SlideShare a Scribd company logo
1 of 24
HACKING
HISTORY OF HACKING:
• THE FIRST HACKER WAS APPEARED IN 1960’S AT THE MASSACHUSETTS INSTITUTE
OF TECHNOLOGY(MIT)
• DURING THE 1970’S, A DIFFERENT KIND OF HACKER APPEARED: PHONE
PHREAKER OR PHONE HACKER
WHAT IS HACKING:
• IN COMPUTING, A HACKER IS ANY SKILLED COMPUTER EXPERT THAT USES
THEIR TECHNICAL KNOWLEDGE TO OVERCOME A PROBLEM. WHILE "HACKER"
CAN REFER TO ANY COMPUTER PROGRAMMER, THE TERM HAS BECOME
ASSOCIATED IN POPULAR CULTURE WITH A "SECURITY HACKER", SOMEONE
WHO, WITH THEIR TECHNICAL KNOWLEDGE, USES BUGS OR EXPLOITS TO BREAK
INTO COMPUTER SYSTEMS.
TYPES OF HACKER:
Hacker
Ethical Hacker
(White hat)
Cracker
(Black hat)
Grey hat
(Both)
Ethical Hacker (White hat): A hacker who gains
access to systems with a view to fix the identified
weaknesses. They may also perform penetration
Testing and vulnerability assessments.
Cracker (Black hat): A hacker who gains
unauthorized access to computer systems for
personal gain. The intent is usually to steal
corporate data, violate privacy rights, transfer funds
from bank accounts etc.
Grey hat: A hacker who is in between ethical and
black hat hackers. He/she breaks into computer
systems without authority with a view to identify
weaknesses and reveal them to the system owner.
HACKING TECHNIQUES:
1. KEYLOGGER
2. DENIAL OF SERVICE (DOSDDOS)
3. WATERHOLE ATTACKS
4. FAKE WAP
5. EAVESDROPPING (PASSIVE ATTACKS)
6. PHISHING
7. VIRUS, TROJEN ETC.
8. CLICKJACKING ATTACKS
9. COOKIE THEFT
10. BAIT AND SWITCH
KEYLOGGER:
• KEYLOGGER IS A SIMPLE SOFTWARE THAT RECORDS THE KEY SEQUENCE AND
STROKES OF YOUR KEYBOARD INTO A LOG FILE ON YOUR MACHINE. THESE LOG
FILES MIGHT EVEN CONTAIN YOUR PERSONAL EMAIL IDS AND PASSWORDS.
• KEYLOGGER IS ONE OF THE MAIN REASONS WHY ONLINE BANKING SITES GIVE
YOU AN OPTION TO USE THEIR VIRTUAL KEYBOARDS.
DENIAL OF SERVICE ATTACK:
• A DENIAL OF SERVICE ATTACK IS A HACKING TECHNIQUE TO TAKE DOWN A SITE
OR SERVER BY FLOODING THAT SITE OR SERVER WITH A LOT OF TRAFFIC THAT
THE SERVER IS UNABLE TO PROCESS ALL THE REQUESTS IN THE REAL TIME AND
FINALLY CRASHES DOWN.
• FOR DDOS ATTACKS, HACKERS OFTEN DEPLOY BOTNETS OR ZOMBIE COMPUTERS
WHICH HAVE GOT THE ONLY WORK TO FLOOD YOUR SYSTEM WITH REQUEST
PACKETS.
WATERHOLE ATTACKS:
• IF YOU ARE A BIG FAN OF DISCOVERY OR NATIONAL GEOGRAPHIC CHANNELS, YOU
COULD RELATE EASILY WITH THE WATERHOLE ATTACKS. TO POISON A PLACE, IN THIS
CASE, THE HACKER HITS THE MOST ACCESSIBLE PHYSICAL POINT OF THE VICTIM.
• FOR EXAMPLE, IF THE SOURCE OF A RIVER IS POISONED, IT WILL HIT THE ENTIRE
STRETCH OF ANIMALS DURING SUMMER. IN THE SAME WAY, HACKERS TARGET THE
MOST ACCESSED PHYSICAL LOCATION TO ATTACK THE VICTIM. THAT POINT COULD
BE A COFFEE SHOP, A CAFETERIA ETC.
