SlideShare a Scribd company logo
1 of 42
Cyber Security and
HACKING
BY: Arjun Tomar
What is HACKING?
Hacker….??? Who is a HACKER?
A hacker is someone who seeks and expoits
weaknesses in a computer system or
computer network.
Hacker is a term, generally used by some to
mean ‘a clever programmer’, and by others to
mean ‘someone who tries to break into
computer systems’
Hacker vs. Ethical Hacker
When someone hacks a computer or network system, it's typically
for one of three main reasons:
Hacking for fun:-
Some hackers make attempts on computers, servers or network systems
just for the personal gratification. Others may feel that they need to prove
something to their peers or friends, and hack something only for the
challenge. They don’t steal any data.
Hacking to steal:-
Another reason to hack a system is to steal information or money. A large
portion of hacking attempts fall into this category. Banks and large
companies are common targets for hacking jobs, but sometimes smaller
companies or even a specific person's computer are targeted, as well. If
the companies are hacked they suffer a huge loss.
Why people hack?
Hacking to disrupt:-
There are also some hackers, including hacking groups; that target a
company to disrupt or disturb business, create chaos and just be a
nuisance. These groups often be trying to make a statement with their
hacking, demonstrate security inadequacies, or to show general
disapproval for the business itself. It can be compared to ‘poking’ in
Facebook.
CONTINUED…..
Career in Hacking
• Network administrator
 Administer network which means that they
take care of task of installing, configuration,
expanding and repairing of network.
 Network administrator take care of network
hardware such as cables, hubs, switches,
routers, servers and clients.
Continued…
• Job description:
 An ethical hacker conducts advanced
penetration tests to identify vulnerability in
computer system.
 The ability to analyze risk assessment and put
in place measures to control vulnerable areas.
 Ethical hacker is also many times more
involves with other areas of interests
security for company such as encryption,
security protocols, firewalls.
Continued …
• Skills required:
 Creativity.
 Analytical thinking.
 Logical thinking.
 Motivation.
 Networking.
 Hardware.
 Observation.
 Dedication.
 Quick-thinking.
 In depth computer knowledge.
Continued …
Government jobs:
 Government agencies.
 Military.
 Defense organization.
 Cbi ( central bureau of investigation).
 Forensic laboratories.
Continued …
Jobs: private options
 It firms
 Financial companies
 Banks
 Airlines
 Hotels
 Retail networks.
Continued …
Jobs: private options
• Fresher salary: 1.5 to 3.0 lakhs per annum.
• Pg. diploma or masters will get 16 to 25 lakhs.
• So simply hacking is very beneficial and
necessary for todays generation children.
• Social engineering is the art of manipulating people so that
give up confidential information.
• A social engineer commonly use telephone or internet to trick
a person into revealing sensitive information or getting them
to do something that is against typical policies.
Types of Social Engineering
 Pre-texting
 Diversion theft
 Phishing
 IVR or phone phishing
 Baiting
 Quid pro quo
 Tailgating
Pre-Texting
 When one party lies to another to gain access
to privileged data. For example, a pre-texting
scam could involve an attacker who pretends
to need personal or financial data in order to
confirm the identity of the recipient.
 They are most frequently done through phone
calls. They pretend to be worker of your bank,
and then they ask for your CVV, credit card no.
etc.
Diversion theft
 Diversion theft is a "con" exercised by
professional thieves, normally against a
transport or courier company.
 The objective is to persuade the persons
responsible for a legitimate delivery that the
consignment is requested elsewhere — hence,
"round the corner".
Phishing
 Phishing is when a malicious party sends a
fraudulent email disguised as a legitimate
email, often purporting to be from a trusted
source. The message is meant to trick the
recipient into sharing personal or financial
information or clicking on a link that installs
malware.
Phone Phishing
 Phone phishing (or "vishing") uses a rogue interactive
voice response (IVR) system to recreate a legitimate-
sounding copy of a bank or other institution's IVR
system.
 The victim is prompted (typically via a phishing e-mail)
to call in to the "bank" via a (ideally toll free) number
provided in order to "verify" information.
 A typical "vishing" system will reject log-ins continually,
ensuring the victim enters PINs or passwords multiple
times, often disclosing several different passwords
Quid pro quo
 An attacker calls random numbers at a company,
claiming to be calling back from technical
support.
 Eventually this person will hit someone with a
