100% found this document useful (1 vote)
568 views

Hacking

The document appears to be chat logs from a WhatsApp group discussing hacking and cybersecurity. It shows members joining and leaving the group over time. They discuss increasing government spending on cybersecurity in India and whether it is needed given rising threats. The members also discuss definitions of hacking, types of cybercrimes, and the world's most famous hacker Kevin Mitnick.

Uploaded by

Nandita
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
568 views

Hacking

The document appears to be chat logs from a WhatsApp group discussing hacking and cybersecurity. It shows members joining and leaving the group over time. They discuss increasing government spending on cybersecurity in India and whether it is needed given rising threats. The members also discuss definitions of hacking, types of cybercrimes, and the world's most famous hacker Kevin Mitnick.

Uploaded by

Nandita
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

31/03/22, 6:19 pm - Messages and calls are end-to-end encrypted.

No one outside of this chat, not even WhatsApp, can read or listen to them. Tap to learn
more.

31/03/22, 6:12 pm - +91 70459 86828 created group "Hacking"

31/03/22, 6:19 pm - You joined using this group's invite link

31/03/22, 6:22 pm - +91 91362 22492 joined using this group's invite link

31/03/22, 6:26 pm - +91 74003 53929 joined using this group's invite link

31/03/22, 7:02 pm - +91 73031 33005 joined using this group's invite link

01/04/22, 12:28 am - +91 98335 75856 joined using this group's invite link

01/04/22, 11:25 am - +91 91674 91717 joined using this group's invite link

14/04/22, 12:45 pm - +91 70454 74803 joined using this group's invite link

14/04/22, 12:46 pm - +91 70454 74803 left

14/04/22, 1:41 pm - +91 70459 86828 removed +91 98335 75856

14/04/22, 1:41 pm - +91 70459 86828 added +91 99679 62363

14/04/22, 1:47 pm - +91 70459 86828 added +91 79779 46765

14/04/22, 3:25 pm - +91 99679 62363 left

15/04/22, 5:41 pm - +91 99679 62363 joined using this group's invite link

16/04/22, 8:15 pm - +91 91674 91717: *Just a reminder*

Tomorrow we'll be having group discussion of ICT-1:HACKING with smriti ma'am at sharp 5 in the evening.

16/04/22, 8:29 pm - +91 98190 37144: Thanku so much yar

16/04/22, 8:29 pm - +91 98190 37144: Mai tho bhul gaie the

16/04/22, 8:33 pm - +91 91362 22492:

16/04/22, 9:23 pm - +91 91674 91717: Anytime pallavi ji

17/04/22, 12:14 pm - +91 70459 86828 added +91 74981 13531

17/04/22, 12:15 pm - +91 70459 86828 changed the subject from "Hacking" to "Hacking- Online discussio"

17/04/22, 12:15 pm - +91 70459 86828 changed this group's icon

17/04/22, 12:16 pm - +91 70459 86828 changed the subject from "Hacking- Online discussio" to "Hacking-Online discussion"

17/04/22, 5:00 pm - +91 70459 86828: Good Evening Ma'am

17/04/22, 5:00 pm - +91 77000 28680: Good evening ma'am

17/04/22, 5:00 pm - +91 83902 00520: Good evening ma'am

17/04/22, 5:00 pm - +91 82080 72073: Good Evening Ma'am

17/04/22, 5:00 pm - +91 91674 91717: Good evening ma'am

17/04/22, 5:00 pm - +91 99679 62363: Good evening ma'am

17/04/22, 5:00 pm - +91 79779 46765: Good evening ma'am

17/04/22, 5:00 pm - Sunita Patra: Good evening ma'am

17/04/22, 5:00 pm - +91 73031 33005: Good evening ma'am

17/04/22, 5:00 pm - +91 98190 37144: Good evening ma'am

17/04/22, 5:01 pm - +91 91362 22492: Good evening maam

17/04/22, 5:02 pm - +91 74981 13531: Good Evening to all

17/04/22, 5:03 pm - +91 74981 13531: Do you know, According to a Business Standard report, in 2021-22, the government outspend its budgeted estimates on
cyber security for the first time in past eight years. In its recent Budget, the government said it would spend 515 crore rupees on cyber security in 2022-23.
That’s a 10 times increase, compared to 2014-15.

Do you think this is the need of the hour? Why?

17/04/22, 5:03 pm - +91 99679 62363: <Media omitted>


Yes ma'am today's news

17/04/22, 5:04 pm - +91 91362 22492: Yes maam coz With data gradually transcending into the open domain with numerous firms permitting employees to
work from their homes amid the pandemic, sensitive information has become susceptible to security vulnerabilities. The rise of digital payments has also
increased complex cyber crimes

17/04/22, 5:05 pm - +91 70459 86828: https://wap.business-standard.com/podcast/technology/is-india-prepared-to-protect-itself-from-cyber-attacks-


122031000062_1.html#:~:text=According%20to%20a%20Business%20Standard,%2C%20compared%20to%202014%2D15.

