to find
weaknesses in a system and then usually patches them.
Hacking and its types
Email Hacking
 Email hacking is illicit access to an email account or
email correspondence.
Hacking and its types
Password Hacking
Password Hacking Password cracking is the process of
recovering secret passwords from data that has been
stored in or transmitted by a computer system.
Hacking and its types
Online Banking Hacking
Online banking Hacking Unauthorized accessing bank
accounts without knowing the password or without
permission of account holder is known as Online banking
hacking.
Hacking and its types
Computer Hacking
 Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.
What should do after hacked?
 Shutdown the system Or turn off the
system
 Separate the system from network
 Restore the system with the backup
Or reinstall all programs

 Connect the system to the network
 It can be good to call the police
How to give a password to account
Use unique passwords for your accounts.
Choose a combination of letters, numbers, or symbols to
create a unique password.
How to secure our data
1 -> i or l
3 -> e
4 -> a
+ -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
c -> [
f -> ph
ph -> f
x -> ck
ck -> x
How to secure our data (cont)
Ex.
1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur
pi4||.
I transferred Rs.100000 to your account, So go ahead as our plan.
Advantages of hacking
 Can be used to recover lost information where the computer password
has been lost.
 Teaches you that no technology is 100% secure.
 To test how good security is on your own network.
 They call it white hat computer hacking.
Disadvantages of Hacking
 Criminals can use it to their advantage.
 It can harm someone's privacy
 It's Illegal
Conclusion
Keep your password protected. Write your password should be
with combination of characters, digits, special symbols. Do not
respond to feck on fishing email. when you are doing any online
transaction always keep watch on site whether the protocol of
site is HTTP & whether there is a lock symbol .
References
 www.wikipedia.org/wiki/Hacker
 www.wikipedia.org/wiki/Hacking
Thank You

More Related Content

PPTX
Hacking
PPTX
Hacking
PPTX
Hacking
PPTX
Cybercrime (Computer Hacking)
PPTX
ODP
Introduction To Hacking
PPT
Hacker
PPTX
Is hacking good or bad
Hacking
Hacking
Hacking
Cybercrime (Computer Hacking)
Introduction To Hacking
Hacker
Is hacking good or bad

What's hot (20)

RTF
Hacking and its types
PPT
Hacking And EthicalHacking By Satish
PPTX
Hacking and its types V2
PPTX
Hacking
PPT
Hacking version 2
DOC
Kinds of hackers
PPTX
Hacker&cracker
PPTX
Computer and Internet hacking
PPTX
HACKING
PPTX
Hacking ppt
PPTX
Hacking 1
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPTX
PPTX
Hacking & its types
PPTX
Hacking
PPSX
Hacking
PPTX
how to prevent system from hacking...by sarika
PPTX
Haking PPT
PPTX
PDF
Hacking and its types
Hacking And EthicalHacking By Satish
Hacking and its types V2
Hacking
Hacking version 2
Kinds of hackers
Hacker&cracker
Computer and Internet hacking
HACKING
Hacking ppt
Hacking 1
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking & its types
Hacking
Hacking
how to prevent system from hacking...by sarika
Haking PPT

Similar to Hacking and its types (20)

PPTX
Hacking
PDF
Hacking
PPTX
Hacking and Online Security
PPTX
Ethical hacking Chapter 1 - Overview.pptx
PPTX
Hacking & Hackers
PPTX
Hacking computer crime
PDF
Hacking
PDF
Hacking
PPTX
Hacking
PPTX
PowerPoint Presentation: Hacking
PPTX
Hacking & Attack vector
PPTX
Ethical hacking
PPTX
Cyber hacking dev days by aes team
PPTX
Hacking Presentation v2 By Raffi
DOCX
Unit II .docx
PPTX
Engineering report ca2_Kritakbiswas.pptx
PPTX
Hacking- Ethical/ Non-ethical, Cyber Security.
PPTX
ethical hacking
PPTX
HACKING AND ITS TYPES.pptx
PPTX
Ethical hacking
Hacking
Hacking
Hacking and Online Security
Ethical hacking Chapter 1 - Overview.pptx
Hacking & Hackers
Hacking computer crime
Hacking
Hacking
Hacking
PowerPoint Presentation: Hacking
Hacking & Attack vector
Ethical hacking
Cyber hacking dev days by aes team
Hacking Presentation v2 By Raffi
Unit II .docx
Engineering report ca2_Kritakbiswas.pptx
Hacking- Ethical/ Non-ethical, Cyber Security.
ethical hacking
HACKING AND ITS TYPES.pptx
Ethical hacking

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation theory and applications.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPT
Teaching material agriculture food technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
sap open course for s4hana steps from ECC to s4
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Cloud computing and distributed systems.
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Teaching material agriculture food technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
sap open course for s4hana steps from ECC to s4
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
Cloud computing and distributed systems.
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Reach Out and Touch Someone: Haptics and Empathic Computing

Hacking and its types

  • 3. Contents  History of Hacking  What is Hacking?  Who is Hacker?  Famous hackers in history  Why do Hackers hack?  Types of Hacking  How to give a password to account  What should do after hacked  How to secure our data  Advantages of Hacking  Disadvantages of Hacking  Conclusion  References
  • 4. History of Hacking Hacking has been a part of computing for 40 years. The first computer hacker emerged at MIT. Hacking is began in the 1960s at MIT , origin of the term “hacker”. The truth hacker amongst our societies have thirst for the knowledge . Boredom is never an object of challenge for the hacker
  • 5. What is Hacking ? The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking.
  • 7. Who is a hacker? In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 8. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis LinusTorvalds Mark Abene Robert Morris
  • 9. Why do hackers hack ?  Just for fun.  Show off.  Hack other systems secretly.  Notify many people their thought.  Steal important information.  Destroy enemy’s computer network during the war.
  • 10. Types of Hacking  Website Hacking  Network Hacking  Ethical Hacking  Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 12. Website Hacking Hacking a website means taking control from the website owner to a person who hacks the website.
  • 14. Network Hacking  Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
  • 16. Ethical Hacking Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
  • 18. Email Hacking  Email hacking is illicit access to an email account or email correspondence.
  • 20. Password Hacking Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 22. Online Banking Hacking Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
  • 24. Computer Hacking  Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
  • 25. What should do after hacked?  Shutdown the system Or turn off the system  Separate the system from network  Restore the system with the backup Or reinstall all programs   Connect the system to the network  It can be good to call the police
  • 26. How to give a password to account Use unique passwords for your accounts. Choose a combination of letters, numbers, or symbols to create a unique password.
  • 27. How to secure our data 1 -> i or l 3 -> e 4 -> a + -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z c -> [ f -> ph ph -> f x -> ck ck -> x
  • 28. How to secure our data (cont) Ex. 1 +r4||$ph3rr3d R$ iooooo +0 y0ur 4[[0u||+ , $0 90 4h43d 4$ 0ur pi4||. I transferred Rs.100000 to your account, So go ahead as our plan.
  • 29. Advantages of hacking  Can be used to recover lost information where the computer password has been lost.  Teaches you that no technology is 100% secure.  To test how good security is on your own network.  They call it white hat computer hacking.
  • 30. Disadvantages of Hacking  Criminals can use it to their advantage.  It can harm someone's privacy  It's Illegal
  • 31. Conclusion Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transaction always keep watch on site whether the protocol of site is HTTP & whether there is a lock symbol .