legitimate problem, grateful that someone is
calling back to help them.
 The attacker will "help" solve the problem and, in
the process, have the user type commands that
give the attacker access or launch malware.
Tailgating
 An attacker, seeking entry to a restricted area secured
by unattended, electronic access control, e.g.
by RFID card, simply walks in behind a person who has
legitimate access.
 Following common courtesy, the legitimate person will
usually hold the door open for the attacker or the
attackers themselves may ask the employee to hold it
open for them.
 The legitimate person may fail to ask for identification
for any of several reasons, or may accept an assertion
that the attacker has forgotten or lost the appropriate
identity token.
More Tips
 BEFORE clicking on links both in emails and on
websites keep an eye out for misspellings, @
signs and suspicious sub-domains.
 When clicking on links sent via email or on
websites, always keep a watch out for uninitiated
or automatic downloads. It could be a malware
installing itself on your system. All such activity
should be reported IMMEDIATELY to your
security manager.
Some more
 BLOCK USB devices in order to reduce the risk of
Baiting. Baiting is the digital equivalent of a real-world
Trojan Horse, where the attacker tempts users with
free or found physical media (USB drives) and relies on
the curiosity or greed of the victim – if they plug it in,
they are hacked!
 Follow the ATE – AWARENESS, TRAINING and
EDUCATION security concept for all employees, no
matter what level and what position they hold in the
organization. While C-level employees are great
targets, their admins can be even more powerful
vectors for attack!
IP ADDRESSANDMACADDRESS
CLICK ME to
WATCH a
FANTASTIC
VIDEO
IP ADRESS
A Unique identifier
Way to identify machineon a network
Connectto other computer
IP Address
• An Internet Protocol (IP) address is a numerical
label assigned to each device (e.g. computer,
printer etc.) participating in a computer
network that uses the Internet Protocol for
communication.
• Its role has been characterized as follows:
"A name indicates what we seek. An address
indicates where it is. A route indicates how to
get there.”
IP Address
• Internet Protocol can be defined as a 32 -
bit number and this system, known as Internet
Protocol Version 4 (IPv4), is still in use today.
• IP addresses are usually written and displayed
in human-readable notations, such as
172.16.254.1 (IPv4), and
2001:db8:0:1234:0:567:8:1 (IPv6).
MAC ADDRESS
Media Access Control
Mac attack technique employed to compromise security of network
switches. So that switches star behaving like a hub and switches and hub
are two different things.
What is MAC address?
Switches turns into hub.
User 1
User 2
Mac hood
hacker
MACAttack
 If User 1 sending information to User 2 and hacker
sends bogus MAC address, then switch behaves as hub.
So attacker gets sensitive information like password,
protected files, credit card number and more.
 Due to Mac address you are identified in a computer
network
MACAttack
 Physical Address: This is your identification in a
network. E.g.: 08-00-27-00-S4-7E .
 When spoofing attack is done, attacker pretends
to be someone else by falsifying data and there
by gain restricted sources and steals personal
information.
 By changing MAC address we pretend that we are
something else.
We all have seen that all websites start from either ‘https’ or
‘http’. So, what is http and https in relation to hacking
HTTP (HyperText Transfer
Protocol) and HTTPS
(HyperText Transfer Protocol
Secure)
Difference between HTTPand HTTPS
When We use HTTP
A SENDS
PASSWORD
B RECEIVES
PASSWORD
HACKER HACKES LINKS
GETS PASSWORD
When We use HTTPs
A SENDS
PASSWORD
B RECEIVES MESSAGE
ENCRYPTED DECRYPTED
 Proxy means to represent someone else in your name.
 To mask your IP under a proxy server to show that you
live in a different country and to make yourself
untraceable.
Attacker
server
target
Attacker not connected directly by target but uses other server.
Attacker
117.119.22.21
Webserver
111.121.14.65
Proxy
111.121.14.65
There is not direct connection of attacker and web server
but attacker uses proxy to hide its identity in a network.
Types of PROXY
• Direct Attack
• Logged Attack
Proxy
Attacker Target
Attacker USA Target
• Using proxy changing
Continued…
Attacker
Using proxy
changing Target
We can use proxy changing, so that target will
never know our destination.
 Go to Google chrome and then type hide me. Then go to
free proxy. Then you can access Google of any country
like Germany, USA, Netherland.
 You can also use Hideme.be.
 Hide.me simply hide your identity to which country you
belongs.
 Go to Google and type proxy list hide my ass. In this you
get IP address of different countries to use as proxy IP
address.
How to se Proxy changing
Computer hacking