• ONCE HACKERS ARE AWARE OF YOUR TIMINGS, THEY MIGHT CREATE A FAKE WI-FI
ACCESS POINT AND MODIFY YOUR MOST VISITED WEBSITE TO REDIRECT THEM TO
YOU TO GET YOUR PERSONAL INFORMATION.
FAKE WAP:
• EVEN JUST FOR FUN, A HACKER CAN USE SOFTWARE TO FAKE A WIRELESS
ACCESS POINT. THIS WAP CONNECTS TO THE OFFICIAL PUBLIC PLACE WAP. ONCE
YOU GET CONNECTED THE FAKE WAP, A HACKER CAN ACCESS YOUR DATA, JUST
LIKE IN THE ABOVE CASE.
• EX:
• TOOL: WI-FI PUMPKIN
EAVESDROPPING (PASSIVE ATTACKS):
• UNLIKE OTHER ATTACKS WHICH ARE ACTIVE IN NATURE, USING A PASSIVE
ATTACK, A HACKER JUST MONITORS THE COMPUTER SYSTEMS AND NETWORKS
TO GAIN SOME UNWANTED INFORMATION.
• THE MOTIVE BEHIND EAVESDROPPING IS NOT TO HARM THE SYSTEM BUT TO GET
SOME INFORMATION WITHOUT BEING IDENTIFIED.
PHISHING:
• PHISHING IS A HACKING TECHNIQUE USING WHICH A HACKER REPLICATES THE
MOST-ACCESSED SITES AND TRAPS THE VICTIM BY SENDING THAT SPOOFED
LINK.
• ONCE THE VICTIM TRIES TO LOGIN OR ENTER SOME DATA, THE HACKER GETS
THAT PRIVATE INFORMATION OF THE TARGET VICTIM USING THE TROJAN
RUNNING ON THE FAKE SITE.
VIRUS OR TROJANS ETC. :
• VIRUS OR TROJANS ARE MALICIOUS SOFTWARE PROGRAMS WHICH
GET INSTALLED INTO THE VICTIM’S SYSTEM AND KEEPS SENDING THE VICTIMS
DATA TO THE HACKER.
CLICKJACKING:
• CLICKJACKING IS ALSO KNOWN BY A DIFFERENT NAME, UI REDRESS. IN THIS
ATTACK, THE HACKER HIDES THE ACTUAL UI WHERE THE VICTIM IS SUPPOSED
TO CLICK.
• IN ANOTHER WORD, THE ATTACKER HIJACKS THE CLICKS OF THE VICTIM THAT
AREN’T MEANT FOR THE EXACT PAGE, BUT FOR A PAGE WHERE THE HACKER
WANTS YOU TO BE.
COOKIE THEFT:
• THE COOKIES OF A BROWSER KEEP OUR PERSONAL DATA SUCH AS BROWSING
HISTORY, USERNAME, AND PASSWORDS FOR DIFFERENT SITES THAT WE ACCESS.
ONCE THE HACKER GETS THE ACCESS TO YOUR COOKIE, HE CAN EVEN
AUTHENTICATE HIMSELF AS YOU ON A BROWSER.
BAIT AND SWITCH:
• USING BAIT AND SWITCH HACKING TECHNIQUE, THE HACKER RUNS
A MALICIOUS PROGRAM WHICH THE USER BELIEVES TO BE AUTHENTIC. THIS
WAY, AFTER INSTALLING THE MALICIOUS PROGRAM ON YOUR COMPUTER, THE
HACKER GETS UNPRIVILEGED ACCESS TO YOUR COMPUTER.
HACKING LANGUAGE:
1. WEB HACKING:
SINCE MOST OF THE TECH IS BUILD AROUND WORLD WIDE WEB, IT IS IMPORTANT TO LEARN WEB HACKING TO BE A
GOOD HACKER. LET’S SAY YOU ARE INTERESTED IN HACKING WEB APPS AND/OR WEBSITES THEN YOU WILL NEED TO
LEARN WEB CODING. WEBSITES USE MOSTLY HTML, PHP AND JAVASCRIPT SO IT IS IMPORTANT TO LEARN THESE THREE.
• HTML:
ONE OF THE EASIEST AND WIDELY USED STATIC MARKUP WEB LANGUAGE PRESENT IN EACH AND EVERY WEBSITE YOU
SEE IN YOUR BROWSER. IT’S RECOMMENDED TO LEARN HTML BECAUSE IT HELPS UNDERSTANDING WEB ACTIONS,
RESPONSE, AND LOGIC.
• JAVASCRIPT:
JS IS A CLIENT-SIDE WEB PROGRAMMING MOSTLY USED IN WEB SITES FOR BETTER USER INTERFACE AND QUICK
RESPONSE. IF YOU ARE INTERESTED IN A HACKING CAREER YOU NEED TO LEARN JAVASCRIPT BECAUSE IT HELPS TO
