SlideShare a Scribd company logo
2
Most read
5
Most read
6
Most read
Ameesha Indusarani
1
 Hacking
• Evolution of hacking
• What is called “Hacking”?
 Hacker
• What is called a “Hacker”?
• Types of Hackers
 Hacking types
• Types of Hacking
 Hacking Tools
• Tools in Hacking
 How to secure devices from hacks?
• 18 ways to secure devices from hackers
 For Extra Knowledge
2
 Evolution of Hacking
 The very first hack came in 1878 when the phone company, Bell Telephone, was started.
 A group of teenage boys, hired to run the switch boards, would disconnect or misdirect calls.
The first authentic computer hackers came in the 1960s……….In the 1970s, the world was
pinned and ready for hackers.
 During those times, computers were mainframes, locked away in temperature controlled,
glassed in areas. It cost a lot of money to run these machines, so programmers had limited
access to them. The smarter students, usually MIT students, had an insatiable curiosity about
how things worked.
 So, the smartest ones created what they called “Hacks”, programming shortcuts, to complete
computing tasks more quickly.
3
4
What is called a “Hacker”?
A person/user who uses computers to gain unauthorized access to data.
A Hacker is just a person who uses computer programming of technical
skills to overcome a challenge or problem.
A hacker is someone able to break into a banking computer system.
A computer user who attempts to gain unauthorized access to files in
various systems.
5
• White Hat Hacker
• Black Hat Hacker
• Grey Hat Hacker
• Red Hat Hacker
• Hacktivist
• Script Kiddie
6
(Hacker)
(Cracker)
7
(Most common technique used by hackers)
(Most popular technique used by hackers)
 A hacking tool is a program or utility designed to assist a hacker with hacking. It
also can be proactively utilized to protect a network or computer from Hackers.
• Netsparker
• Metasploit Framework
• Nmap
• OpenSSH
• Wireshark
• Nessus
• Aircrack-ng
• Snort
• John the ripper
• Ettercap
8
9
• The Hacker News.
• WeLiveSecurity.
• HackerOne.
• Latest Hacking News.
• KitPloit.
• KnowBe4.
• (ISC)² Blog.
• GBHackers On Security.
• Google Gruyere. Google Gruyere is a hackable website
developed by the internet giant itself.
• HackThis. Not many websites actively invite you to hack them
in their title, but HackThis is one exception. bWAPP. ...
• OverTheWire.
• Hack This Site.
• Turn off Bluetooth.
• Don’t use unsecured public Wi-Fi.
• Get a security app.
• Use a better passcode.
• Switch off autocomplete.
• Clean your browsing history.
1
0
 The Different Hacking Groups Hacking are a staple of cybersecurity culture.
 Anonymous – Anonymous is perhaps the most iconic and popular hacking group in this list.
• Chaos Computer Club
• Homebrew Computer Club
• Legion of Doom
• Masters of Deception
• Lizard Squad
 Kevin Mitnick
• Kevin Mitnick likely holds the little as the world’s best hacker ever. Kevin Metnick started hacking at
an early age. He brock in to the realm of public attention in the 1980 after he hacked into the North
American Defense Command (NORAD). 11
Thank you
12

More Related Content

PDF
Ethical Hacking Tools
PDF
The Secret Of Hacking Trial Pages
PPTX
Computer Hacking - An Introduction
PPTX
Ethical hacking
PDF
Social engineering attacks
PPTX
CSE-Ethical-Hacking-ppt.pptx
ODP
Ethical hacking ppt
PPTX
Botnets
Ethical Hacking Tools
The Secret Of Hacking Trial Pages
Computer Hacking - An Introduction
Ethical hacking
Social engineering attacks
CSE-Ethical-Hacking-ppt.pptx
Ethical hacking ppt
Botnets

What's hot (20)

