SlideShare a Scribd company logo
Hacking ppt
INTRODUCTION
APPLICATION AREA OF HACKING
ADVANTAGES & DISADVANTAGES
INTRODUCTION
Hacking is the method of breaking into
information system without proper
authentication and permission.
1. 2. 3.
White
hat
Black
hat
Grey
hat
TYPES OF HACKER
White hat
A white hat hacker breaks security for non-malicious reasons, perhaps
to test their own security system or while working for a security
company which makes security software. The term "white hat" in
Internet slang refers to an ethical hacker.
The EC-Council ganizations that have developed certifications,
courseware, classes, and online training covering the diverse arena of
Ethical Hacking.
Black hat
A "black hat" hacker is a hacker who "violates computer security for little reason
beyond maliciousness or for personal gain" (Moore, 2005)..
Black hat hackers are also referred to as the "crackers" within the security industry and
by modern programmers.
Grey hat
A grey hat hacker is a combination of a black hat and a white hat hacker.
A grey hat hacker may surf the internet and hack into a computer
system for the sole purpose of notifying the administrator that their
system has a security defect
They may then offer to correct the defect for a fee.
APPLICATI
ON AREA
OF
HACKING
Password Hacking
Email Hacking
Web Site Hacking
1
2
3
Credit card number Ha4
Password Hacking
A password is a combination of characters that a user uses for protecting
information. Once a file or a determined section of a hard disk is protected by a
password, only those that know it can access it.
1. The most common used tool to hack the password is social engineering. Social
engineering consists in making a user believe that he is giving confidential
information to a trusted party.
2. Another way of Hacking passwords is through a hash function
Email Hacking
Yes, almost anything can be hacked in the Internet. There are several methods for
Hacking yahoo, msn email accounts.
1. One of these methods is social engineering.
2. Hacking yahoo messenger or any other messenger is quite easy if you know the
person’s Email ID.
Credit card Hacking
Credit card Hacking has become one of the new security headaches of
consumers. Although in face to face transactions the percentage of credit card
fraud is almost a tenth of a percent, in online transactions it's as high as two or
three percent.
1. Phishing
2. Through a website.
There are many ways to hack the credit card number. But the following two ways are
often used to hack the number.
Advantages of Hacking
Can be used to recover information where the password has been lost.
• There may be the situation when you can forget your password. At that time
you can get your password by simply Hacking your computers.
To test how good security is on your network / computer.
• As the data is important thing in an organization or in your computer. All of
us want to secure their data. How one can find out whether there system is
secure or not. Th4e answer is simply by Hacking your own system/network.
Disadvantages of Hacking
Criminals can use it to their advantage
• As the data is important thing in an organization / on your computer. Some
criminal can hack you network/system and can be access your data so he/she can
use this data for their use and u have to be face to a big loss.
• If he/she successfully hack your system at that time they can able to enter your
privacy area due to which he/she can access your private data.
It can harm someone's privacy
It's Illegal.
• Accessing some once private data without its permission is a crime, which is
illegal.
It destroys other works
• As competition is increases maintaining the quality and standard is most
important thing. Suppose that you create /make a good project and your opponent
hack your system. At this situation he/she can destroy your work, because of which
you have to face a big loss.
Thanks

More Related Content

DOCX
Final report ethical hacking
PPTX
Hacking
PPTX
Cybercrime (Computer Hacking)
PPT
basic knowhow hacking
DOCX
Ethical Hacking
PPTX
Hacking ppt
PPT
Ethical Hacking and Network Security
PPT
the best hacking ppt
Final report ethical hacking
Hacking
Cybercrime (Computer Hacking)
basic knowhow hacking
Ethical Hacking
Hacking ppt
Ethical Hacking and Network Security
the best hacking ppt

What's hot (20)

PPSX
Hacking
PPTX
Hacking
PPT
TYPES OF HACKING
PPTX
Hacking and Anti Hacking
PPTX
ethical hacking in the modern times
PPTX
Ethical hacking presentation
PPTX
PPTX
Ethical hacking presentation
PPTX
PPT
hacking
PPTX
Ethical hacking ppt
DOCX
Final report ethical hacking
PPTX
Ethical hacking by chandra prakash upadhyay
PPT
Basic of Ethical Hacking and Penetration Testing - 1st Module
PPTX
Hacking ppt
PPTX
Windows Hacking
PPTX
hacking presentation slide
PDF
RTF
Hacking and its types
Hacking
Hacking
TYPES OF HACKING
Hacking and Anti Hacking
ethical hacking in the modern times
Ethical hacking presentation
Ethical hacking presentation
hacking
Ethical hacking ppt
Final report ethical hacking
Ethical hacking by chandra prakash upadhyay
Basic of Ethical Hacking and Penetration Testing - 1st Module
Hacking ppt
Windows Hacking
hacking presentation slide
Hacking and its types