UNDERSTAND CLIENT-SIDE MECHANISM WHICH IS ESSENTIAL FOR FINDING CLIENT-SIDE FLAWS.
CONT.….
• PHP:
A DYNAMIC SERVER-SIDE LANGUAGE WHICH IS RESPONSIBLE FOR MANAGING WEB-APPS AND
DATABASE. PHP IS CONSIDERED ONE OF THE MOST ESSENTIAL LANGUAGE BECAUSE IT CONTROLS
EVERYTHING ON SITE AND SERVER, LIKE A CAPTAIN OF A SHIP. IT IS ADVISED TO LEARN PHP
NICELY.
• SQL:
SQL IS RESPONSIBLE FOR STORING AND MANAGING SENSITIVE AND CONFIDENTIAL DATA SUCH AS
USER CREDENTIALS, BANK AND PERSONAL INFORMATION ABOUT THE WEBSITE VISITORS. BLACK
HAT HACKERS MOSTLY TARGET SQL DATABASE AND STEAL INFORMATION WHICH IS LATER SOLD
ON UNDERGROUND DARK WEB FORUM. IF YOU WANT TO BE GOOD SECURITY RESEARCHER, YOU
SHOULD LEARN SQL SO THAT YOU CAN FIND FLAWS IN A WEBSITE AND REPORT THEM.
CONT...
2. EXPLOIT WRITING
AFTER WEB HACKING, ANOTHER MOST IMPORTANT FEATURE OF HACKING IS EXPLOITS. YOU CAN CRACK A PARTICULAR
SOFTWARE BY WRITING A EXPLOIT. BUT TO WRITE A EXPLOIT YOU NEED TO LEARN EITHER PYTHON OR RUBY.
• PYTHON:
IT IS SAID THAT A SECURITY RESEARCHER OR HACKER SHOULD KNOW PYTHON BECAUSE IT THE CORE LANGUAGE FOR
CREATING EXPLOITS AND TOOLS. SECURITY EXPERTS AND EVEN PRO HACKERS SUGGEST THAT MASTER PYTHON IS THE
BEST WAY TO LEARN HACKING. PYTHON OFFERS WIDER FLEXIBILITY AND YOU CAN CREATE EXPLOITS ONLY IF YOU ARE
GOOD IN PYTHON.
• RUBY:
RUBY IS A SIMPLE YET COMPLICATED OBJECT-ORIENTED LANGUAGE. RUBY IS VERY USEFUL WHEN IT COMES TO EXPLOIT
WRITING. IT IS USED FOR METERPRETER SCRIPTING BY HACKERS. THE MOST FAMOUS HACKER TOOL, METASPLOIT
FRAMEWORK IS PROGRAMMED IN RUBY. THOUGH RUBY MAY NOT BE AS VERSATILE AS PYTHON, KNOWLEDGE OF RUBY IS
MUST IN UNDERSTANDING EXPLOITS.
CONT.…
• REVERSE ENGINEERING:
• REVERSE ENGINEERING, THE PROCESS OF TAKING A SOFTWARE
PROGRAM’S BINARY CODE AND RECREATING IT SO AS TO TRACE IT BACK TO
THE ORIGINAL SOURCE CODE. IF YOU KNOW REVERSE ENGINEERING YOU CAN
FIND FLAWS AND BUGS EASILY. IF YOU WANT TO LEARN REVERSE ENGINEERING
YOU NEED TO KNOW C, C++ AND JAVA. THE PROCESS OF CONVERTING THE CODE
WRITTEN IN HIGH LEVEL LANGUAGE INTO A LOW LEVEL LANGUAGE WITHOUT
CHANGING THE ORIGINAL PROGRAM IS KNOWN AS REVERSE ENGINEERING.
HOW TO TRANSLATE THE HACKERS’
LANGUAGE
1 -> I OR L
3 -> E
4 -> A
7 -> T
9 -> G
0 -> O
$ -> S
| -> I OR L
|| -> N
|/| -> M
S -> Z
Z -> S
F -> PH
PH -> F
X -> CK
CK -> X
HOW TO TRANSLATE THE HACKERS’
LANGUAGE
• EX)
• 1 D1D N0T H4CK TH1S P4G3, 1T W4S L1K3 TH1S WH3N 1 H4CK3D 1N
• I DID NOT HACK THIS PAGE, IT WAS LIKE THIS WHEN I HACKED IN
TOP 10 ETHICAL HACKER:
1) RAHUL TYAGI
2) PRANAV MISTRY
3) ANKIT FADIA
4) KOUSHIK DUTTA
5) VIVEK RAMACHANDRAN
6) TRISHNEET ARORA
7) SUNNY VAGHELA
8) BENILD JOSEPH
9) FALGUN RATHOD
10) JAYANT KRISHNAMURTHY
Hacking and Types of Hacker.

