2. What is Hacking ?
Process to bypass the security mechanisms.
Doing something awesome.
Unauthorized use of computer and network.
Hacking is the practice of modifying the
features of a system, in order to accomplish a
goal outside of the creator's original purpose.
Hacking is the process of exploiting
vulnerabilities to gain unauthorized access to
systems or resources.
3. Who are hackers ?
Hacker is a term used by some to mean "a
clever programmer" and by others, especially
those in popular media, to mean "someone
who tries to break into computer systems."
4. Types of Hackers
White Hat
IT professional
Administrators
Black Hat
Crackers
Grey Hat
6. Understanding the need to
hack your own system
Basis for Ethical Hacking.
To catch a thief, think like a thief
7. Overall goals an an ethical
hacker
Hack your systems in a nondestructive
fashion.
Enumerate vulnerabilities and , if necessary,
prove to management that vulnerabilities exit
and can be exploited.
Apply result to remove the vulnerabilities and
better secure your systems.
8. What is computer Security ?
Security is process not product.
The objective of computer security includes
protection of information and property from
theft, corruption, or natural disaster, while
allowing the information and property to
remain accessible, Use to minimize the
security threads (vulnerability + exploit)
9. How to become best hacker ?
Books Says :
Windows Knowledge + Linux + Unix
Networking Knowledge + Creative thinking + expert in pen test
IT Professional & SecurityAnalyst Says :
Programming is key to success
Raghav Bisht Says :
“ If you can understand the system,You can hack it.”
10. Hackers Keywords
RAT : Remote administration tool
DDOS : Distributed denial of service
FUD : Fully undetectable
SQL : Structured query language
XSS : Cross site scripting
Skid : Script kiddie
Malware : Malicious software
SSH : Secure shell
VPN :Virtual private network
VPS :Virtual private service
11. Hacking Terms
If you are a newbie in hacking then you need to learn
some things.There are some terms that every
hacker should know about them.
Algorithm
ANSI Bomb
Back Door
Bot and Botnet
Buffer Overflow
Cracker
DDoS
Deface
DOX
Worm
Zero Day Exploit