SlideShare a Scribd company logo
WHAT IS HACKING?
• Hacking often refers to the unauthorized intrusion into
a network or computer; normally carried out by one or
more “hackers.” However, a hacker can be anyone.
They can be an individual like you or me. They can
work solo or be employed by an organization that has
the motive to disrupt something or cause havoc––
unnecessarily. Often, they look to alter security
systems to achieve their goal, which differs from the
actual purpose of the system.
WHY HACK?
• PROFIT
• -Information can be sold
• -Information can be used to steal
• PROTEST
• -Hactivism : A Hacktivist is someone utilized technology to
announce a social, ideological, religious or political message.
• CHALLANGE
• - Fun , problem - solvingskill, the thrill of power
EFFECTS OF HACKING
• Damage to information
• Theft of information
- Credit card details , social security numbers, identity fraud, email addressed
• Compromise/damage of system
• Use of victim machines as “zombies”
• Businesses may suffer from damage reputation and lawsuits
• Business secrets could be stolen and sold to competitors
• Computing system/ infrastucture could suffer from performance degrading as the
resources used for malicious activites
TYPES OF HACKER
White, black, and grey refer to the relationship between the
hacker and the systems they are attacking.
Black Hat’ Hackers
A black-hat hacker is an individual who attempts to gain
unauthorized entry into a system or network to exploit them for
malicious reasons. The black-hat hacker does not have any
permission or authority to compromise their targets. They try to
inflict damage by compromising security systems, altering
functions of websites and networks, or shutting down systems.
They often do so to steal or gain access to passwords, financial
information, and other personal data.
TYPES OF HACKER
‘White Hat’ Hackers
White-hat hackers, on the other hand, are deemed to be the good guys, working
with organizations to strengthen the security of a system. A white hat has
permission to engage the targets and to compromise them within the prescribed
rules of engagement.
They are often referred to as ethical hackers. This individual specializes in ethical
hacking tools, techniques, and methodologies to secure an organization’s
information systems.
Unlike black-hat hackers, ethical hackers exploit security networks and look for
backdoors when they are legally permitted to do so. White-hat hackers always
disclose every vulnerability they find in the company’s security system so that it can
be fixed before they are being exploited by malicious actors.
TYPES OF HACKER
‘Grey Hat’ Hackers
Grey hats exploit networks and computer systems in the way
that black hats do, but do so without any malicious intent,
disclosing all loopholes and vulnerabilities to law enforcement
agencies or intelligence agencies.
Usually, grey-hat hackers surf the net and hack into computer
systems to notify the administrator or the owner that their
system/network contains one or more vulnerabilities that must
be fixed immediately. Grey hats may also extort the hacked,
offering to correct the defect for a nominal fee.
TYPES OF ATTACKS
 Password Cracking Attacks
 Network Attacks
 Man-in-the-middle Attcks
 Identity Spoofing
 Interception
 Eacesdropping
 Backdoor Attacks and many more..
HOW TO HACK?
• Many of the hacking tools and guides are available on
the internet
• BackTrack is a Linux distro with many tools :
Metasploits, SQL map Nmap, Ophcrack, Wireshark,
Hydra and many more
• The real reason for BackTrack development are for
digital forensics and penetration testing
KALI LINUX
Kali Linux is an open source project that is maintained and funded by
Offensive Security, a provider of world-class information security
training and penetration testing services. In addition to Kali Linux,
Offensive Security also maintains the Exploit Database and the free
online course, Metasploit Unleashed.
DOWNLOAD VIRTUAL MACHINE : -
https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-
image-download/#1572305786515-43ed3ee1-b9c8
THANK YOU

More Related Content

PPTX
Hacking Technology
PDF
White hat and black hat hackers
PPTX
Hacking-coffee and latte
PPTX
Ethical_Hacking
PPTX
Final ethical hacking
PPTX
Hacking
PPTX
Ethical Hacking (basics)
PPTX
Ethical Hacking
Hacking Technology
White hat and black hat hackers
Hacking-coffee and latte
Ethical_Hacking
Final ethical hacking
Hacking
Ethical Hacking (basics)
Ethical Hacking

What's hot (19)

PPTX
Cyber crime1 vaibhavi
PPT
Ethical hacking
PPTX
Hacking (cs192 report )
PPTX
Ethical hacking
PPT
the best hacking ppt
PPTX
Hacking and Hackers
PPTX
Ethical Hacking
PPT
All about Hacking
PPTX
Hackers
PPTX
Hacking
PDF
Hacking-Basics
PPTX
About hackers
PPTX
Hack and Crack Slide
PPT
Hacking
PPT
Ethi mini1 - ethical hacking
PPTX
Hackers ESP
PPT
Ethical hacking presentation
PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Ethical Hacking
Cyber crime1 vaibhavi
Ethical hacking
Hacking (cs192 report )
Ethical hacking
the best hacking ppt
Hacking and Hackers
Ethical Hacking
All about Hacking
Hackers
Hacking
Hacking-Basics
About hackers
Hack and Crack Slide
Hacking
Ethi mini1 - ethical hacking
Hackers ESP
Ethical hacking presentation
Ethical hacking-presentation-updated(1by )Rasheed
Ethical Hacking
Ad

Similar to Introduction of Cyber Security (20)

