SlideShare a Scribd company logo
WHAT IS HACKING?
• Hacking often refers to the unauthorized intrusion into a
network or computer; normally carried out by one or more
“hackers.” However, a hacker can be anyone. They can
be an individual like you or me. They can work solo or be
employed by an organization that has the motive to
disrupt something or cause havoc––unnecessarily. Often,
they look to alter security systems to achieve their goal,
which differs from the actual purpose of the system.
WHY HACK?
• PROFIT
• -Information can be sold
• -Information can be used to steal
• PROTEST
• -Hactivism : A Hacktivist is someone utilized technology to
announce a social, ideological, religious or political message.
• CHALLANGE
• - Fun , problem - solvingskill, the thrill of power
EFFECTS OF HACKING
• Damage to information
• Theft of information
- Credit card details , social security numbers, identity fraud, email addressed
• Compromise/damage of system
• Use of victim machines as “zombies”
• Businesses may suffer from damage reputation and lawsuits
• Business secrets could be stolen and sold to competitors
• Computing system/ infrastucture could suffer from performance degrading as the
resources used for malicious activites
TYPES OF HACKER
White, black, and grey refer to the relationship between the
hacker and the systems they are attacking.
Black Hat’ Hackers
A black-hat hacker is an individual who attempts to gain
unauthorized entry into a system or network to exploit them for
malicious reasons. The black-hat hacker does not have any
permission or authority to compromise their targets. They try to
inflict damage by compromising security systems, altering
functions of websites and networks, or shutting down systems.
They often do so to steal or gain access to passwords, financial
information, and other personal data.
TYPES OF HACKER
‘White Hat’ Hackers
White-hat hackers, on the other hand, are deemed to be the good guys, working
with organizations to strengthen the security of a system. A white hat has
permission to engage the targets and to compromise them within the prescribed
rules of engagement.
They are often referred to as ethical hackers. This individual specializes in ethical
hacking tools, techniques, and methodologies to secure an organization’s
information systems.
Unlike black-hat hackers, ethical hackers exploit security networks and look for
backdoors when they are legally permitted to do so. White-hat hackers always
disclose every vulnerability they find in the company’s security system so that it can
be fixed before they are being exploited by malicious actors.
TYPES OF HACKER
‘Grey Hat’ Hackers
Grey hats exploit networks and computer systems in the
way that black hats do, but do so without any malicious
intent, disclosing all loopholes and vulnerabilities to law
enforcement agencies or intelligence agencies.
Usually, grey-hat hackers surf the net and hack into
computer systems to notify the administrator or the owner
that their system/network contains one or more
vulnerabilities that must be fixed immediately. Grey hats
may also extort the hacked, offering to correct the defect
for a nominal fee.
TYPES OF ATTACKS
 Password Cracking Attacks
 Network Attacks
 Man-in-the-middle Attcks
 Identity Spoofing
 Interception
 Eacesdropping
 Backdoor Attacks and many more..
HOW TO HACK?
• Many of the hacking tools and guides are available on
the internet
• BackTrack is a Linux distro with many tools :
Metasploits, SQL map Nmap, Ophcrack, Wireshark,
Hydra and many more
• The real reason for BackTrack development are for
digital forensics and penetration testing
KALI LINUX
Kali Linux is an open source project that is maintained and funded by Offensive
Security, a provider of world-class information security training and penetration
testing services. In addition to Kali Linux, Offensive Security also maintains the
Exploit Database and the free online course, Metasploit Unleashed.
 DOWNLOAD VIRTUAL MACHINE : -
https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-
download/#1572305786515-43ed3ee1-b9c8
THANK YOU

More Related Content

PPTX
Hacking Technology
PDF
White hat and black hat hackers
PPTX
Hacking-coffee and latte
PPTX
Ethical_Hacking
PPTX
Final ethical hacking
PPTX
Hacking
PPTX
Ethical Hacking (basics)
PPTX
Ethical Hacking
Hacking Technology
White hat and black hat hackers
Hacking-coffee and latte
Ethical_Hacking
Final ethical hacking
Hacking
Ethical Hacking (basics)
Ethical Hacking

