SlideShare a Scribd company logo
All About Hacking.!!
What is 
“HACKING”
Its just breaking the 
computer security system to 
access computer network 
legally or illegally.
Methods of hacking
PHISHING 
BRUTE FORCE POWER ATTACK 
SQL INJECTION 
SOCIAL ENGINEERING 
APPLICATION BASE ATTACK 
MISCONFIGURATION ATTACK
PHISHING 
1
Phishing is the most 
simplest way the hacker 
can access your 
personal Information.
Beware 
• ALWAYS CHECK THE ADDRESS BAR OF 
THE BROWSER AND THEN ENTER THE 
DETAILS.
BRUTE FORCE 
POWER ATTACK 
2
In this process, an 
application is used which 
literally guesses passwords 
and ultimately tries to crack 
the actual password.
All About Hacking.!!
3 
SQL INJECTION
It’s the most 
commonest method 
to hack websites..
In order to protect yourselves this 
type of attack, you need to secure 
your website programmatically. 
This technique is also used for 
penetration testing.
SOCIAL 
ENGINEERING 
4
It is mainly used for 
hacking social 
networking sites.
DO NOT EVER SHARE 
ANY INFORMATION 
ABOUT YOUR SOCIAL 
NETWORKING ACCOUNT 
WITH ANYONE.
5 
APPLICATION 
BASE ATTACK
In this method normally an 
application is used for either creating 
a phishing page or a brute force 
power attack. 
In simple words there are 
typically MALWARE.
MISCONFIGURATION 
ATTACK 
6
This usually occurs if you 
have misconfigured your 
system such that the 
valuable information gets 
exposed.
TYPES OF 
HACKERS!!!
WHITE HAT HACKER. 
BLACK HAT HACKER. 
GREY HAT HACKER. 
ELITE HACKER. 
SCRIPT KIDDIE.
All About Hacking.!!
They use their skills for good purposes. 
They work for organizations to stop the illegal 
activities through black hat hackers.
A white hat hacker breaks security 
for non-malicious reasons, perhaps 
to test their own security system. 
The term "white hat" in 
Internet slang refers to an Ethical 
Hacker.
All About Hacking.!!
A Black Hat 
Hacker is a hacker who violates computer security foR 
little reason beyond maliciousness or for personal 
gain.
BLACK HAT HACKERS ALWAYS DO ILLEGAL WORK. 
THEY ARE PROFESSIONALS IN THEIR FIELDS.
All About Hacking.!!
GREY HAT HACKERS HAVE BOTH QUALITIES LIKE BLACK HAT 
HACKERS AND WHITE HAT HACKERS . 
THEY USE THEIR KNOWLEDGE FOR BAD PURPOSES AND GOOD 
PURPOSES TOO.
All About Hacking.!!
A SOCIAL STATUS AMONG 
HACKERS, ELITE IS USED TO 
DESCRIBE THE MOST SKILLED. 
NEWLY 
DISCOVERED EXPLOITS CIRCULATE 
AMONG THESE HACKERS. 
ELITE GROUPS SUCH AS MASTERS OF 
DECEPTIONCONFERRED A KIND OF 
CREDIBILITY ON THEIR MEMBERS.
All About Hacking.!!
A script kiddie is a non-expert who breaks into computer 
systems by using pre-packaged automated tools written by 
others, hence the term script kiddie (i.e. kid, child—an 
individual lacking knowledge and experience, immature),usually 
with little understanding of the underlying concept.
SCRIPT KIDDIES HACKS INTO 
COMPUTER OR WEBSITES USING 
THE TOOLS AVAILABLE ON THE 
INTERNET . 
THEY DON’T HAVE KNOWLEDGE 
OF PROGRAMMING .
How to Hack??? 
Hacking = manipulating a system to 
do something it wasn’t designed to do. 
Like hot wiring a car. 
Hacking computers is 
often simple (once you 
know how computers work).
Thank 
you!

More Related Content

PPTX
Hacking vs cracking
PPTX
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
PPTX
Ethical hacking
PPTX
hacking and its types
PDF
White hat and black hat hackers
PDF
What is Hacking? AND Types of Hackers
PPT
Ethical Hacking Powerpoint
DOCX
Full seminar report on ethical hacking
Hacking vs cracking
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
Ethical hacking
hacking and its types
White hat and black hat hackers
What is Hacking? AND Types of Hackers
Ethical Hacking Powerpoint
Full seminar report on ethical hacking

What's hot (19)

PPTX
Ethical hacking basics
PPTX
ICT Form 4: Hacking
PPT
Ethical Hacking
PPTX
Introduction ethical hacking
PPTX
Ethical hacking
PPTX
Β. Hucking
PPTX
Hacking and Hackers
PPTX
Hacking and Anti Hacking
PPTX
Ethical hacking
PPSX
Ethical Hacking
PPT
Ict H A C K I N G
DOC
Kinds of hackers
PPTX
Introduction to Hacking
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
Hacking ppt
PDF
Research Paper - Hacker Plague
Ethical hacking basics
ICT Form 4: Hacking
Ethical Hacking
Introduction ethical hacking
Ethical hacking
Β. Hucking
Hacking and Hackers
Hacking and Anti Hacking
Ethical hacking
Ethical Hacking
Ict H A C K I N G
Kinds of hackers
Introduction to Hacking
Ethical hacking
Ethical hacking
Ethical hacking
Hacking ppt
Research Paper - Hacker Plague

Viewers also liked (13)