PPTX
Ethical hacking 2016
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
DOC
Kinds of hackers
PPTX
Hacking
PPTX
Hacking
PPTX
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
PPTX
Hacking
PDF
What is Hacking? AND Types of Hackers
PPTX
Hacking
PPTX
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
PPTX
hacker-180906055756.pptx
PPTX
Types of Hacker
DOCX
Application of computer to legal practice (hacking)
PPTX
ICT ~Hacking~
PPT
Hacking version 2
PPTX
Hacking
PPTX
Hacking
PPTX
ethical Hacking [007]
Ethical hacking 2016
Ethical hacking
Ethical hacking
HACKERS-CRACKERS.pptx HACKERS AND CRACKERS
Kinds of hackers
Hacking
Hacking
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Hacking
What is Hacking? AND Types of Hackers
Hacking
13-5-2025 a13-5-2025 a13-5-2025 a13-5-2025 a.pptx
hacker-180906055756.pptx
Types of Hacker
Application of computer to legal practice (hacking)
ICT ~Hacking~
Hacking version 2
Hacking
Hacking
ethical Hacking [007]
Ad

More from penetration Tester (20)

PPTX
PDF
PPTX
Sonar qube
PPTX
PPTX
PPTX
Shift left
PPTX
Deployment Strategies
PPTX
PPTX
Shift left
PPTX
Directory traversal
PDF
Burp documentation
DOCX
7 layer OSI model
PPTX
Virtual box
PPTX
Tcp IP OSI
PPTX
Burp repeater
PPTX
Burp intruder
PPTX
Sonar qube
Shift left
Deployment Strategies
Shift left
Directory traversal
Burp documentation
7 layer OSI model
Virtual box
Tcp IP OSI
Burp repeater
Burp intruder

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Business Ethics Teaching Materials for college
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Open folder Downloads.pdf yes yes ges yes
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
Insiders guide to clinical Medicine.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
Cell Structure & Organelles in detailed.
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Business Ethics Teaching Materials for college
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Microbial diseases, their pathogenesis and prophylaxis
STATICS OF THE RIGID BODIES Hibbelers.pdf
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
O5-L3 Freight Transport Ops (International) V1.pdf
Open folder Downloads.pdf yes yes ges yes
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
The Final Stretch: How to Release a Game and Not Die in the Process.
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Cardiovascular Pharmacology for pharmacy students.pptx
Insiders guide to clinical Medicine.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
TR - Agricultural Crops Production NC III.pdf

Introduction of Cyber Security

  • 1. WHAT IS HACKING? • Hacking often refers to the unauthorized intrusion into a network or computer; normally carried out by one or more “hackers.” However, a hacker can be anyone. They can be an individual like you or me. They can work solo or be employed by an organization that has the motive to disrupt something or cause havoc–– unnecessarily. Often, they look to alter security systems to achieve their goal, which differs from the actual purpose of the system.
  • 2. WHY HACK? • PROFIT • -Information can be sold • -Information can be used to steal • PROTEST • -Hactivism : A Hacktivist is someone utilized technology to announce a social, ideological, religious or political message. • CHALLANGE • - Fun , problem - solvingskill, the thrill of power
  • 3. EFFECTS OF HACKING • Damage to information • Theft of information - Credit card details , social security numbers, identity fraud, email addressed • Compromise/damage of system • Use of victim machines as “zombies” • Businesses may suffer from damage reputation and lawsuits • Business secrets could be stolen and sold to competitors • Computing system/ infrastucture could suffer from performance degrading as the resources used for malicious activites
  • 4. TYPES OF HACKER White, black, and grey refer to the relationship between the hacker and the systems they are attacking. Black Hat’ Hackers A black-hat hacker is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. The black-hat hacker does not have any permission or authority to compromise their targets. They try to inflict damage by compromising security systems, altering functions of websites and networks, or shutting down systems. They often do so to steal or gain access to passwords, financial information, and other personal data.
  • 5. TYPES OF HACKER ‘White Hat’ Hackers White-hat hackers, on the other hand, are deemed to be the good guys, working with organizations to strengthen the security of a system. A white hat has permission to engage the targets and to compromise them within the prescribed rules of engagement. They are often referred to as ethical hackers. This individual specializes in ethical hacking tools, techniques, and methodologies to secure an organization’s information systems. Unlike black-hat hackers, ethical hackers exploit security networks and look for backdoors when they are legally permitted to do so. White-hat hackers always disclose every vulnerability they find in the company’s security system so that it can be fixed before they are being exploited by malicious actors.
  • 6. TYPES OF HACKER ‘Grey Hat’ Hackers Grey hats exploit networks and computer systems in the way that black hats do, but do so without any malicious intent, disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies. Usually, grey-hat hackers surf the net and hack into computer systems to notify the administrator or the owner that their system/network contains one or more vulnerabilities that must be fixed immediately. Grey hats may also extort the hacked, offering to correct the defect for a nominal fee.
  • 7. TYPES OF ATTACKS  Password Cracking Attacks  Network Attacks  Man-in-the-middle Attcks  Identity Spoofing  Interception  Eacesdropping  Backdoor Attacks and many more..
  • 8. HOW TO HACK? • Many of the hacking tools and guides are available on the internet • BackTrack is a Linux distro with many tools : Metasploits, SQL map Nmap, Ophcrack, Wireshark, Hydra and many more • The real reason for BackTrack development are for digital forensics and penetration testing
  • 9. KALI LINUX Kali Linux is an open source project that is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. In addition to Kali Linux, Offensive Security also maintains the Exploit Database and the free online course, Metasploit Unleashed. DOWNLOAD VIRTUAL MACHINE : - https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox- image-download/#1572305786515-43ed3ee1-b9c8