Sie sind auf Seite 1von 12

 Hacking has been a part of computing for

40 years.
 The first computer hacker emerged at MIT.
 Hacking is began in the 1960s at MIT ,
origin of the term “hacker”.
 During the 1970’s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
 The truth hacker amongst our societies
have thirst for the knowledge .
 Boredom is never an object of challenge for
the hacker
 The process of attempting to gain or
successfully gaining, unauthorized access to
computer resources is called Hacking.
 Hacking means finding out weaknesses in an
established system and exploiting them.
• In the computer security context, a hacker is
someone who seeks and exploits weaknesses in a
computer system or computer network.
• The term hacker is reclaimed by computer programmers
who argue that someone breaking into computers is
better called a cracker.
• Hackers were computer geeks who know almost
everything about computers both hardware and
software and are widely respected for there
knowledge.
Kevin Johan LinusTorv
Ian
Mitnick Helsinguis alds
Murphy

Mark Robert
Abene Morris
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network during the war.
• Website Hacking
• Network Hacking
• Ethical Hacking
• Email Hacking
• Password Hacking
• Online Banking Hacking
• Computer Hacking
 Website Hacking: Hacking a website means taking
control from the website owner to a person who hacks
the website.
 Network Hacking : Network Hacking is generally means
gathering information about domain by using tools like
Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the
network.
 Ethical Hacking: Ethical hacking is where a person hacks
to find weaknesses in a system and then usually patches
them.
 Email Hacking : Email hacking is illicit access to an
email account or email correspondence.
 Password Hacking : Password Hacking Password cracking
is the process of recovering secret passwords from data
that has been stored in or transmitted by a computer
system.
 Online Banking Hacking: Online banking Hacking
Unauthorized accessing bank accounts without knowing
the password or without permission of account holder is
known as Online banking hacking.
 Computer Hacking: Computer Hacking is when files on
your computer are viewed, created, or edited without
your authorization.
 Vulnerability scanner: checks computers on networks for
known weaknesses
 Password cracking: the process of recovering passwords
from data stored or transmitted by computer systems
 Packet sniffer: applications that capture data packets in
order to view data and passwords in transit over networks
 Spoofing attack: involves websites which falsify data by
mimicking legitimate sites, and they are therefore
treated as trusted sites by users or other programs
 Root kit: represents a set of programs which work to
subvert control of an operating system from legitimate
operators
 Vulnerability scanner: checks computers on networks for
known weaknesses
 Password cracking: the process of recovering passwords
from data stored or transmitted by computer systems
 Packet sniffer: applications that capture data packets in
order to view data and passwords in transit over networks
 Spoofing attack: involves websites which falsify data by
mimicking legitimate sites, and they are therefore
treated as trusted sites by users or other programs
 Root kit: represents a set of programs which work to
subvert control of an operating system from legitimate
operators
•Can be used to recover lost information where the
•computer password has been lost.
•Teaches you that no technology is 100% secure.
•To test how good security is on your own network.
•They call it white hat computer hacking.

•Criminals can use it to their advantage.


•It can harm someone's privacy
•It's Illegal