What's hot (19)

PPTX
Cyber crime1 vaibhavi
PPT
Ethical hacking
PPTX
Hacking (cs192 report )
PPTX
Ethical hacking
PPT
the best hacking ppt
PPTX
Hacking and Hackers
PPTX
Ethical Hacking
PPT
All about Hacking
PPTX
Hackers
PPTX
Hacking
PDF
Hacking-Basics
PPTX
About hackers
PPTX
Hack and Crack Slide
PPT
Hacking
PPT
Ethi mini1 - ethical hacking
PPTX
Hackers ESP
PPT
Ethical hacking presentation
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Ethical Hacking
Cyber crime1 vaibhavi
Ethical hacking
Hacking (cs192 report )
Ethical hacking
the best hacking ppt
Hacking and Hackers
Ethical Hacking
All about Hacking
Hackers
Hacking
Hacking-Basics
About hackers
Hack and Crack Slide
Hacking
Ethi mini1 - ethical hacking
Hackers ESP
Ethical hacking presentation
Ethical hacking-presentation-updated(1by )Rasheed
Ethical Hacking
Ad

Similar to Intro (20)

PPTX
Ethical hacking 2016
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
DOC
Kinds of hackers
PPTX
Hacking
PPTX
Hacking
PPTX
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
PPTX
Hacking
PDF
What is Hacking? AND Types of Hackers
PPTX
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
PPTX
Hacking
PPTX
hacker-180906055756.pptx
PPTX
Types of Hacker
DOCX
Application of computer to legal practice (hacking)
PPTX
ICT ~Hacking~
PPT
Hacking version 2
PPTX
Hacking
PPTX
Hacking
PPTX
ethical Hacking [007]
Ethical hacking 2016
Ethical hacking
Ethical hacking
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
Kinds of hackers
Hacking
Hacking
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Hacking
What is Hacking? AND Types of Hackers
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
Hacking
hacker-180906055756.pptx
Types of Hacker
Application of computer to legal practice (hacking)
ICT ~Hacking~
Hacking version 2
Hacking
Hacking
ethical Hacking [007]
Ad

More from Kalkey (20)

PPT
Docker swarm
PPTX
Docker advance topic (2)
PPTX
Docker introduction (1)
PPTX
Nexus
PPTX
Sonarqube
PPTX
Introduction of tomcat
PPTX
Jenkins advance topic
PPTX
Jenkins introduction
PPTX
Terraform day 3
PPTX
Terraform day 2
PPTX
Terraform day 1
PPTX
Ansible day 3
PPTX
Cloud computing 1
PPTX
Shell programming 2
PPTX
Adnible day 2.ppt
PPTX
Shell programming 1.ppt
PPTX
Debasihish da final.ppt
PPTX
Linux day 3ppt
PPTX
Ansible day 1.ppt
PPTX
Linux day 2.ppt
Docker swarm
Docker advance topic (2)
Docker introduction (1)
Nexus
Sonarqube
Introduction of tomcat
Jenkins advance topic
Jenkins introduction
Terraform day 3
Terraform day 2
Terraform day 1
Ansible day 3
Cloud computing 1
Shell programming 2
Adnible day 2.ppt
Shell programming 1.ppt
Debasihish da final.ppt
Linux day 3ppt
Ansible day 1.ppt
Linux day 2.ppt

