Download presentation
Presentation is loading. Please wait.
Published byDylan Morton Modified over 5 years ago
1
By Kevin Eldridge, Brady Doherty, and Jacob Ratajczak
Hackers and Hacks By Kevin Eldridge, Brady Doherty, and Jacob Ratajczak
2
Definition: Hacking Unauthorized intrusion into a computer or a network. The individual engaged in the hacking activities is known as the “hacker.”
3
Common Techniques Amongst Hackers
Vulnerability Scanner - Trojan Horse Password Cracking - Viruses Packet Sniffer - Keyloggers Spoofing Attack - DoS & DDoS Root Kit ** However, not all hackers and hacking techniques involve malevolent intentions.
4
White-Hat Hackers Ethical Hackers Good guys
Remove a virus and conduct penetration testing Permission to engage a target and comprise the system Use ethical hacking tools techniques and methodologies Disclose every vulnerability in order to secure the organization’s network or system and Fix the issue before it is exploited by a malicious hacker
5
Black-Hat Hackers Bad guys – no permission & evil intentions
Try to find weaknesses within other companies or banks with weak security Practice of what they learned early on
6
Grey-Hat Hackers Will not steal money or information
Make up most of the hacking world Will disclose loophole or vulnerabilities to law enforcement or the intelligence agencies Notify the administrator or owner of the system about the vulnerability Offer to nominal fee in order to fix the vulnerability Breaking laws depending on where they are & where their targets are
7
Red-Hat Hackers Vigilantes
Mostly are like White Hat Hacker as they halt Black Hat Hackers Shut that person down with uploading a virus, doing a DoS attack or try to access their computer destroying it Levels of hacking in government agencies, top-secret informations hubs Their aggressive methods can force the cracker into having to get a new computer
8
Script Kiddies •Do not care about hacking
•Use code and can use it as a virus or for other purposes Never hacks for themselves and just download the software Will watch YouTube videos in order to learn about the tool
9
Prominent Hacking Groups
Homebrew Computer Club Legion of Doom Chaos Computer Club Lizard Squad Anonymous
10
Homebrew Computer Club
Informal hacking group No longer in existence Produced numerous computer engineers and distinguished hackers
11
Legion of Doom One of the most influential groups within technology history Hacker Manifesto Contributed significantly to the pantheon of world hacking knowledge
12
Chaos Computer Club Europe’s largest hacking group.
Strong advocates for government transparency and computer/information access.
13
Lizard Squad Black hat hacking group, primarily known for DDoS attacks. Disbanded on September , only to return later on and claim responsibility for various attacks.
14
Anonymous One of the most iconic and popular hacking groups today.
Primary guiding value is ‘anti- oppression’.
15
Infamous Hackers: Kevin Mitnick
16
Infamous Hackers: Jonathan James
17
Infamous Hackers: Paras Jha
18
Phases of a Hack RECONNAISSANCE SCANNING GAINING ACCESS
MAINTAINING ACCESS CLEARING TRACKS
19
Target Data Breach Hacking Technique Used: PHISHING
110 million users and 41 million retail card accounts Phishing attack against HVAC vendor Fazio Mechanical Service (FMS)
20
GitHub DDoS Attack Hacking Technique Used: DDoS
1.3Tbps nailed GitHub for minutes Hacker compromises 100,000 unauthenticated servers that are exposed online
21
References https://www.techopedia.com/definition/26361/hacking
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.