You are on page 1of 8

HACKING

BY: RAJARSHI MEHTA (200090107034)


WHAT IS HISTORY OF WHO IS A
HACKING? HACKING HACKER?
 The process of attempting to gain  Hacking has been a part of computing  In the computer security context, a
or successfully gaining, for 40 years. hacker is someone who seeks and
unauthorized access to exploits weaknesses in a computer
 The first computer hacker emerged at
computer resources is called system or computer network.
MIT.
Hacking.  The term hacker is reclaimed by
 Hacking is began in the 1960s at MIT ,
computer programmers who argue
origin of the term “hacker”.
that someone breaking into
 The truth hacker amongst our societies computers is better called a
have thirst for the knowledge. cracker.
 Boredom is never an object of  Famous Hackers in History: Ian
challenge for the hacker Murphy, Kevin Mitnick, Mark
Abene, Johan Helsinguis, Linus
Torvalds, Robert Morris.
TYPES OF HACKER
WHITE HAT HACKER BLACK HAT HACKER GREY HAT HACKER
White hat hackers are those These are individuals who work These are individuals who work
individuals professing hacker both offensively and defensively at both offensively and
skills and using them for various times. defensively at various times.
defensive purposes
We cannot predict their behavior. We cannot predict their
This means that the white hat behavior.
Sometimes they use their skills for
hackers use their knowledge and
the common good while in some Sometimes they use their skills
skill for the good of others and
other times he uses them for their for the common.
for the common good.
personal gains.
TYPES OF HACKING
 Website Hacking : Hacking a website means taking
control from the website owner to a person who hacks
the website.
 Network Hacking : Network Hacking is generally
means gathering information about domain by using
tools like Telnet, Ns look UP, Ping, Tracert, Netstat, Network Hacking
etc. over the network.
 Ethical Hacking : Ethical hacking is where a person
hacks to find weaknesses in a system and then usually
patches them.
 Email Hacking : Email hacking is illicit access to an
email account or email correspondence.

Email Hacking
TYPES OF HACKING
 Password Hacking : Password Hacking Password
cracking is the process of recovering secret passwords
from data that has been stored in or transmitted by a
computer system.
 Online Banking Hacking : Online banking Hacking
Unauthorized accessing bank accounts without Password Hacking
knowing the password or without permission of
account holder is known as Online banking hacking.
 Computer Hacking : Computer Hacking is when files
on your computer are viewed, created, or edited
without your authorization.

Online Banking
Hacking
HACKING PROCESS
Steps for hacking:
1) Foot Printing 3) Gaining Access

 Who is lookup
 Password Attacks

 NS lookup
 Social Engineering

 IP lookup
 Viruses

2) Scanning 4) Maintaining Access

 Port Scanning
 Os Backdoors

 Network Scanning
 Trojans Clears

 Finger Printing
 Tracks

 Fire Walking
ADVANTAGES
 Helps in closing the open holes in the system
network
 Provides security to banking and financial
establishments
 Prevents website defacements
 An evolving technique

DISADVANTAGES
 All depends upon the trustworthiness of the ethical
hacker
 Hiring professionals is expensive.
THANK YOU

You might also like