More Related Content

What's hot

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

What's hot (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
HACKING
HACKINGHACKING
HACKING
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
HACKING
HACKINGHACKING
HACKING
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITY
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 

Viewers also liked

Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 

Viewers also liked (20)

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking
HackingHacking
Hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Growth Hacker le Social Media - Growth Hacking Paris 10
Growth Hacker le Social Media - Growth Hacking Paris 10Growth Hacker le Social Media - Growth Hacking Paris 10
Growth Hacker le Social Media - Growth Hacking Paris 10
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
31 Best Growth Hacking Resources
31 Best Growth Hacking Resources31 Best Growth Hacking Resources
31 Best Growth Hacking Resources
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Social networking & Social Media
Social networking & Social MediaSocial networking & Social Media
Social networking & Social Media
 
How to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyHow to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easily
 
Puppy Pendrive
Puppy PendrivePuppy Pendrive
Puppy Pendrive
 

Similar to Computer hacking

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
jainutkarsh078
 

Similar to Computer hacking (20)

PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Information security
Information securityInformation security
Information security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
CYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptxCYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Computer hacking

  • 3. Hacker….??? Who is a HACKER? A hacker is someone who seeks and expoits weaknesses in a computer system or computer network. Hacker is a term, generally used by some to mean ‘a clever programmer’, and by others to mean ‘someone who tries to break into computer systems’
  • 5. When someone hacks a computer or network system, it's typically for one of three main reasons: Hacking for fun:- Some hackers make attempts on computers, servers or network systems just for the personal gratification. Others may feel that they need to prove something to their peers or friends, and hack something only for the challenge. They don’t steal any data. Hacking to steal:- Another reason to hack a system is to steal information or money. A large portion of hacking attempts fall into this category. Banks and large companies are common targets for hacking jobs, but sometimes smaller companies or even a specific person's computer are targeted, as well. If the companies are hacked they suffer a huge loss. Why people hack?
  • 6. Hacking to disrupt:- There are also some hackers, including hacking groups; that target a company to disrupt or disturb business, create chaos and just be a nuisance. These groups often be trying to make a statement with their hacking, demonstrate security inadequacies, or to show general disapproval for the business itself. It can be compared to ‘poking’ in Facebook. CONTINUED…..
  • 7. Career in Hacking • Network administrator  Administer network which means that they take care of task of installing, configuration, expanding and repairing of network.  Network administrator take care of network hardware such as cables, hubs, switches, routers, servers and clients.
  • 8. Continued… • Job description:  An ethical hacker conducts advanced penetration tests to identify vulnerability in computer system.  The ability to analyze risk assessment and put in place measures to control vulnerable areas.  Ethical hacker is also many times more involves with other areas of interests security for company such as encryption, security protocols, firewalls.
  • 9. Continued … • Skills required:  Creativity.  Analytical thinking.  Logical thinking.  Motivation.  Networking.  Hardware.  Observation.  Dedication.  Quick-thinking.  In depth computer knowledge.
  • 10. Continued … Government jobs:  Government agencies.  Military.  Defense organization.  Cbi ( central bureau of investigation).  Forensic laboratories.
  • 11. Continued … Jobs: private options  It firms  Financial companies  Banks  Airlines  Hotels  Retail networks.
  • 12. Continued … Jobs: private options • Fresher salary: 1.5 to 3.0 lakhs per annum. • Pg. diploma or masters will get 16 to 25 lakhs. • So simply hacking is very beneficial and necessary for todays generation children.
  • 13. • Social engineering is the art of manipulating people so that give up confidential information. • A social engineer commonly use telephone or internet to trick a person into revealing sensitive information or getting them to do something that is against typical policies.
  • 14. Types of Social Engineering  Pre-texting  Diversion theft  Phishing  IVR or phone phishing  Baiting  Quid pro quo  Tailgating
  • 15. Pre-Texting  When one party lies to another to gain access to privileged data. For example, a pre-texting scam could involve an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.  They are most frequently done through phone calls. They pretend to be worker of your bank, and then they ask for your CVV, credit card no. etc.
  • 16. Diversion theft  Diversion theft is a "con" exercised by professional thieves, normally against a transport or courier company.  The objective is to persuade the persons responsible for a legitimate delivery that the consignment is requested elsewhere — hence, "round the corner".