More Related Content

What's hot

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
System hacking
System hackingSystem hacking
System hackingCAS
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Password Cracking
Password Cracking Password Cracking
Password Cracking Sina Manavi
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 

What's hot (20)

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
System hacking
System hackingSystem hacking
System hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
hacking
hackinghacking
hacking
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Hacking
HackingHacking
Hacking
 

Similar to Hacking and Types of Hacker.

Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosOuthai SAIOUDOM
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty BasicsHackerOne
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Alan Quayle
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profitFlorent Batard
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBarcamp Kerala
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
 

Similar to Hacking and Types of Hacker. (20)

Hacking
HackingHacking
Hacking
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
Hacking Hacking
Hacking
 
News2 bytes
News2 bytesNews2 bytes
News2 bytes
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
 
Social engineering
Social engineering Social engineering
Social engineering
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty Basics
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 

More from Coder Tech

HTML (Basic to Advance)
HTML (Basic to Advance)HTML (Basic to Advance)
HTML (Basic to Advance)Coder Tech
 
PHP Course (Basic to Advance)
PHP Course (Basic to Advance)PHP Course (Basic to Advance)
PHP Course (Basic to Advance)Coder Tech
 
Kotlin- Basic to Advance
Kotlin- Basic to Advance Kotlin- Basic to Advance
Kotlin- Basic to Advance Coder Tech
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware AuthenticationCoder Tech
 
Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)Coder Tech
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory spaceCoder Tech
 
Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)Coder Tech
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr codeCoder Tech
 

More from Coder Tech (9)

HTML (Basic to Advance)
HTML (Basic to Advance)HTML (Basic to Advance)
HTML (Basic to Advance)
 
PHP Course (Basic to Advance)
PHP Course (Basic to Advance)PHP Course (Basic to Advance)
PHP Course (Basic to Advance)
 
Kotlin- Basic to Advance
Kotlin- Basic to Advance Kotlin- Basic to Advance
Kotlin- Basic to Advance
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
 
Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory space
 
Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Hacking and Types of Hacker.

