Hacking Presentation
Hacking Presentation
Hacking Presentation
Presented To Mam
Tahira
HACKING
What Is Hacking?
Illegal activities from harmless pranks to huge thefts and shutdown of services.
Or
The Most Simple Definition of Hacking is the act of gaining access
without legal authorization to a computer or computer network.
History Of Hacking
History Of Hacking
The First Hacker Was Appeared in 1960’s at the Massachusetts Institute Of Technoogy (MIT).
During the 1970’s, a different king of hacker appeared: Phone Phreaker Or Phone Hacker.
To have a computer system that prevents malicious hackers from gaining access
Disadvantages of Hacking
Privacy violation.
To break Policy
Compliance
HACKER
Famous Hackers and how they
became famous.
Jonathan James
Jonathan James was an American hacker, illfamous as
the first juvenile sent to prison for cybercrime in United
States. He committed suicide in 2008 of a self-inflicted
gunshot wound.
In 1999, at the age of 16, he gained access to
several computers by breaking the password of a server
that belonged to NASA and stole the source code of the
International Space Station among other sensitive
information.
Famous Hackers and how they
became famous.
Ian Murphy
Ian Murphy, also known as Captain Zap, at one point of time was
having high school students steal computer equipment for him. Ian
selfproclaims to have been "the first hacker ever convicted of a
crime".
Ian's career as a master hacker was fabricated in 1986 after he
and his unemployed wife decided to form some type of business.
He has a long history of computer and Internet frauds. One of
his favourite games is to forge Email headers and to send out third-
party threat letters.
Famous Hackers and how they became
famous.
Kevin Mitnick
Kevin Mitnick is a computer security consultant and author, who
infiltrates his clients’ companies to expose their security strengths,
weaknesses, and potential loopholes.
He is the first hacker to have his face immortalized on an FBI
"Most Wanted" poster. He was formerly the most wanted computer
criminal in the history of United States.
From the 1970s up until his last arrest in 1995, he skilfully
bypassed corporate security safeguards, and found his way into
some of the most well-guarded systems such as Sun Microsystems,
Digital Equipment Corporation, Motorola, Netcom, and Nokia.
Famous Hackers and how they became
famous.
Mark Abene
Mark Abene, known around the world by his pseudonym Phiber
Optik, is an information security expert and entrepreneur. He was a
high-profile hacker in the 1980s and early 1990s. He was one of the
first hackers to openly debate and defend the positive merits of
ethical hacking as a beneficial tool to industry.
His expertise spreads across penetration studies, on-site
security assessments, secure code reviews, security policy review
and generation, systems and network architecture, systems
administration and network management, among many others. His
clientele includes American Express, UBS, First USA, Ernst &
Young, KPMG and others.
Ethical Hacking − Terminologies
Attack: An attack is an action that is done on a system to get its access and extract
sensitive data.
Back door: A back door, or trap door, is a hidden entry to a computing device or software
that bypasses security measures, such as logins and password protections.
Buffer Overflow: Buffer Overflow is a flaw that occurs when more data is
written to a block of memory, or buffer, than the buffer is allocated to hold.
Ethical Hacking − Terminologies
Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are
numerous companies that hire ethical hackers for penetration testing and vulnerability assessments.
Black Hat Hackers
Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized
access to a system and harm its operations or steal sensitive information.
Black Hat hacking is always illegal because of its bad intent which includes stealing
corporate data, violating privacy, damaging the system, blocking network communication, etc.
Grey Hat Hackers
Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent
but for their fun, they exploit a security weakness in a computer system or network without the owner’s
permission or knowledge.
Their intent is to bring the weakness to the attention of the owners and getting appreciation or
a little bounty from the owners.
Program For Hacking
Metasploit. oclHashcat
Wireshark Maltego.
Social-Engineer
Toolkit.
Conclusion
Proper Ethical Hacker should be Employed.
Ethical Hacking is legal way to securing your system, main way to that
giving your system in hands of ethical hacker so that he can make your
system full proof. it is a part of overall security program. System
administrator should always try to find loop holes in to the system and
make preventive majors. Ethical hackers possesses same skills, mindset
and tools of a hacker but the attacks are done in a non-destructive
mannaer.