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
master seminar digital applications in india
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Classroom Observation Tools for Teachers
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
RMMM.pdf make it easy to upload and study
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Business Ethics Teaching Materials for college
Basic Mud Logging Guide for educational purpose
01-Introduction-to-Information-Management.pdf
Week 4 Term 3 Study Techniques revisited.pptx
master seminar digital applications in india
2.FourierTransform-ShortQuestionswithAnswers.pdf
Renaissance Architecture: A Journey from Faith to Humanism
102 student loan defaulters named and shamed – Is someone you know on the list?
Classroom Observation Tools for Teachers
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Anesthesia in Laparoscopic Surgery in India
Module 4: Burden of Disease Tutorial Slides S2 2025
human mycosis Human fungal infections are called human mycosis..pptx
Microbial disease of the cardiovascular and lymphatic systems
Final Presentation General Medicine 03-08-2024.pptx
Microbial diseases, their pathogenesis and prophylaxis
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
RMMM.pdf make it easy to upload and study
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
O7-L3 Supply Chain Operations - ICLT Program
Business Ethics Teaching Materials for college

Intro

  • 1. WHAT IS HACKING? • Hacking often refers to the unauthorized intrusion into a network or computer; normally carried out by one or more “hackers.” However, a hacker can be anyone. They can be an individual like you or me. They can work solo or be employed by an organization that has the motive to disrupt something or cause havoc––unnecessarily. Often, they look to alter security systems to achieve their goal, which differs from the actual purpose of the system.
  • 2. WHY HACK? • PROFIT • -Information can be sold • -Information can be used to steal • PROTEST • -Hactivism : A Hacktivist is someone utilized technology to announce a social, ideological, religious or political message. • CHALLANGE • - Fun , problem - solvingskill, the thrill of power
  • 3. EFFECTS OF HACKING • Damage to information • Theft of information - Credit card details , social security numbers, identity fraud, email addressed • Compromise/damage of system • Use of victim machines as “zombies” • Businesses may suffer from damage reputation and lawsuits • Business secrets could be stolen and sold to competitors • Computing system/ infrastucture could suffer from performance degrading as the resources used for malicious activites
  • 4. TYPES OF HACKER White, black, and grey refer to the relationship between the hacker and the systems they are attacking. Black Hat’ Hackers A black-hat hacker is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. The black-hat hacker does not have any permission or authority to compromise their targets. They try to inflict damage by compromising security systems, altering functions of websites and networks, or shutting down systems. They often do so to steal or gain access to passwords, financial information, and other personal data.
  • 5. TYPES OF HACKER ‘White Hat’ Hackers White-hat hackers, on the other hand, are deemed to be the good guys, working with organizations to strengthen the security of a system. A white hat has permission to engage the targets and to compromise them within the prescribed rules of engagement. They are often referred to as ethical hackers. This individual specializes in ethical hacking tools, techniques, and methodologies to secure an organization’s information systems. Unlike black-hat hackers, ethical hackers exploit security networks and look for backdoors when they are legally permitted to do so. White-hat hackers always disclose every vulnerability they find in the company’s security system so that it can be fixed before they are being exploited by malicious actors.
  • 6. TYPES OF HACKER ‘Grey Hat’ Hackers Grey hats exploit networks and computer systems in the way that black hats do, but do so without any malicious intent, disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies. Usually, grey-hat hackers surf the net and hack into computer systems to notify the administrator or the owner that their system/network contains one or more vulnerabilities that must be fixed immediately. Grey hats may also extort the hacked, offering to correct the defect for a nominal fee.
  • 7. TYPES OF ATTACKS  Password Cracking Attacks  Network Attacks  Man-in-the-middle Attcks  Identity Spoofing  Interception  Eacesdropping  Backdoor Attacks and many more..
  • 8. HOW TO HACK? • Many of the hacking tools and guides are available on the internet • BackTrack is a Linux distro with many tools : Metasploits, SQL map Nmap, Ophcrack, Wireshark, Hydra and many more • The real reason for BackTrack development are for digital forensics and penetration testing
  • 9. KALI LINUX Kali Linux is an open source project that is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. In addition to Kali Linux, Offensive Security also maintains the Exploit Database and the free online course, Metasploit Unleashed.  DOWNLOAD VIRTUAL MACHINE : - https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image- download/#1572305786515-43ed3ee1-b9c8