Sie sind auf Seite 1von 21

HACKING

Types of Hacking
& Types of Hackers
Contents :
 Meaning of Hacking.
 Why do people Hack??
 Types of Hacking.
 Types of Hackers.
 Conclusion.

2
HACKING??
 The Process of attempting to gain
or successfully gaining,
unauthorized access to computer
resources for the purpose of help or
secure system is called Hacking.

Hacking is technique in which,


any one can access any one’s
computer without his permission.

3
Why do people hack ?
 To make security stronger ( Ethical Hacking ).
 Just for fun.
 Show off.
 Hack other systems secretly.
 Notify many people their thought.
 Steal important information.
 Destroy enemy’s computer network.

4
Types Of Hacking :
 Website Hacking.
 Email Hacking.
 Network Hacking.
 Password Hacking.
 Online Banking Hacking.
 Computer Hacking.

5
Website Hacking:
 Hacking a website means taking control from the
website owner to a person who hacks the website.
 The hacker will get the username and password and
the hacker will use that website for any purpose
which may sometimes to destroy some valuable
information database.

6
Email Hacking :
 Email hacking is illicit access to an email account or email
correspondence.
 Ways of Email Hacking:
• Personal Information.
• Social Hacking.
• Phishing/ Hacking Software.
• Trojan Virus etc.

 Email may be protected by methods such as a strong password


, encryption of the contents or a digital signature. An
email disclaimer may be used to warn unauthorized readers
but these are thought to be ineffective.

7
Network Hacking:
 Network Hacking is generally means gathering information
about domain by using tools like Telnet, NslookUP, Ping,
Tracert, Netstat, etc… over the network.
 It also include OS Fingerprinting, Port Scanning, Port Surfing
using various Tools.
 These are the three most common methods of hacking
a wireless network:
• Sniffing
• Spoofing
• Encryption Cracking

8
Password Hacking:
 Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted by a
computer system. A common approach is to repeatedly try
guesses for the password.
 Most passwords can be cracked by using following techniques:

• Hashing
• Guessing
• Default Passwords
• Brute Force
• Phishing

9
Online banking Hacking:
 Unauthorized accessing bank accounts without knowing the
password or without permission of account holder is known as
Online banking hacking.
 A bank account can be accessed in many ways. When someone
gets access to your account, that person can take all your
funds without your knowledge.
 Here are five simple tips that will help Protect Your Online Accounts:
• Use Strong Password
• Protect your Computer
• Keep an eye on running processes
• Download with care
• Be careful when using unprotected public networks 10
Computer Hacking:
 Computer Hacking is when files on your computer are
viewed, created, or edited without your authorization.

 People can gain complete access to your computer


from any where in the world if your computer is
turned on, unprotected, and has an internet
connection. What they do, is up to them.

 Remote desktop connection technique.

11
Types of Hackers

12
White-hat Hackers :
 The good guys who identify the security
weakness of the system or network and inform
the owner about them.

13
Black-hat Hackers:
A black hat is the villain or bad guy,
who crash into victim’s security to steal
information and destroy the victims
security network.
Also known as ‘cracker’.

14
Grey hat Hackers:
A Grey hat, in the hacking community,
refers to a skilled hacker who is somewhere
in between white and black hat hackers.

15
Language of hackers:
1 -> i or l |\| -> n
3 -> e |\/| -> m
4 -> a s -> z
7 -> t
z -> s
9 -> g
f -> ph
0 -> o
$ -> s ph ->
| -> i or l f x ->
ck ck 16
Example:

1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3


th1s wh3|\| 1 h4ck3d 1n

I did not hack this page, it was like


this when I hacked in.

17
World Famous hackers:
 Stephen
Wozniac

 Tsutomu Shimomura

18
 Kevin Mitnick

 Kevin Poulsen

19
Preventive measures :
 Install a strong anti-virus
 Always run a anti-virus check before
you download a program or a file from the
internet.
 Avoid disclosing personal details like
phone number, credit card details to strangers.

20
Conclusion:
 Proper ethical hackers should be employed.

 Do not expose your passwords to untrusted sites.

 Practice using exact web address.

 Close your internet while not in use.

21

Das könnte Ihnen auch gefallen