  • 2. HISTORY OF HACKING: • THE FIRST HACKER WAS APPEARED IN 1960’S AT THE MASSACHUSETTS INSTITUTE OF TECHNOLOGY(MIT) • DURING THE 1970’S, A DIFFERENT KIND OF HACKER APPEARED: PHONE PHREAKER OR PHONE HACKER
  • 3. WHAT IS HACKING: • IN COMPUTING, A HACKER IS ANY SKILLED COMPUTER EXPERT THAT USES THEIR TECHNICAL KNOWLEDGE TO OVERCOME A PROBLEM. WHILE "HACKER" CAN REFER TO ANY COMPUTER PROGRAMMER, THE TERM HAS BECOME ASSOCIATED IN POPULAR CULTURE WITH A "SECURITY HACKER", SOMEONE WHO, WITH THEIR TECHNICAL KNOWLEDGE, USES BUGS OR EXPLOITS TO BREAK INTO COMPUTER SYSTEMS.
  • 4. TYPES OF HACKER: Hacker Ethical Hacker (White hat) Cracker (Black hat) Grey hat (Both)
  • 5. Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration Testing and vulnerability assessments. Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
  • 6. HACKING TECHNIQUES: 1. KEYLOGGER 2. DENIAL OF SERVICE (DOSDDOS) 3. WATERHOLE ATTACKS 4. FAKE WAP 5. EAVESDROPPING (PASSIVE ATTACKS) 6. PHISHING 7. VIRUS, TROJEN ETC. 8. CLICKJACKING ATTACKS 9. COOKIE THEFT 10. BAIT AND SWITCH
  • 7. KEYLOGGER: • KEYLOGGER IS A SIMPLE SOFTWARE THAT RECORDS THE KEY SEQUENCE AND STROKES OF YOUR KEYBOARD INTO A LOG FILE ON YOUR MACHINE. THESE LOG FILES MIGHT EVEN CONTAIN YOUR PERSONAL EMAIL IDS AND PASSWORDS. • KEYLOGGER IS ONE OF THE MAIN REASONS WHY ONLINE BANKING SITES GIVE YOU AN OPTION TO USE THEIR VIRTUAL KEYBOARDS.
  • 8. DENIAL OF SERVICE ATTACK: • A DENIAL OF SERVICE ATTACK IS A HACKING TECHNIQUE TO TAKE DOWN A SITE OR SERVER BY FLOODING THAT SITE OR SERVER WITH A LOT OF TRAFFIC THAT THE SERVER IS UNABLE TO PROCESS ALL THE REQUESTS IN THE REAL TIME AND FINALLY CRASHES DOWN. • FOR DDOS ATTACKS, HACKERS OFTEN DEPLOY BOTNETS OR ZOMBIE COMPUTERS WHICH HAVE GOT THE ONLY WORK TO FLOOD YOUR SYSTEM WITH REQUEST PACKETS.
  • 9. WATERHOLE ATTACKS: • IF YOU ARE A BIG FAN OF DISCOVERY OR NATIONAL GEOGRAPHIC CHANNELS, YOU COULD RELATE EASILY WITH THE WATERHOLE ATTACKS. TO POISON A PLACE, IN THIS CASE, THE HACKER HITS THE MOST ACCESSIBLE PHYSICAL POINT OF THE VICTIM. • FOR EXAMPLE, IF THE SOURCE OF A RIVER IS POISONED, IT WILL HIT THE ENTIRE STRETCH OF ANIMALS DURING SUMMER. IN THE SAME WAY, HACKERS TARGET THE MOST ACCESSED PHYSICAL LOCATION TO ATTACK THE VICTIM. THAT POINT COULD BE A COFFEE SHOP, A CAFETERIA ETC. • ONCE HACKERS ARE AWARE OF YOUR TIMINGS, THEY MIGHT CREATE A FAKE WI-FI ACCESS POINT AND MODIFY YOUR MOST VISITED WEBSITE TO REDIRECT THEM TO YOU TO GET YOUR PERSONAL INFORMATION.
  • 10. FAKE WAP: • EVEN JUST FOR FUN, A HACKER CAN USE SOFTWARE TO FAKE A WIRELESS ACCESS POINT. THIS WAP CONNECTS TO THE OFFICIAL PUBLIC PLACE WAP. ONCE YOU GET CONNECTED THE FAKE WAP, A HACKER CAN ACCESS YOUR DATA, JUST LIKE IN THE ABOVE CASE. • EX: • TOOL: WI-FI PUMPKIN