PDF
Ethical hacking
PDF
Ethical hacking and social engineering
PPTX
Ethical hacking
PPTX
Hacking
PPTX
Honeypot a trap to hackers
PPSX
Information Security and Ethical Hacking
PPT
Ethical Hacking Powerpoint
PPTX
Malware analysis
PPTX
Hacking ppt
PPT
Hacking And Its Prevention
PPTX
Cyber security
PPTX
Ethical Hacking
PPTX
PPTX
Ethical Hacking
PPTX
Hacking and Hackers
PPT
Botnet Detection Techniques
PPT
Ethical hacking
PPTX
Hacking
PPTX
Ethical hacking
Ethical hacking
Ethical hacking and social engineering
Ethical hacking
Hacking
Honeypot a trap to hackers
Information Security and Ethical Hacking
Ethical Hacking Powerpoint
Malware analysis
Hacking ppt
Hacking And Its Prevention
Cyber security
Ethical Hacking
Ethical Hacking
Hacking and Hackers
Botnet Detection Techniques
Ethical hacking
Hacking
Ethical hacking

Similar to "Hacking" (20)

PPTX
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
PDF
What is a Hacker (part 1): Types, tools and techniques
PPTX
PPTX
PPTX
Hacking
PPTX
Ethical hacking
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPTX
Over View of Hacking by Rajasekhara reddy
PPTX
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
PPT
All about Hacking
PPTX
Hacking
PPTX
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Dhams hacking
PPTX
hacking basics
PPTX
Ethical hacking
PPT
Introduction To Ethical Hacking
PPT
Hacking
PDF
Unit ii-hackers and cyber crimes
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
What is a Hacker (part 1): Types, tools and techniques
Hacking
Ethical hacking
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Over View of Hacking by Rajasekhara reddy
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
All about Hacking
Hacking
Inetsecurity.in Ethical Hacking presentation
Dhams hacking
hacking basics
Ethical hacking
Introduction To Ethical Hacking
Hacking
Unit ii-hackers and cyber crimes

Recently uploaded (20)

PPTX
Bridging Horizons_ Indo-Thai Cultural and Tourism Synergy in a Competitive Asia.
DOC
证书结业SU毕业证,莫道克大学毕业证假学位证
PPTX
Sir Creek Conflict: History and its importance
PDF
62 America is Mentally Ill 20.pdf Politicians Promoting Violence
PDF
Executive an important link between the legislative and people
PDF
Regional Media Representation of Kuki-Meitei Conflict - An Analysis of Peace ...
PDF
The Blogs_ Hamas’s Deflection Playbook _ Andy Blumenthal _ The Times of Israe...
PDF
KAL 007 Manual: The Russian Shootdoown of Civilian Plane on 09/01/1983
PDF
Conflict, Narrative and Media -An Analysis of News on Israel-Palestine Confli...
PDF
424926802-1987-Constitution-as-Basis-of-Environmental-Laws.pdf
PDF
05082025_First India Newspaper Jaipur.pdf
PDF
2025-07-24_CED-HWB_WIPP_ACO000000001.pdf
PDF
Supereme Court history functions and reach.pdf
PPTX
opher bryers alert -How Opher Bryer’s Impro.ai Became the Center of Israel’s ...
PPTX
The-Evolution-of-Public-Human-Resource-Management (1).pptx
DOCX
Breaking Now – Latest Live News Updates from GTV News HD
PPTX
OBG. ABNORAMLTIES OF THE PUERPERIUM, BSC
PPTX
Indian ancient knowledge system, ancient geopolitics
PDF
Mathura Sridharan's Appointment as Ohio Solicitor General Sparks Racist Backl...
PDF
JUDICIAL_ACTIVISM_CRITICAL_ANALYSIS in india.pdf
Bridging Horizons_ Indo-Thai Cultural and Tourism Synergy in a Competitive Asia.
证书结业SU毕业证,莫道克大学毕业证假学位证
Sir Creek Conflict: History and its importance
62 America is Mentally Ill 20.pdf Politicians Promoting Violence
Executive an important link between the legislative and people
Regional Media Representation of Kuki-Meitei Conflict - An Analysis of Peace ...
The Blogs_ Hamas’s Deflection Playbook _ Andy Blumenthal _ The Times of Israe...
KAL 007 Manual: The Russian Shootdoown of Civilian Plane on 09/01/1983
Conflict, Narrative and Media -An Analysis of News on Israel-Palestine Confli...
424926802-1987-Constitution-as-Basis-of-Environmental-Laws.pdf
05082025_First India Newspaper Jaipur.pdf
2025-07-24_CED-HWB_WIPP_ACO000000001.pdf
Supereme Court history functions and reach.pdf
opher bryers alert -How Opher Bryer’s Impro.ai Became the Center of Israel’s ...
The-Evolution-of-Public-Human-Resource-Management (1).pptx
Breaking Now – Latest Live News Updates from GTV News HD
OBG. ABNORAMLTIES OF THE PUERPERIUM, BSC
Indian ancient knowledge system, ancient geopolitics
Mathura Sridharan's Appointment as Ohio Solicitor General Sparks Racist Backl...
JUDICIAL_ACTIVISM_CRITICAL_ANALYSIS in india.pdf

