15

Hacking ppt

Embed Size (px)

Citation preview

Page 1: Hacking ppt
Page 2: Hacking ppt

INTRODUCTION

APPLICATION AREA OF HACKING

ADVANTAGES & DISADVANTAGES

Page 3: Hacking ppt

INTRODUCTION

Page 4: Hacking ppt

Hacking is the method of breaking into information system without proper authentication and permission.

Page 5: Hacking ppt

1. 2. 3.

White

hatBlack

hat

Grey

hat

TYPES OF HACKER

Page 6: Hacking ppt

White hat

A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker.

The EC-Council ganizations that have developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.

Page 7: Hacking ppt

Black hat

A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005)..

Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers.

Page 8: Hacking ppt

Grey hat

A grey hat hacker is a combination of a black hat and a white hat hacker.

A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect

They may then offer to correct the defect for a fee.

Page 9: Hacking ppt

APPLICATION AREA

OF HACKING

Password Hacking

Email Hacking

Web Site Hacking

1

2

3

Credit card number Ha4

Page 10: Hacking ppt

Password Hacking

A password is a combination of characters that a user uses for protecting information. Once a file or a determined section of a hard disk is protected by a password, only those that know it can access it.

1. The most common used tool to hack the password is social engineering. Social engineering consists in making a user believe that he is giving confidential information to a trusted party.

2. Another way of Hacking passwords is through a hash function

Page 11: Hacking ppt

Email Hacking

Yes, almost anything can be hacked in the Internet. There are several methods for Hacking yahoo, msn email accounts.

1. One of these methods is social engineering.

2. Hacking yahoo messenger or any other messenger is quite easy if you know the person’s Email ID.

Page 12: Hacking ppt

Credit card Hacking

Credit card Hacking has become one of the new security headaches of consumers. Although in face to face transactions the percentage of credit card fraud is almost a tenth of a percent, in online transactions it's as high as two or three percent.

1. Phishing

2. Through a website.

There are many ways to hack the credit card number. But the following two ways areoften used to hack the number.

Page 13: Hacking ppt

Advantages of Hacking

Can be used to recover information where the password has been lost.

• There may be the situation when you can forget your password. At that time you can get your password by simply Hacking your computers.

To test how good security is on your network / computer.

• As the data is important thing in an organization or in your computer. All of us want to secure their data. How one can find out whether there system is secure or not. Th4e answer is simply by Hacking your own system/network.

Page 14: Hacking ppt

Disadvantages of Hacking

Criminals can use it to their advantage

• As the data is important thing in an organization / on your computer. Some criminal can hack you network/system and can be access your data so he/she can use this data for their use and u have to be face to a big loss.

• If he/she successfully hack your system at that time they can able to enter your privacy area due to which he/she can access your private data.

It can harm someone's privacy

It's Illegal.

• Accessing some once private data without its permission is a crime, which is illegal.

It destroys other works

• As competition is increases maintaining the quality and standard is most important thing. Suppose that you create /make a good project and your opponent hack your system. At this situation he/she can destroy your work, because of which you have to face a big loss.

Page 15: Hacking ppt

Thanks