hacking nagaraju

45
HACKING NAGARAJU K 158W1A05F8

Upload: nagaraju-kunchala

Post on 16-Apr-2017

88 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Hacking nagaraju

HACKING

NAGARAJU K158W1A05F8

Page 2: Hacking nagaraju

CONTENTS• History of Hacking• What is Hacking?• Who is Hacker?• Famous hackers in history• Why do Hackers hack?• Types of Hacking• How to give a password to account• What should do after hacked• How to secure our data• Advantages of Hacking• Disadvantages of Hacking• Kali linux• conclusion• References

Page 3: Hacking nagaraju

HISTORY OF HACKINGHacking has been a part of computing for 40 years.The first computer hacker emerged at MIT. Hacking is began in the 1960s at MIT , origin of the

term “hacker”.The truth hacker amongst our societies have thirst

for the knowledge .

Page 4: Hacking nagaraju

WHAT IS HACKING ?The Process of attempting to gain or successfully gaining, unauthorized access to computer resources

is called Hacking.

Page 5: Hacking nagaraju
Page 6: Hacking nagaraju

WHO IS A HACKER?• In the computer security context, a hacker is

someone who seeks and exploits weaknesses in a computer system or computer network.• The term hacker is reclaimed by computer

programmers who argue that someone breaking into computers is better called a cracker.

Page 7: Hacking nagaraju

FAMOUS HACKERS IN HISTORY

Ian Murphy Kevin Mitnick Albert Gonzalez

Gary McKinnon

Jonathan James

Robert Morris

Page 8: Hacking nagaraju

WHY DO HACKERS HACK ?Just for fun.Show off.Hack other systems secretly.Notify many people their thought.Steal important information.Destroy enemy’s computer network during the war.

Page 9: Hacking nagaraju

TYPES OF HACKING• Website Hacking• Network Hacking• Ethical Hacking • Email Hacking • Password Hacking• Online Banking Hacking• Computer Hacking

Page 10: Hacking nagaraju
Page 11: Hacking nagaraju

WEBSITE HACKING •Hacking a website means taking control from the website owner to a person who hacks the website.

Page 12: Hacking nagaraju
Page 13: Hacking nagaraju

NETWORK HACKING• Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.

Page 14: Hacking nagaraju
Page 15: Hacking nagaraju

ETHICAL HACKING • Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.

Page 16: Hacking nagaraju
Page 17: Hacking nagaraju

EMAIL HACKING Email hacking is illicit access to an email account or email correspondence.

Page 18: Hacking nagaraju
Page 19: Hacking nagaraju

PASSWORD HACKING

Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.

Page 20: Hacking nagaraju
Page 21: Hacking nagaraju

ONLINE BANKING HACKING

Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.

Page 22: Hacking nagaraju
Page 23: Hacking nagaraju

COMPUTER HACKING Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.

Page 24: Hacking nagaraju

WHAT SHOULD DO AFTER HACKED? Shutdown the system

− Or turn off the system

Separate the system from network

Restore the system with the backup− Or reinstall all programs

Connect the system to the network

It can be good to call the police

Page 25: Hacking nagaraju

HOW TO GIVE A PASSWORD TO ACCOUNT

• Use unique passwords for your accounts. • Choose a combination of letters, numbers, or

symbols to create a unique password.

Page 26: Hacking nagaraju

HOW TO SECURE OUR DATA

1 -> i or l3 -> e4 -> a+ -> t9 -> g0 -> o$ -> s| -> i or l

|\| -> n|\/| -> ms -> zc -> [f -> phph -> fx -> ckck -> x

Page 27: Hacking nagaraju

HOW TO SECURE OUR DATA

• Ex.

• 1 +r4|\|$ph3rr3d R$ iooooo +0 y0ur 4[[0u|\|+ , $0 90 4h43d 4$ 0ur pi4|\|.

• I transferred Rs.100000 to your account, So go ahead as our plan.

Page 28: Hacking nagaraju

ADVANTAGES OF HACKING

• Can be used to recover lost information where the computer password has been lost.• Teaches you that no technology is 100% secure.• To test how good security is on your own network. • They call it white hat computer hacking.

Page 29: Hacking nagaraju

DISADVANTAGES OF HACKING

• Criminals can use it to their advantage.• It can harm someone's privacy• It's Illegal

Page 30: Hacking nagaraju

PROTECTING YOUR PERSONAL APPLICATIONS

Page 31: Hacking nagaraju

HOW TO CHECK WHETHER YOUR WHATSAPP IS HACKED OR NOR

Page 32: Hacking nagaraju

HOW TO HACK FACE BOOK???

