2. HACKING!
Hacking is the gaining of access(wanted or
unwanted) to a computer and viewing,
copying, or creating data without the
intention of destroying data or maliciously
harming the computer.
3. METHODS OF HACKING
hackers intention to stole critical
information of users like account
passwords, MasterCard detail, etc
PHISHING
Hackers will get your credentials
through a follow known as
key-logging.
CRACK PASSWORD
Code injection is the exploitation
of a computer bug that is caused
by processing invalid data
MALWARE INJECTING
Distributed Denial-of-Service is aimed
toward taking down a website or wifi so
that it cannot accesed by user.
DDoS ATTACK
Hackers access the website exploitation
malicious codes and steal cookies that
contain tips, login passwords, etc.
COOKIE THEFT
Social engineering is an attempt to
share personal info, sometimes by
impersonating a trustworthy supply.
SOCIAL ENGINEERING
AND MORE…
4. HACKER 💻
A hacker is any person engaged in hacking.
A hacker is someone who seeks and exploits
weakness in a computer system or computer network.
5. TYPES OF HACKERS
fun hacker, cybersecurity expert
who hack into network & systems,
but without malicious intent.
GREY HAT
Criminal hackers, who breaks
into computer systems malicious
or criminal intent.
BLACK HAT
Government Heired hacker, with
specific focus on finding and
disarming black hat hackers.
RED HAT
Authorized hackers, cybersecurity
experts who use their skills to find
vulnerabilities in networks,system.
WHITE HAT
AND MORE…
6. ETHICAL HACKING
Ethical Hacking is testing the
resources for a good cause and for
the betterment of technology.
Technically Ethical Hacking means
penetration testing which is focused
on securing and protecting IT
systems.
Perform all the same activities done
by black hat hacker but with the
owner’s permission.
7. CRACKING
Hacking with Malicious intention
is CRACKING
Cracking is Crime.
Cyber crime are the result of
cracking, not hacking
8. PREVENT HACKING
IMPLEMENT FIREWALL
BE AWARE OF PHISHING
KEEP OS UP TO DATE
INSTALL ANTI-VIRUS VULNERABILITY TEST
DON’T RUN UNNESSERY
NETWORK SERVICES
DON’T ACCESS PRESONAL
DATA IN PUBLIC WIFI
TURN OFF ANYTHING
YOU DON’T NEED
9. LEARN
Best Operating System:
Kali Linux, Parrot OS, Backbox,
Fedora etc.
Learn Hacking, not to hack others, To
secure yourselffrom Hackers…!
Tools:
Nmap, Metaspoit, Ngrok, Social
Engineering Tool-kit(SET) etc.