  • 11. EAVESDROPPING (PASSIVE ATTACKS): • UNLIKE OTHER ATTACKS WHICH ARE ACTIVE IN NATURE, USING A PASSIVE ATTACK, A HACKER JUST MONITORS THE COMPUTER SYSTEMS AND NETWORKS TO GAIN SOME UNWANTED INFORMATION. • THE MOTIVE BEHIND EAVESDROPPING IS NOT TO HARM THE SYSTEM BUT TO GET SOME INFORMATION WITHOUT BEING IDENTIFIED.
  • 12. PHISHING: • PHISHING IS A HACKING TECHNIQUE USING WHICH A HACKER REPLICATES THE MOST-ACCESSED SITES AND TRAPS THE VICTIM BY SENDING THAT SPOOFED LINK. • ONCE THE VICTIM TRIES TO LOGIN OR ENTER SOME DATA, THE HACKER GETS THAT PRIVATE INFORMATION OF THE TARGET VICTIM USING THE TROJAN RUNNING ON THE FAKE SITE.
  • 13. VIRUS OR TROJANS ETC. : • VIRUS OR TROJANS ARE MALICIOUS SOFTWARE PROGRAMS WHICH GET INSTALLED INTO THE VICTIM’S SYSTEM AND KEEPS SENDING THE VICTIMS DATA TO THE HACKER.
  • 14. CLICKJACKING: • CLICKJACKING IS ALSO KNOWN BY A DIFFERENT NAME, UI REDRESS. IN THIS ATTACK, THE HACKER HIDES THE ACTUAL UI WHERE THE VICTIM IS SUPPOSED TO CLICK. • IN ANOTHER WORD, THE ATTACKER HIJACKS THE CLICKS OF THE VICTIM THAT AREN’T MEANT FOR THE EXACT PAGE, BUT FOR A PAGE WHERE THE HACKER WANTS YOU TO BE.
  • 15. COOKIE THEFT: • THE COOKIES OF A BROWSER KEEP OUR PERSONAL DATA SUCH AS BROWSING HISTORY, USERNAME, AND PASSWORDS FOR DIFFERENT SITES THAT WE ACCESS. ONCE THE HACKER GETS THE ACCESS TO YOUR COOKIE, HE CAN EVEN AUTHENTICATE HIMSELF AS YOU ON A BROWSER.
  • 16. BAIT AND SWITCH: • USING BAIT AND SWITCH HACKING TECHNIQUE, THE HACKER RUNS A MALICIOUS PROGRAM WHICH THE USER BELIEVES TO BE AUTHENTIC. THIS WAY, AFTER INSTALLING THE MALICIOUS PROGRAM ON YOUR COMPUTER, THE HACKER GETS UNPRIVILEGED ACCESS TO YOUR COMPUTER.
  • 17. HACKING LANGUAGE: 1. WEB HACKING: SINCE MOST OF THE TECH IS BUILD AROUND WORLD WIDE WEB, IT IS IMPORTANT TO LEARN WEB HACKING TO BE A GOOD HACKER. LET’S SAY YOU ARE INTERESTED IN HACKING WEB APPS AND/OR WEBSITES THEN YOU WILL NEED TO LEARN WEB CODING. WEBSITES USE MOSTLY HTML, PHP AND JAVASCRIPT SO IT IS IMPORTANT TO LEARN THESE THREE. • HTML: ONE OF THE EASIEST AND WIDELY USED STATIC MARKUP WEB LANGUAGE PRESENT IN EACH AND EVERY WEBSITE YOU SEE IN YOUR BROWSER. IT’S RECOMMENDED TO LEARN HTML BECAUSE IT HELPS UNDERSTANDING WEB ACTIONS, RESPONSE, AND LOGIC. • JAVASCRIPT: JS IS A CLIENT-SIDE WEB PROGRAMMING MOSTLY USED IN WEB SITES FOR BETTER USER INTERFACE AND QUICK RESPONSE. IF YOU ARE INTERESTED IN A HACKING CAREER YOU NEED TO LEARN JAVASCRIPT BECAUSE IT HELPS TO UNDERSTAND CLIENT-SIDE MECHANISM WHICH IS ESSENTIAL FOR FINDING CLIENT-SIDE FLAWS.
