SlideShare uma empresa Scribd logo
1 de 16
HACKING
Content :-
• What is hacking.
• Who is hacker.
• Classification of hackers.
• Skills of an ethical hacker.
• About Annonymous.
• Worlds best hackers today.
What is hacking…?
-> The way of enjoying and modifiying how a system
function is called “Hacking”.
-> This is the way where your system is forced to
function in a manner other than what they designed.
-> If your system is hacked it will behave mischievously.
-> Ethical hackers are employed through contracts of
direct employment to test security of the company.
 The 1st hacking was done in the year 1969.
Who is hacker… ?!
-> The person who gets
attention towards your device
or system without your
knowledge is called a
“HACKER”.
Classification of hacker:-
Hackers are also divided into 8 types, they arare-
1. Black hat hackers.
2. White hat hackers.
3. Gray hat hackers.
4. Suicide hackers.
5. Script kiddies.
6. Spy hackers.
7. Cyber terrorists.
8. State sponsored hackers.
Blackhat hackers:-
1. These are the people who doesn’t work under any
company.
2. They are individuals.
3. They can be called as crackers.
4. They have no permission to hack, but hacks the data
criminally or illegally.
5. Thes people will misuse their hacking skills.
6. They do the things for bad.
Whitehathackers:-
1. They are quiet opposite to the black hat hackers.
2. These kind of hackers are directly hired by some
companies by paying them.
3. Companies hire them to check for the bugs and mention
them if any in their security.
4. They checks the security of the company and gives the
info of bugs in it to their administrator, so that they can
modify their security.
Grayhathackers:-
1. These people are at the middle of white hat
hackers and black hat hackers.
2. They acts like the white hat hackers, but the work
done by them is illegal ie., Black hat hacking.
3. These type of hackers also misuses their skills.
4. They makes the companies to trust them and
finally fools the companies.
Suicidehackers:-
1. These are the type of hackers who never thinks about the
consequences of doing illegal hacking.
2. They never care about getting punished. If they think to do,
they do it blindly.
Scriptkiddies:-
1. These type of hackers doesn’t have more knowledge
on hacking.
2. But they hacks using some kind of softwares and
scripts.
Spy hackers:-
1.These are also the hackers who where hired by the
companies.
2.But give the data of other companies by hacking
them illegally.
Cyber terrorists:-
1. These people handles with the big and
dangerous works.
2. They changes the data in the internet by
hacking the websites.
State sponsored hackers:-
1. These hackers are directly hired by the
state government.
2. These hackers will be looking at the
security of the state and letting it not to
be hacked.
3. These hackers are very powerful, but
never uses their opertunity by negligence.
Skillsof an “ETHICAL HACKER”:
1. Platform knowledge.
2. Networking knowledge.
3. Computer expert.
4. Security knowledge.
5. Technical knowledge.
To become a hacker you should know at least
one programming language like c,
c++,Java,pyton etc.
Annonymous:-
1. It is an international group of hacking.
2. They have some motos like:-
(i) We don’t forget. (vii) The heroic join us.
(ii) We don’t forgive.
(iii) We are legends.
(iv) Expect us.
(v) The corrupt fears.
(vi) The honest support us.
AboutAnnonymous:-
They try to bring the freedom of speech.
 It is started in the year 2003.
 Their 1st attack is DOS attack on an website. So
that the website stopped working.
There will be a no group leader for this group.
Any one can join in this group.
There is also an official YouTube channel for this
group.
Besthackersin the worldtoday:-
•Gary McKinnon. ...
•LulzSec. ...
•Adrian Lamo. ...
•Mathew Bevan and Richard Pryce. ...
•Jonathan James. ...
End of the presentation
Thankyou.🙂🙂

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Hacking
HackingHacking
Hacking
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 

Semelhante a HACKING

module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Solomon Oho
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016 arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxshericehewat
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack SlideCikgu Syam
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 

Semelhante a HACKING (20)

hacking
hackinghacking
hacking
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hackers final
Hackers finalHackers final
Hackers final
 