PPTX
Keys to Protecting Your Network
PPTX
The Cost of Mismanaged Data
PDF
Cyber Crime and Ethical Hacking
PPTX
The Big Data Storm
PPTX
Cyber Crime and Ethical Hacking
PPTX
Big Data in Action
PPTX
Study of WRM FURNACE of Vizag Steel Plant.
PPTX
Why Hacking Isn't Always Bad
PPTX
Hacking
PPT
PPSX
Cyber Crime and Ethical Hacking
Keys to Protecting Your Network
The Cost of Mismanaged Data
Cyber Crime and Ethical Hacking
The Big Data Storm
Cyber Crime and Ethical Hacking
Big Data in Action
Study of WRM FURNACE of Vizag Steel Plant.
Why Hacking Isn't Always Bad
Hacking
Cyber Crime and Ethical Hacking

Similar to All About Hacking.!! (20)

PPT
Hacking version 2
PPTX
Ethical hacking 2016
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
PPTX
PPTX
Hacking
PPTX
Hacking-coffee and latte
PPTX
Hacking & Hackers
PPTX
Hacking Presentation
PPTX
Is hacking good or bad
PPTX
Hacking
PPTX
ICT ~Hacking~
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
Hacking
PPT
Computer hacking
PPTX
Hacking & Attack vector
PPTX
Ethical Hacking
PPTX
Hack your way into
Hacking version 2
Ethical hacking 2016
Ethical hacking
Ethical hacking
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Hacking
Hacking-coffee and latte
Hacking & Hackers
Hacking Presentation
Is hacking good or bad
Hacking
ICT ~Hacking~
Ethical hacking
Ethical hacking
Hacking
Computer hacking
Hacking & Attack vector
Ethical Hacking
Hack your way into

Recently uploaded (20)

PPTX
Lesson notes of climatology university.
PDF
Sports Quiz easy sports quiz sports quiz
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Cell Types and Its function , kingdom of life
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Pre independence Education in Inndia.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
GDM (1) (1).pptx small presentation for students
PDF
RMMM.pdf make it easy to upload and study
Lesson notes of climatology university.
Sports Quiz easy sports quiz sports quiz
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Classroom Observation Tools for Teachers
Complications of Minimal Access Surgery at WLH
Cell Types and Its function , kingdom of life
PPH.pptx obstetrics and gynecology in nursing
01-Introduction-to-Information-Management.pdf
Microbial diseases, their pathogenesis and prophylaxis
VCE English Exam - Section C Student Revision Booklet
Abdominal Access Techniques with Prof. Dr. R K Mishra
Pre independence Education in Inndia.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
TR - Agricultural Crops Production NC III.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
GDM (1) (1).pptx small presentation for students
RMMM.pdf make it easy to upload and study

All About Hacking.!!

  • 3. Its just breaking the computer security system to access computer network legally or illegally.
  • 5. PHISHING BRUTE FORCE POWER ATTACK SQL INJECTION SOCIAL ENGINEERING APPLICATION BASE ATTACK MISCONFIGURATION ATTACK
  • 7. Phishing is the most simplest way the hacker can access your personal Information.
  • 8. Beware • ALWAYS CHECK THE ADDRESS BAR OF THE BROWSER AND THEN ENTER THE DETAILS.
  • 9. BRUTE FORCE POWER ATTACK 2
  • 10. In this process, an application is used which literally guesses passwords and ultimately tries to crack the actual password.
  • 13. It’s the most commonest method to hack websites..
  • 14. In order to protect yourselves this type of attack, you need to secure your website programmatically. This technique is also used for penetration testing.
  • 16. It is mainly used for hacking social networking sites.
  • 17. DO NOT EVER SHARE ANY INFORMATION ABOUT YOUR SOCIAL NETWORKING ACCOUNT WITH ANYONE.
  • 19. In this method normally an application is used for either creating a phishing page or a brute force power attack. In simple words there are typically MALWARE.
  • 21. This usually occurs if you have misconfigured your system such that the valuable information gets exposed.
  • 23. WHITE HAT HACKER. BLACK HAT HACKER. GREY HAT HACKER. ELITE HACKER. SCRIPT KIDDIE.
  • 25. They use their skills for good purposes. They work for organizations to stop the illegal activities through black hat hackers.
  • 26. A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system. The term "white hat" in Internet slang refers to an Ethical Hacker.
  • 28. A Black Hat Hacker is a hacker who violates computer security foR little reason beyond maliciousness or for personal gain.
  • 29. BLACK HAT HACKERS ALWAYS DO ILLEGAL WORK. THEY ARE PROFESSIONALS IN THEIR FIELDS.
  • 31. GREY HAT HACKERS HAVE BOTH QUALITIES LIKE BLACK HAT HACKERS AND WHITE HAT HACKERS . THEY USE THEIR KNOWLEDGE FOR BAD PURPOSES AND GOOD PURPOSES TOO.
  • 33. A SOCIAL STATUS AMONG HACKERS, ELITE IS USED TO DESCRIBE THE MOST SKILLED. NEWLY DISCOVERED EXPLOITS CIRCULATE AMONG THESE HACKERS. ELITE GROUPS SUCH AS MASTERS OF DECEPTIONCONFERRED A KIND OF CREDIBILITY ON THEIR MEMBERS.
  • 35. A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, hence the term script kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature),usually with little understanding of the underlying concept.
  • 36. SCRIPT KIDDIES HACKS INTO COMPUTER OR WEBSITES USING THE TOOLS AVAILABLE ON THE INTERNET . THEY DON’T HAVE KNOWLEDGE OF PROGRAMMING .
  • 37. How to Hack??? Hacking = manipulating a system to do something it wasn’t designed to do. Like hot wiring a car. Hacking computers is often simple (once you know how computers work).