  • 18. CONT.…. • PHP: A DYNAMIC SERVER-SIDE LANGUAGE WHICH IS RESPONSIBLE FOR MANAGING WEB-APPS AND DATABASE. PHP IS CONSIDERED ONE OF THE MOST ESSENTIAL LANGUAGE BECAUSE IT CONTROLS EVERYTHING ON SITE AND SERVER, LIKE A CAPTAIN OF A SHIP. IT IS ADVISED TO LEARN PHP NICELY. • SQL: SQL IS RESPONSIBLE FOR STORING AND MANAGING SENSITIVE AND CONFIDENTIAL DATA SUCH AS USER CREDENTIALS, BANK AND PERSONAL INFORMATION ABOUT THE WEBSITE VISITORS. BLACK HAT HACKERS MOSTLY TARGET SQL DATABASE AND STEAL INFORMATION WHICH IS LATER SOLD ON UNDERGROUND DARK WEB FORUM. IF YOU WANT TO BE GOOD SECURITY RESEARCHER, YOU SHOULD LEARN SQL SO THAT YOU CAN FIND FLAWS IN A WEBSITE AND REPORT THEM.
  • 19. CONT... 2. EXPLOIT WRITING AFTER WEB HACKING, ANOTHER MOST IMPORTANT FEATURE OF HACKING IS EXPLOITS. YOU CAN CRACK A PARTICULAR SOFTWARE BY WRITING A EXPLOIT. BUT TO WRITE A EXPLOIT YOU NEED TO LEARN EITHER PYTHON OR RUBY. • PYTHON: IT IS SAID THAT A SECURITY RESEARCHER OR HACKER SHOULD KNOW PYTHON BECAUSE IT THE CORE LANGUAGE FOR CREATING EXPLOITS AND TOOLS. SECURITY EXPERTS AND EVEN PRO HACKERS SUGGEST THAT MASTER PYTHON IS THE BEST WAY TO LEARN HACKING. PYTHON OFFERS WIDER FLEXIBILITY AND YOU CAN CREATE EXPLOITS ONLY IF YOU ARE GOOD IN PYTHON. • RUBY: RUBY IS A SIMPLE YET COMPLICATED OBJECT-ORIENTED LANGUAGE. RUBY IS VERY USEFUL WHEN IT COMES TO EXPLOIT WRITING. IT IS USED FOR METERPRETER SCRIPTING BY HACKERS. THE MOST FAMOUS HACKER TOOL, METASPLOIT FRAMEWORK IS PROGRAMMED IN RUBY. THOUGH RUBY MAY NOT BE AS VERSATILE AS PYTHON, KNOWLEDGE OF RUBY IS MUST IN UNDERSTANDING EXPLOITS.
  • 20. CONT.… • REVERSE ENGINEERING: • REVERSE ENGINEERING, THE PROCESS OF TAKING A SOFTWARE PROGRAM’S BINARY CODE AND RECREATING IT SO AS TO TRACE IT BACK TO THE ORIGINAL SOURCE CODE. IF YOU KNOW REVERSE ENGINEERING YOU CAN FIND FLAWS AND BUGS EASILY. IF YOU WANT TO LEARN REVERSE ENGINEERING YOU NEED TO KNOW C, C++ AND JAVA. THE PROCESS OF CONVERTING THE CODE WRITTEN IN HIGH LEVEL LANGUAGE INTO A LOW LEVEL LANGUAGE WITHOUT CHANGING THE ORIGINAL PROGRAM IS KNOWN AS REVERSE ENGINEERING.
  • 21. HOW TO TRANSLATE THE HACKERS’ LANGUAGE 1 -> I OR L 3 -> E 4 -> A 7 -> T 9 -> G 0 -> O $ -> S | -> I OR L || -> N |/| -> M S -> Z Z -> S F -> PH PH -> F X -> CK CK -> X
  • 22. HOW TO TRANSLATE THE HACKERS’ LANGUAGE • EX) • 1 D1D N0T H4CK TH1S P4G3, 1T W4S L1K3 TH1S WH3N 1 H4CK3D 1N • I DID NOT HACK THIS PAGE, IT WAS LIKE THIS WHEN I HACKED IN
  • 23. TOP 10 ETHICAL HACKER: 1) RAHUL TYAGI 2) PRANAV MISTRY 3) ANKIT FADIA 4) KOUSHIK DUTTA 5) VIVEK RAMACHANDRAN 6) TRISHNEET ARORA 7) SUNNY VAGHELA 8) BENILD JOSEPH 9) FALGUN RATHOD 10) JAYANT KRISHNAMURTHY