Professional Documents
Culture Documents
TABLE OF CONTENTS
Introduction to Hacking
History of computer hacking
Difference between Ethical and Unethical Hacking
Ethical Hacking is not complicated
Victims are careless thats why they get hacked
Common Mistakes, dos and donts
Mobile, Desktop, Wifi, Email, Social Media, Download
Limits of Hacking (Medical Devices, CAR)
Future (Earths Environment, Human Brain)
Career in ethical hacking
Our course
INTRODUCTION TO HACKING
Hacking is the act of exploring and manipulating the works of another computer or
other technological device or system, either for the purpose of understanding how it
works or to gain unauthorized access.
Hacker is someone who seeks and exploits weaknesses in a computer system or
computer network.
Computer hacking was born in the late 1950s, when members of MITs Tech
Model Railroad Club, obsessed with electric switching, began preparing punch
cards to control an IBM 704 mainframe.
The virus was called Brain written by 2 brothers Basit Farooq Alvi and Amjad
Farooq Alvi who were from Pakistan. The infected computers had the following
message on their screen:
Welcome to the Dungeon 1986 Brain & Amjads (pvt). BRAIN COMPUTER
SERVICES 730 NIZAM BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE:
430791,443248,280530. Beware of this VIRUS.... Contact us for vaccination...
Hacker vs CRACKER
Features of a Hacker (White Hat Hacker)
Abundance of knowledge and experience
Good Guy
Strong Ethics
Never indulges in Crime
Catches Computer Criminals
Features of a Cracker (Black Hat Hacker)
Abundance of knowledge and experience
Bad Guy
Low Ethics
Indulges in Crime mostly.
Is a Computer Criminal himself
>> Common Password :- Normally all user use very common password.
Like own name , mobile no , 123,12345 , abc@123 etc.
>> Simple Password :- It is advisable that user must use Strong Password , which
contains Alpha+Numeric+Symbol (Alpha should be in Upper
and Lower case)
Ex- training@ATL01
>> Phishing Attack :-
Mostly all computer user use the pirated (not genuine) operating
system and Anti-virus software. Thats why their computer system
are vulnerable to Computer threats.
Update :-
Download :-
SOCIAL MEDIA
SOCIAL - MEDIA
Social Media :>> Now every user have their account on each social media site, it is increasing
threats rate also, more and more script kiddies and sophisticated hackers
targeted the social networking website like Facebook etc.
>> Hackers steal the Identity of user and use them for their fun and other malign
purposes.
>> Phishing , Tab nabbing , Smishing and Vishing are some common types of
attack indulge in todays scenario.
>> Identity Theft is the big issue when any one using social media.
E-mail Hacking
>> It is include Fake email (forge email) and Malware infection through email
attachment.
>> Fake E-mail :- fake email is also computer threat to user. In this attacker spoof
the identity or using fake mailer to send the fake emails to the
victim.
>> Malware Infection :- Attackers infect the computer system with email attachments
via binding malware as a attachment like Trojans and Bots
bind with file.
yahoo.com
Internet
Signing
Nitin sends
in to the
an Email
account
to
sweetaashima16@gmail.com
coolnitin10@yahoo.com
gmail.com
sweetaashima16@gmail.com
Signing in to her account
sweetaashima16@gmail.com
gets the Email in her Inbox
Email
Process
Fake Mail
Tracing of Mails
Dear User,
You have got an Friend
Request from Cool Dude
Salman Khan.
Please click on the below link
to accept the friend request.
www.faebook.com\836482384.
aspx
Regards,
Facebook Administrator
User gets an
Email
Victim Gets
the
Account
Opened
www.0facebook.com\836482384.aspx
Facebook Login
Page
Home page
of Pooja
thepooja
User
Username:
Profile
Password:ihateluv
ihateluv
MOBILE HACKING
MOBILE HACKING
MOBILE SPYING :- Spy on a cell phone by locating it, tracking it, as well as having
access to SMS messages, contact lists, and call history.
cell phone spy software silently monitors your child or employee's Smartphone activity
on iPhone, Android, BlackBerry and other mobile phones.
SYSTEM HACKING
SYSTEM HACKING
Shell Layer Security : - We can crack Shell layer SYSKEy password with HIREN
BOOT tool.
Kernel Layer Security :- for this we can simply remove the BIOS/CMOS cell(battery)
PACEMAKER HACKED
CAR HACKING
CAR HACKING
CAR HACKING
FACEBOOK HACKING
FACEBOOK HACKING
>>Social media has become the most popular cult on internet.
>> When you think social media, FACEBOOK is the first word that comes to mind.
FACEBOOK HACKING
>> Users join Facebook thinking that it is a very safe place to live a parallel life
but this is not the case. Even Facebook has security loop holes which can be
exploited.
>> With this popularity Facebook has become a hotspot for Hackers , it is
actually more of a challenge than a job; in fact Facebook pays $500 to anyone
who hacks into it.
Who wants to hack Facebook accounts?
* Worried parents want to know what goes on in their childrens lives.
*Jilted lovers trying to find out answers.
* Obsessed stalkers.
*Law Enforcement Agencies monitor facebook activities to find anything suspicious.
*Business Competitors fish for information.
*Private investigation Agencies try to collect maximum information about the subject.
*Major Intelligence agencies around the world continuously monitor the data flow in
Facebook. Etc.
>>To become a Facebook hacker one has to go through a certain amount of training
and very high intelligence level. It is a very challenging job, the most common ways
through which facebook accounts get hacked include:
1) Weak passwords
2) Phishing and Desktop Phishing
3) Tabnabbing
4) Keyloggers
5) Malwares