Page 33: Hacking nagaraju

HACKER WILL RIGHT CLICK ON PASSWORD AND SELECT INSPECT ELEMENT

Page 34: Hacking nagaraju

DEAR TEACHERS, BE CAREFUL AND PROTECT YOUR EMAILS BECAUSE YOU NEVER KNOW WHAT YOUR STUDENTS ARE CAPABLE OF!

Page 35: Hacking nagaraju

HUGHES, KENNESAW STATE UNIVERSITY STUDENT

Page 36: Hacking nagaraju

1 HUGHES ALSO RECORDED THE USERNAMES AND PASSWORDS OF, AT LEAST, 36 FACULTY MEMBERS IN A NOTEBOOK OFFICERS FOUND IN HIS HOME. 2 HUGHES ALSO HACKED THE SYSTEM AND CHANGED GRADES IN TWO SEPARATE CLASSES. HE REPORTEDLY CHANGED FELLOW STUDENTS’ GRADES FROM AN  "F” TO “A” AND ANOTHER FROM A “C” TO “A”.  FOR HIMSELF, POLICE SAY HE UPGRADED HIS “B” TO AN “A.”

Page 37: Hacking nagaraju

LETS SEE WHAT THIS BOY DONE

Page 38: Hacking nagaraju

1 LAST YEAR, THIS 14-YEAR-OLD STUDENT STUDYING AT FLORIDA’S PAUL R. SMITH MIDDLE SCHOOL MANAGED TO BYPASS THE SCHOOL’S COMPUTER SECURITY NETWORK USING JUST HIS COMPUTER SKILLS AND GAINED ACCESS TO THE SERVER THAT CONTAINED FCAT (FLORIDA COMPREHENSIVE ASSESSMENT TEST) DATA.

2 MOREOVER, THE YOUNG HACKER UTILIZED HIS UNAUTHORIZED PRIVILEGES FOR DISRUPTING CLASSROOM ACTIVITIES SIMPLY BY CONTROLLING THE TEACHER’S COMPUTERS AND DISPLAYING AN IMAGE OF TWO MALES KISSING

Page 39: Hacking nagaraju

WHY HACKERS PREFER KALI LINUX TO HACK

Page 40: Hacking nagaraju

1.AS KALI LINUX IS AN OPEN SOURCE AN OPEN SOURCE OPERATING SYSTEM PROVIDES YOU THE SOURCE CODE WHICH YOU CAN MANIPULATE FOR HACKING. WHILE OTHER OPERATING SYSTEMS ARE NOT OPEN SOURCE SO YOU CANNOT CHANGE ANYTHING AND MAKE USE OF IT FOR HACKING.

2.LINUX IS MORE SECURE THAN OTHER OS

THE MAJORITY OF THE HACKERS USE LINUX OVER ANY OTHER OPERATING SYSTEM BECAUSE YOU CAN PRACTICE HACKING AND PENETRATING TESTS WITHOUT ANY TROUBLE OF GETTING CAUGHT.

Page 41: Hacking nagaraju

3.LINUX IS UNIVERSAL SINCE MOST OF THE THINGS ARE RUNNING BASED ON “UNIX” THESE DAYS LIKE FROM ROUTERS TO OPERATING SYSTEMS AND WEB SERVERS, LINUX IS EVERYWHERE

4. LINUX IS LIGHTER AND MORE PORTABLELINUX IS LIGHTER AND MORE PORTABLE COMPARED TO OTHER OPERATING SYSTEMS. YOU CAN BOOT A LINUX OPERATING SYSTEM IN LESS THAN THE HALF TIME CONSUMED BY WINDOWS WHILE INSTALLING IT

Page 42: Hacking nagaraju

ADVANTAGES AND DISADVANTAGES

ADVANTAGES Kali linux may used to1) Vulnarable to computer malware2) Low cost (no trailo versions)3) Fast and easy installation4) Even HARDDISK is full it works well5) Abundance of tools

DISADVANTAGES1) Hack wifi wps pin2) Every time you need to wait until the

usb is loaded 3) Hack even android device and pc4) Most used for google hacks5) Website hack6) Encrypt data bases

Page 43: Hacking nagaraju

CONCLUSIONKeep your password protected. Write your password should be

with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol .

Page 44: Hacking nagaraju

REFERENCESwww.wikipedia.org/wiki/Hackerwww.wikipedia.org/wiki/Hackinghttp://www.kalitutorials.net/2013/08/kali-linux.htmlhttp://www.gadgetsay.comhttp://www.fox5atlanta.com/news/206545219-story

Page 45: Hacking nagaraju

THANK YOU