Hackers final
Hackers finalHackers final
Hackers final
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Hackers
HackersHackers
Hackers
 

Mais de UpendraSingamsetty

Smart Washing Machine Using NI LAB VIEW
Smart Washing Machine Using NI LAB VIEW Smart Washing Machine Using NI LAB VIEW
Smart Washing Machine Using NI LAB VIEW UpendraSingamsetty
 
BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 2)
BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 2)BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 2)
BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 2)UpendraSingamsetty
 
Basic Information of Ohm's law
Basic Information of Ohm's lawBasic Information of Ohm's law
Basic Information of Ohm's lawUpendraSingamsetty
 
BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 1)
BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 1)BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 1)
BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 1)UpendraSingamsetty
 
Basics concepts of A I,ANN,Genetic Algorithm,Fuzzy Logic
Basics concepts of A I,ANN,Genetic Algorithm,Fuzzy LogicBasics concepts of A I,ANN,Genetic Algorithm,Fuzzy Logic
Basics concepts of A I,ANN,Genetic Algorithm,Fuzzy LogicUpendraSingamsetty
 
A GIANT LEAP OF INDIA : SUNDAR BHARATH AND FEW SYMPTOMS AND PRECAUTIONS FROM ...
A GIANT LEAP OF INDIA : SUNDAR BHARATH AND FEW SYMPTOMS AND PRECAUTIONS FROM ...A GIANT LEAP OF INDIA : SUNDAR BHARATH AND FEW SYMPTOMS AND PRECAUTIONS FROM ...
A GIANT LEAP OF INDIA : SUNDAR BHARATH AND FEW SYMPTOMS AND PRECAUTIONS FROM ...UpendraSingamsetty
 
Emerging Civil Society Initiatives In Agriculture
Emerging Civil Society Initiatives In AgricultureEmerging Civil Society Initiatives In Agriculture
Emerging Civil Society Initiatives In AgricultureUpendraSingamsetty
 

Mais de UpendraSingamsetty (12)

SMART BLIND STICK
SMART BLIND STICK SMART BLIND STICK
SMART BLIND STICK
 
Smart Washing Machine Using NI LAB VIEW
Smart Washing Machine Using NI LAB VIEW Smart Washing Machine Using NI LAB VIEW
Smart Washing Machine Using NI LAB VIEW
 
BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 2)
BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 2)BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 2)
BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 2)
 
Basic Information of Ohm's law
Basic Information of Ohm's lawBasic Information of Ohm's law
Basic Information of Ohm's law
 
BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 1)
BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 1)BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 1)
BASIC CONCEPTS OF DATA NETWORKS AND PROTOCOLS (PART - 1)
 
Basics concepts of A I,ANN,Genetic Algorithm,Fuzzy Logic
Basics concepts of A I,ANN,Genetic Algorithm,Fuzzy LogicBasics concepts of A I,ANN,Genetic Algorithm,Fuzzy Logic
Basics concepts of A I,ANN,Genetic Algorithm,Fuzzy Logic
 
Laser Communications
Laser CommunicationsLaser Communications
Laser Communications
 
A GIANT LEAP OF INDIA : SUNDAR BHARATH AND FEW SYMPTOMS AND PRECAUTIONS FROM ...
A GIANT LEAP OF INDIA : SUNDAR BHARATH AND FEW SYMPTOMS AND PRECAUTIONS FROM ...A GIANT LEAP OF INDIA : SUNDAR BHARATH AND FEW SYMPTOMS AND PRECAUTIONS FROM ...
A GIANT LEAP OF INDIA : SUNDAR BHARATH AND FEW SYMPTOMS AND PRECAUTIONS FROM ...
 