"Hacking"

  • 2.  Hacking • Evolution of hacking • What is called “Hacking”?  Hacker • What is called a “Hacker”? • Types of Hackers  Hacking types • Types of Hacking  Hacking Tools • Tools in Hacking  How to secure devices from hacks? • 18 ways to secure devices from hackers  For Extra Knowledge 2
  • 3.  Evolution of Hacking  The very first hack came in 1878 when the phone company, Bell Telephone, was started.  A group of teenage boys, hired to run the switch boards, would disconnect or misdirect calls. The first authentic computer hackers came in the 1960s……….In the 1970s, the world was pinned and ready for hackers.  During those times, computers were mainframes, locked away in temperature controlled, glassed in areas. It cost a lot of money to run these machines, so programmers had limited access to them. The smarter students, usually MIT students, had an insatiable curiosity about how things worked.  So, the smartest ones created what they called “Hacks”, programming shortcuts, to complete computing tasks more quickly. 3
  • 4. 4
  • 5. What is called a “Hacker”? A person/user who uses computers to gain unauthorized access to data. A Hacker is just a person who uses computer programming of technical skills to overcome a challenge or problem. A hacker is someone able to break into a banking computer system. A computer user who attempts to gain unauthorized access to files in various systems. 5
  • 6. • White Hat Hacker • Black Hat Hacker • Grey Hat Hacker • Red Hat Hacker • Hacktivist • Script Kiddie 6 (Hacker) (Cracker)
  • 7. 7 (Most common technique used by hackers) (Most popular technique used by hackers)
  • 8.  A hacking tool is a program or utility designed to assist a hacker with hacking. It also can be proactively utilized to protect a network or computer from Hackers. • Netsparker • Metasploit Framework • Nmap • OpenSSH • Wireshark • Nessus • Aircrack-ng • Snort • John the ripper • Ettercap 8
  • 9. 9 • The Hacker News. • WeLiveSecurity. • HackerOne. • Latest Hacking News. • KitPloit. • KnowBe4. • (ISC)² Blog. • GBHackers On Security. • Google Gruyere. Google Gruyere is a hackable website developed by the internet giant itself. • HackThis. Not many websites actively invite you to hack them in their title, but HackThis is one exception. bWAPP. ... • OverTheWire. • Hack This Site.
  • 10. • Turn off Bluetooth. • Don’t use unsecured public Wi-Fi. • Get a security app. • Use a better passcode. • Switch off autocomplete. • Clean your browsing history. 1 0
  • 11.  The Different Hacking Groups Hacking are a staple of cybersecurity culture.  Anonymous – Anonymous is perhaps the most iconic and popular hacking group in this list. • Chaos Computer Club • Homebrew Computer Club • Legion of Doom • Masters of Deception • Lizard Squad  Kevin Mitnick • Kevin Mitnick likely holds the little as the world’s best hacker ever. Kevin Metnick started hacking at an early age. He brock in to the realm of public attention in the 1980 after he hacked into the North American Defense Command (NORAD). 11