Beruflich Dokumente
Kultur Dokumente
Contents
->History Of hacking
->What is hacking?
->Types of hacking
->Website Hacking
->Network hacking
->Ethical hacking
->Pros-Cons and Safety
measurement for hacking
->Conclusion
What’s hacking?
▶In the cyber security world, the person who’s able to
discover a weakness in the system and manages to exploit
it to accomplish his goal, is referred as a hacker and the
process is known as hacking.
▶Nowadays, people think hacking is only hijacking
Facebook account. Hacking is practice of modifying the
features of a system or finding a loophole, in order to
accomplish a goal outside creator’s original purpose.
▶Due to the mass attention given to the so called “black-
hats” or “crackers” from the media, the reputation of all
the hackers even the good ones is damaged.
▶Hacking is always viewed as something illegal and shrewd.
▶A few bad guy doing a few bad things has put a bad
name for an entire community. This doesn’t have to be so.
Let’s talk about some
famous type of Hacks!
EAVESDROPPING
ATTACK
1. HARDWARE TOOLS :
o High power antennas can be used to provide intercepting
wireless traffic from miles away.
2.SOFTWARE TOOLS :
o Any wireless packet sniffer can be used.
o Widely available for sale and even free over internet.
LEGALITY OF EAVESDROPPING
DEVICES
▶ Beware of the legal issues before you buy
eavesdropping devices.
▶ It is a crime in most countries to eavesdrop on
someone’s privacy.
▶ But as network administrator need to analyze traffic on
their network(debug network , find illegitimately installed
access points) they may need eavesdropping devices.
Man in the Middle Attack
● A man-in-the-middle (MITM) attack is a form of
eavesdropping where communication between two
users is monitored and modified by an unauthorized
party.
There is no established limit on how one misuse a website and not every hacker is pro.
You may have come across a number of ways to misuse a website either accidentally
or incidentally. Sometimes accidentally clicking on the buttons when you are not
supposed to do so or performing something more than ordinary can cause problems on
the websites that are not properly programmed. If the users are misusing a website
intentionally or accidentally, thereby generating some errors can render the website
useless.
So, if you want to own a safe and secure website, then you out to work on the website
security and protect the same from these probable kinds of hacking.
Malware Attacks
● Adware
● Bot
● Bug
● Ransomware
● Rootkit
● Spyware
● Trojan Horse
● Virus
● Worm
Malware Symptoms
● Increased CPU usage
● Slow computer or web browser speeds
● Problems connecting to networks
● Freezing or crashing
● Modified or deleted files
● Appearance of strange files, programs, or desktop icons
● Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn
off antivirus and firewall programs)
● Strange computer behavior
● Emails/messages being sent automatically and without user’s knowledge (a friend receives a
strange email from you that you did not send)
Prevention and Removal