Emerging Civil Society Initiatives In Agriculture
Emerging Civil Society Initiatives In AgricultureEmerging Civil Society Initiatives In Agriculture
Emerging Civil Society Initiatives In Agriculture
 
Capacitor and its types
Capacitor and its typesCapacitor and its types
Capacitor and its types
 
LCD AND LED SCREEN
LCD AND LED SCREENLCD AND LED SCREEN
LCD AND LED SCREEN
 
Waste Management
Waste ManagementWaste Management
Waste Management
 

Último

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 

Último (20)

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

HACKING

  • 2. Content :- • What is hacking. • Who is hacker. • Classification of hackers. • Skills of an ethical hacker. • About Annonymous. • Worlds best hackers today.
  • 3. What is hacking…? -> The way of enjoying and modifiying how a system function is called “Hacking”. -> This is the way where your system is forced to function in a manner other than what they designed. -> If your system is hacked it will behave mischievously. -> Ethical hackers are employed through contracts of direct employment to test security of the company.  The 1st hacking was done in the year 1969.
  • 4. Who is hacker… ?! -> The person who gets attention towards your device or system without your knowledge is called a “HACKER”.
  • 5. Classification of hacker:- Hackers are also divided into 8 types, they arare- 1. Black hat hackers. 2. White hat hackers. 3. Gray hat hackers. 4. Suicide hackers. 5. Script kiddies. 6. Spy hackers. 7. Cyber terrorists. 8. State sponsored hackers.
  • 6. Blackhat hackers:- 1. These are the people who doesn’t work under any company. 2. They are individuals. 3. They can be called as crackers. 4. They have no permission to hack, but hacks the data criminally or illegally. 5. Thes people will misuse their hacking skills. 6. They do the things for bad.
  • 7. Whitehathackers:- 1. They are quiet opposite to the black hat hackers. 2. These kind of hackers are directly hired by some companies by paying them. 3. Companies hire them to check for the bugs and mention them if any in their security. 4. They checks the security of the company and gives the info of bugs in it to their administrator, so that they can modify their security.
  • 8. Grayhathackers:- 1. These people are at the middle of white hat hackers and black hat hackers. 2. They acts like the white hat hackers, but the work done by them is illegal ie., Black hat hacking. 3. These type of hackers also misuses their skills. 4. They makes the companies to trust them and finally fools the companies.
  • 9. Suicidehackers:- 1. These are the type of hackers who never thinks about the consequences of doing illegal hacking. 2. They never care about getting punished. If they think to do, they do it blindly. Scriptkiddies:- 1. These type of hackers doesn’t have more knowledge on hacking. 2. But they hacks using some kind of softwares and scripts.
  • 10. Spy hackers:- 1.These are also the hackers who where hired by the companies. 2.But give the data of other companies by hacking them illegally. Cyber terrorists:- 1. These people handles with the big and dangerous works. 2. They changes the data in the internet by hacking the websites.
  • 11. State sponsored hackers:- 1. These hackers are directly hired by the state government. 2. These hackers will be looking at the security of the state and letting it not to be hacked. 3. These hackers are very powerful, but never uses their opertunity by negligence.
  • 12. Skillsof an “ETHICAL HACKER”: 1. Platform knowledge. 2. Networking knowledge. 3. Computer expert. 4. Security knowledge. 5. Technical knowledge. To become a hacker you should know at least one programming language like c, c++,Java,pyton etc.
  • 13. Annonymous:- 1. It is an international group of hacking. 2. They have some motos like:- (i) We don’t forget. (vii) The heroic join us. (ii) We don’t forgive. (iii) We are legends. (iv) Expect us. (v) The corrupt fears. (vi) The honest support us.
  • 14. AboutAnnonymous:- They try to bring the freedom of speech.  It is started in the year 2003.  Their 1st attack is DOS attack on an website. So that the website stopped working. There will be a no group leader for this group. Any one can join in this group. There is also an official YouTube channel for this group.
  • 15. Besthackersin the worldtoday:- •Gary McKinnon. ... •LulzSec. ... •Adrian Lamo. ... •Mathew Bevan and Richard Pryce. ... •Jonathan James. ...
  • 16. End of the presentation Thankyou.🙂🙂