Similar to Hacking ppt (20)

PPTX
Hacking & Hackers
PPTX
PPTX
Haking PPT
PPTX
Hacking and its types
PPTX
Hacking
PPTX
Hacking
PPTX
Hacking Presentation v2 By Raffi
PPTX
Hacking & its types
DOCX
Unit II .docx
PDF
ethicalhacking1 final.pdf
PPTX
Ethical hacking Presentation
PPTX
Hacking
PPTX
HACKING
PPTX
Hacking and its types V2
PPT
Computer hacking
PPTX
Hacking final
PPTX
Hacking (1)
PPTX
Hacking 1
PPT
Hacking
Hacking & Hackers
Haking PPT
Hacking and its types
Hacking
Hacking
Hacking Presentation v2 By Raffi
Hacking & its types
Unit II .docx
ethicalhacking1 final.pdf
Ethical hacking Presentation
Hacking
HACKING
Hacking and its types V2
Computer hacking
Hacking final
Hacking (1)
Hacking 1
Hacking

Recently uploaded (20)

PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Lecture Notes Electrical Wiring System Components
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPT
Project quality management in manufacturing
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Geodesy 1.pptx...............................................
Automation-in-Manufacturing-Chapter-Introduction.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Lecture Notes Electrical Wiring System Components
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
UNIT 4 Total Quality Management .pptx
CH1 Production IntroductoryConcepts.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Project quality management in manufacturing
R24 SURVEYING LAB MANUAL for civil enggi
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Model Code of Practice - Construction Work - 21102022 .pdf
Internet of Things (IOT) - A guide to understanding
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Mechanical Engineering MATERIALS Selection
additive manufacturing of ss316l using mig welding
Geodesy 1.pptx...............................................

Hacking ppt

  • 2. INTRODUCTION APPLICATION AREA OF HACKING ADVANTAGES & DISADVANTAGES
  • 4. Hacking is the method of breaking into information system without proper authentication and permission.
  • 6. White hat A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. The EC-Council ganizations that have developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.
  • 7. Black hat A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005).. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers.
  • 8. Grey hat A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect They may then offer to correct the defect for a fee.
  • 9. APPLICATI ON AREA OF HACKING Password Hacking Email Hacking Web Site Hacking 1 2 3 Credit card number Ha4
  • 10. Password Hacking A password is a combination of characters that a user uses for protecting information. Once a file or a determined section of a hard disk is protected by a password, only those that know it can access it. 1. The most common used tool to hack the password is social engineering. Social engineering consists in making a user believe that he is giving confidential information to a trusted party. 2. Another way of Hacking passwords is through a hash function
  • 11. Email Hacking Yes, almost anything can be hacked in the Internet. There are several methods for Hacking yahoo, msn email accounts. 1. One of these methods is social engineering. 2. Hacking yahoo messenger or any other messenger is quite easy if you know the person’s Email ID.
  • 12. Credit card Hacking Credit card Hacking has become one of the new security headaches of consumers. Although in face to face transactions the percentage of credit card fraud is almost a tenth of a percent, in online transactions it's as high as two or three percent. 1. Phishing 2. Through a website. There are many ways to hack the credit card number. But the following two ways are often used to hack the number.
  • 13. Advantages of Hacking Can be used to recover information where the password has been lost. • There may be the situation when you can forget your password. At that time you can get your password by simply Hacking your computers. To test how good security is on your network / computer. • As the data is important thing in an organization or in your computer. All of us want to secure their data. How one can find out whether there system is secure or not. Th4e answer is simply by Hacking your own system/network.
  • 14. Disadvantages of Hacking Criminals can use it to their advantage • As the data is important thing in an organization / on your computer. Some criminal can hack you network/system and can be access your data so he/she can use this data for their use and u have to be face to a big loss. • If he/she successfully hack your system at that time they can able to enter your privacy area due to which he/she can access your private data. It can harm someone's privacy It's Illegal. • Accessing some once private data without its permission is a crime, which is illegal. It destroys other works • As competition is increases maintaining the quality and standard is most important thing. Suppose that you create /make a good project and your opponent hack your system. At this situation he/she can destroy your work, because of which you have to face a big loss.