SlideShare a Scribd company logo
5
Most read
10
Most read
12
Most read
HACKING AND PHISHING
Hacking
Hacking is the practice of modifying the features
of a system, in order to accomplish a goal outside of
the creator's original purpose.
The person who is consistently engaging in hacking
activities, and has accepted hacking as a lifestyle and
philosophy of their choice, is called a Hacker.
Computer hacking is the most popular form of hacking
nowadays, especially in the field of computer security, but
hacking exists in many other forms, such as phone hacking,
brain hacking, etc. and it's not limited to either of them.
Phishing
Phishing is the attempt to acquire sensitive information such
as usernames, passwords, and credit card details (and
sometimes, indirectly, money), often for malicious reasons,
by masquerading as a trustworthy entity in an electronic
communication.
The word is a neologism created as a homophone of
fishing due to the similarity of using a bait in an attempt
to catch a victim.
Phishing is a continual threat, and the risk is even
larger in social media such as Facebook, Twitter, and
Google+.
Hacking-A brief study
1971
Cap ‘n Crunch phone
exploit discovered
1988
Morris Internet worm
crashes 6000 servers
1994
$10 million transferred
from CitiBank acounts
1995
Kevin Mitnick sentenced
to 5 years in jail
1996
Unix hacked together
2000
Major websites succumb
to DDoS
2000
15,700 credit and debit
cards stolen from Western
Union (hacked while
database was undergoing
maintanence)
2001
*CodeRed exploited bug in
MS IIS to penetrate and
spread probes
*2nd wave infected 360000
servers in 14 hours
*CodeRed 2 had backdoor
installed to allow remote
control
do they hack
 Deface sites for fun
 Add spammy links to bad web neighbourhood
 Hijack site to add spam,porn,gambling,pay-day
loans content
 Steal sensitive information to sell
 Distribute malware to personal computers
 Use server resources for distributed attacks
TYPES
ADVANTAGES
• Prevents website defacements
• An evolving technique,advancing day by day
• Helps in finding and removing loopholes in cyber
security
• Can be used to recover lost information where
the computer password has been lost
• Teaches that no technology is 100% secure
• To test how good security is on your own network.
DISADVANTAGES
• All depends upon the trustworthiness of the
hacker
• Hiring professionals is expensive
• Criminals can use it to their advantage
• It can harm someone’s privacy
• Its illegal
• Destroy all personal files
INFAMOUS HACKERS
ALBERT GONZALEZ
GARY MCKINNON
JONATHAN JAMES KEVIN MITNICK
KEVIN POULSON
HOW TO PREVENT
• Perform required software updates for your
operating system and web browser. Hackers
attack where they see weakness....
• Install a firewall on your computer. ...
• Change your passwords often. ...
• Purchase or download anti-virus software…
• Install anti-spyware/adware programs onto
your system....
• Delete emails from unknown sources.
PHISHING-A
BRIEF STUDY
HISTORY
Phreaking+ Fishing=Phishing
 Phreaking – making phone calls for free back in 70s
 Fishing – use bait to lure the target
1995
Target: AOL users
Purpose: getting account passwords for free time
Technique:similar names,social engineering
2001
Target :Ebayers and major bank
Purpose : getting credit card numbers,accounts
Techniques : same as in 1995,keylogger
2007
Target:Paypal,banks,ebay
Purpose:bank account
Techniques:browser vulnerabilities,link obfuscation
HOW
• Conducted by email
• Receive an authentic-looking email message that
appears to come from a legitimate business
• Ask you to divulge or verify personal data such as an
account number,password,credit card or social
security number
• Possible for you to be phished by mail,telephone,or
even in person
• Through the use of Instant Messaging (IM),which can
also be used for identity theft as well as spreading
viruses and spyware
HACKING AND PHISHING
HACKING AND PHISHING
TYPES
PROBLEMS
• Fraudulently acquire sensitive information using social
engineering and technical subterfuge
• Tries to trick users with official-looking messages
 Credit card
 Bank account
 Ebay
 Paypal
• Some phishing mails also contain malicious software
that track your activities or slow your computer
HOW TO PREVENT
• Never entertain unsolicited emails,calls or SMS
• Your bank will never ask you for confidential
information via emails,calls or texts.If you receive
any such communication,report it to your bank
• Avoid accessing websites via links in email
messages;especially those asking for personal
information.It is always safe to type the URL
manually
• Do not fill any kind of form that comes along with an
email
BEWARE!!!
Presented by
Santhuana.S.G

More Related Content

PPT
Адитивно и суптрактивно мешање на боите
PPTX
Badshahi mosque
PDF
Manual de luminotecnia para Interiores
PPTX
Tanjore temple
PPT
American art presentation
PPT
Impressionism
PPTX
Mussorgsky presentation
PPS
Александър Сергеевич Пушкин
Адитивно и суптрактивно мешање на боите
Badshahi mosque
Manual de luminotecnia para Interiores
Tanjore temple
American art presentation
Impressionism
Mussorgsky presentation
Александър Сергеевич Пушкин

Similar to HACKING AND PHISHING (20)