  • 17. Phishing  Phishing is when a malicious party sends a fraudulent email disguised as a legitimate email, often purporting to be from a trusted source. The message is meant to trick the recipient into sharing personal or financial information or clicking on a link that installs malware.
  • 18. Phone Phishing  Phone phishing (or "vishing") uses a rogue interactive voice response (IVR) system to recreate a legitimate- sounding copy of a bank or other institution's IVR system.  The victim is prompted (typically via a phishing e-mail) to call in to the "bank" via a (ideally toll free) number provided in order to "verify" information.  A typical "vishing" system will reject log-ins continually, ensuring the victim enters PINs or passwords multiple times, often disclosing several different passwords
  • 19. Quid pro quo  An attacker calls random numbers at a company, claiming to be calling back from technical support.  Eventually this person will hit someone with a legitimate problem, grateful that someone is calling back to help them.  The attacker will "help" solve the problem and, in the process, have the user type commands that give the attacker access or launch malware.
  • 20. Tailgating  An attacker, seeking entry to a restricted area secured by unattended, electronic access control, e.g. by RFID card, simply walks in behind a person who has legitimate access.  Following common courtesy, the legitimate person will usually hold the door open for the attacker or the attackers themselves may ask the employee to hold it open for them.  The legitimate person may fail to ask for identification for any of several reasons, or may accept an assertion that the attacker has forgotten or lost the appropriate identity token.
  • 21. More Tips  BEFORE clicking on links both in emails and on websites keep an eye out for misspellings, @ signs and suspicious sub-domains.  When clicking on links sent via email or on websites, always keep a watch out for uninitiated or automatic downloads. It could be a malware installing itself on your system. All such activity should be reported IMMEDIATELY to your security manager.
  • 22. Some more  BLOCK USB devices in order to reduce the risk of Baiting. Baiting is the digital equivalent of a real-world Trojan Horse, where the attacker tempts users with free or found physical media (USB drives) and relies on the curiosity or greed of the victim – if they plug it in, they are hacked!  Follow the ATE – AWARENESS, TRAINING and EDUCATION security concept for all employees, no matter what level and what position they hold in the organization. While C-level employees are great targets, their admins can be even more powerful vectors for attack!
  • 23. IP ADDRESSANDMACADDRESS CLICK ME to WATCH a FANTASTIC VIDEO
  • 24.
  • 25. IP ADRESS A Unique identifier Way to identify machineon a network Connectto other computer
  • 26. IP Address • An Internet Protocol (IP) address is a numerical label assigned to each device (e.g. computer, printer etc.) participating in a computer network that uses the Internet Protocol for communication. • Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there.”
  • 27. IP Address • Internet Protocol can be defined as a 32 - bit number and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. • IP addresses are usually written and displayed in human-readable notations, such as 172.16.254.1 (IPv4), and 2001:db8:0:1234:0:567:8:1 (IPv6).
  • 28. MAC ADDRESS Media Access Control Mac attack technique employed to compromise security of network switches. So that switches star behaving like a hub and switches and hub are two different things.
  • 29. What is MAC address? Switches turns into hub. User 1 User 2 Mac hood hacker
  • 30. MACAttack  If User 1 sending information to User 2 and hacker sends bogus MAC address, then switch behaves as hub. So attacker gets sensitive information like password, protected files, credit card number and more.  Due to Mac address you are identified in a computer network
  • 31. MACAttack  Physical Address: This is your identification in a network. E.g.: 08-00-27-00-S4-7E .  When spoofing attack is done, attacker pretends to be someone else by falsifying data and there by gain restricted sources and steals personal information.  By changing MAC address we pretend that we are something else.
  • 32. We all have seen that all websites start from either ‘https’ or ‘http’. So, what is http and https in relation to hacking HTTP (HyperText Transfer Protocol) and HTTPS (HyperText Transfer Protocol Secure)
  • 34. When We use HTTP A SENDS PASSWORD B RECEIVES PASSWORD HACKER HACKES LINKS GETS PASSWORD
  • 35. When We use HTTPs A SENDS PASSWORD B RECEIVES MESSAGE ENCRYPTED DECRYPTED
  • 36.  Proxy means to represent someone else in your name.  To mask your IP under a proxy server to show that you live in a different country and to make yourself untraceable.
  • 37. Attacker server target Attacker not connected directly by target but uses other server.
  • 38. Attacker 117.119.22.21 Webserver 111.121.14.65 Proxy 111.121.14.65 There is not direct connection of attacker and web server but attacker uses proxy to hide its identity in a network.
  • 39. Types of PROXY • Direct Attack • Logged Attack Proxy Attacker Target Attacker USA Target
  • 40. • Using proxy changing Continued… Attacker Using proxy changing Target We can use proxy changing, so that target will never know our destination.
  • 41.  Go to Google chrome and then type hide me. Then go to free proxy. Then you can access Google of any country like Germany, USA, Netherland.  You can also use Hideme.be.  Hide.me simply hide your identity to which country you belongs.  Go to Google and type proxy list hide my ass. In this you get IP address of different countries to use as proxy IP address. How to se Proxy changing

Editor's Notes

  1. SFSDFSF