PPTX
Hacking Presentation v2 By Raffi
PDF
Security Primer
PPTX
Cyber Security PPT and how to be aware from hackers
PPTX
Unveiling the dark web. The importance of your cybersecurity posture
PPTX
Crontab Cyber Security session 4
PPTX
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
PPTX
CYBER CRIME AND SECURITY MAYUR.pptx
PPTX
Cyberstalking CyberstalkingCyberstalking
PPSX
csa2014 IBC
PPT
Cyber crimes
PPTX
CYBER.pptx
PPTX
PDF
NCERT Ransomeware and malware attacks.pdf
PPTX
Nep bnu bca unit 2: Cyber Crimes and Cyber Law.pptx
PDF
Ch 1 intro to cyber crime and cyber security.pdf
PPTX
Cyber Crime Cyber Space and Effects .pptx
PPTX
Cyber Crime, Cyber Space and Effects .pptx
PPTX
Presentation_on_cybersecurity_AKTU_UP.pptx
PPTX
Cybercrimes
PPTX
Cyber crime
Hacking Presentation v2 By Raffi
Security Primer
Cyber Security PPT and how to be aware from hackers
Unveiling the dark web. The importance of your cybersecurity posture
Crontab Cyber Security session 4
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
CYBER CRIME AND SECURITY MAYUR.pptx
Cyberstalking CyberstalkingCyberstalking
csa2014 IBC
Cyber crimes
CYBER.pptx
NCERT Ransomeware and malware attacks.pdf
Nep bnu bca unit 2: Cyber Crimes and Cyber Law.pptx
Ch 1 intro to cyber crime and cyber security.pdf
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
Presentation_on_cybersecurity_AKTU_UP.pptx
Cybercrimes
Cyber crime

Recently uploaded (20)

PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Introduction to Information and Communication Technology
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Internet___Basics___Styled_ presentation
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPT
tcp ip networks nd ip layering assotred slides
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
artificial intelligence overview of it and more
PDF
Testing WebRTC applications at scale.pdf
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Introuction about WHO-FIC in ICD-10.pptx
Paper PDF World Game (s) Great Redesign.pdf
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
introduction about ICD -10 & ICD-11 ppt.pptx
Introduction to Information and Communication Technology
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
The Internet -By the Numbers, Sri Lanka Edition
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Internet___Basics___Styled_ presentation
Introuction about ICD -10 and ICD-11 PPT.pptx
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Job_Card_System_Styled_lorem_ipsum_.pptx
tcp ip networks nd ip layering assotred slides
presentation_pfe-universite-molay-seltan.pptx
Power Point - Lesson 3_2.pptx grad school presentation
artificial intelligence overview of it and more
Testing WebRTC applications at scale.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
APNIC Update, presented at PHNOG 2025 by Shane Hermoso

HACKING AND PHISHING

  • 2. Hacking Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a Hacker. Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
  • 3. Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. The word is a neologism created as a homophone of fishing due to the similarity of using a bait in an attempt to catch a victim. Phishing is a continual threat, and the risk is even larger in social media such as Facebook, Twitter, and Google+.
  • 5. 1971 Cap ‘n Crunch phone exploit discovered 1988 Morris Internet worm crashes 6000 servers 1994 $10 million transferred from CitiBank acounts 1995 Kevin Mitnick sentenced to 5 years in jail 1996 Unix hacked together 2000 Major websites succumb to DDoS 2000 15,700 credit and debit cards stolen from Western Union (hacked while database was undergoing maintanence) 2001 *CodeRed exploited bug in MS IIS to penetrate and spread probes *2nd wave infected 360000 servers in 14 hours *CodeRed 2 had backdoor installed to allow remote control
  • 6. do they hack  Deface sites for fun  Add spammy links to bad web neighbourhood  Hijack site to add spam,porn,gambling,pay-day loans content  Steal sensitive information to sell  Distribute malware to personal computers  Use server resources for distributed attacks
  • 8. ADVANTAGES • Prevents website defacements • An evolving technique,advancing day by day • Helps in finding and removing loopholes in cyber security • Can be used to recover lost information where the computer password has been lost • Teaches that no technology is 100% secure • To test how good security is on your own network.
  • 9. DISADVANTAGES • All depends upon the trustworthiness of the hacker • Hiring professionals is expensive • Criminals can use it to their advantage • It can harm someone’s privacy • Its illegal • Destroy all personal files
  • 10. INFAMOUS HACKERS ALBERT GONZALEZ GARY MCKINNON JONATHAN JAMES KEVIN MITNICK KEVIN POULSON
  • 11. HOW TO PREVENT • Perform required software updates for your operating system and web browser. Hackers attack where they see weakness.... • Install a firewall on your computer. ... • Change your passwords often. ... • Purchase or download anti-virus software… • Install anti-spyware/adware programs onto your system.... • Delete emails from unknown sources.
  • 13. HISTORY Phreaking+ Fishing=Phishing  Phreaking – making phone calls for free back in 70s  Fishing – use bait to lure the target 1995 Target: AOL users Purpose: getting account passwords for free time Technique:similar names,social engineering 2001 Target :Ebayers and major bank Purpose : getting credit card numbers,accounts Techniques : same as in 1995,keylogger 2007 Target:Paypal,banks,ebay Purpose:bank account Techniques:browser vulnerabilities,link obfuscation
  • 14. HOW • Conducted by email • Receive an authentic-looking email message that appears to come from a legitimate business • Ask you to divulge or verify personal data such as an account number,password,credit card or social security number • Possible for you to be phished by mail,telephone,or even in person • Through the use of Instant Messaging (IM),which can also be used for identity theft as well as spreading viruses and spyware
  • 17. TYPES
  • 18. PROBLEMS • Fraudulently acquire sensitive information using social engineering and technical subterfuge • Tries to trick users with official-looking messages  Credit card  Bank account  Ebay  Paypal • Some phishing mails also contain malicious software that track your activities or slow your computer
  • 19. HOW TO PREVENT • Never entertain unsolicited emails,calls or SMS • Your bank will never ask you for confidential information via emails,calls or texts.If you receive any such communication,report it to your bank • Avoid accessing websites via links in email messages;especially those asking for personal information.It is always safe to type the URL manually • Do not fill any kind of form that comes along with an email