17/04/22, 5:05 pm - +91 77000 28680: Actual government spending on cybersecurity has always remained below budgeted estimates. For example, the
government had spent 88.2 per cent of its budgeted amount on cybersecurity in 2016-17. In 2020-21, it was only able to spend 53 per cent of the budgeted
amount.

17/04/22, 5:05 pm - Sunita Patra: Yes, because it is threat to the digital payments that are made by the people

17/04/22, 5:05 pm - +91 83902 00520: The country is also a witness to numerous cyber attacks in the past, including many soft ones. The government’s ongoing
Digital India push and the Reserve Bank’s planned Central Bank Digital Currency may only add to the list of vulnerabilities

17/04/22, 5:05 pm - +91 91674 91717: Presently, the nature of the war in Ukraine indicates that India needs to review its cyber-defence policies. The country
also needs to give equal attention to building a deterrent cyber-offensive capability. The government is taking far too long in finalising a National Cyber Security
Strategy.

17/04/22, 5:05 pm - +91 98190 37144: Yes because today increase in use of digital world for most of business, education, banking sector increased the risk of
cyber attack.

Also due to increase in use of social media platform had increased the risk of social security as well hence it is need of hour

17/04/22, 5:05 pm - +91 70459 86828: It also represents a reduction from the 552.3 crore rupees spent on cybersecurity, as per the revised estimates of 2021-
22. The government had budgeted 416 crore rupees for cybersecurity for that period.

17/04/22, 5:05 pm - +91 99679 62363: We needed to be more secure on this issue and You might think that the only form of cybercrime you have to worry
about is hackers stealing your financial information. But it may not be so simple. There are far more concerns than just basic financial ones. Cybercrime
continues to evolve, with new threats surfacing every year.

When you hear and read about the range of cybercrimes out there, you might be tempted to stop using the internet entirely. That’s probably too drastic.

Instead, it’s a good idea to know how to recognize cybercrime, which can be the first step to helping protect yourself and your data. Taking some basic
precautions and knowing who to contact when you see others engaged in criminal activities online are also important steps.

17/04/22, 5:06 pm - +91 74981 13531: We’re all familiar with how hackers are displayed in movies. Brooding criminals in hoodies, frantically hammering lines of
code into a computer in order to break through complex security systems.

We know that, in real life, too, hackers are a major threat to our safety.

But what exactly is hacking?

17/04/22, 5:07 pm - +91 74003 53929: Hacking refers to the misuse of devices like computers, smartphones, tablets, and networks to cause damage to or
corrupt systems, gather information on users, steal data and documents, or disrupt data-related activity.

17/04/22, 5:07 pm - +91 74003 53929: A commonly used hacking definition is the act of compromising digital devices and networks through unauthorized access
to an account or computer system.

17/04/22, 5:07 pm - +91 79779 46765: the act of compromising digital devices and networks through unauthorized access to an account or computer system

17/04/22, 5:07 pm - Sunita Patra: A commonly used hacking definition is the act of compromising digital devices and networks through unauthorized access to
an account or computer system. Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals.

17/04/22, 5:07 pm - +91 70459 86828: <Media omitted>

17/04/22, 5:07 pm - +91 99679 62363: A commonly used hacking definition is the act of compromising digital devices and networks through unauthorized access
to an account or computer system. Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber
criminals

: Phishing – In this type of hacking, hackers intention to stole critical information of users like account passwords, MasterCard detail, etc. ...

Virus – ...

UI redress – ...

Cookie theft – ...

Distributed Denial-of-service(DDoS) – ...

DNS spoofing – ...

Social Engineering – ...

Missing Security Patches –


17/04/22, 5:07 pm - +91 83902 00520: A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome
an obstacle, within a computerized system by non-standard means.

17/04/22, 5:07 pm - +91 91362 22492: Cybercrime has been prevalent since the inception of computer technology that dates back to the 90s. During those days,
hackers would engage in illegal hacking with the purpose of boosting their knowledge and opening new avenues for further development. According to a report
prepared by the FBI and Association of Computing Machinery, the cyber crimes witnessed in the last few years were not only empowered by technology but also
with skills teens learn from schools. There are several major causes of cybercrimes that make them a concerning issue of the digital world.

17/04/22, 5:07 pm - +91 70459 86828: Hacking is a broad term that refers to someone gaining access to digital files or systems without permission, usually with
a nefarious intent in mind like stealing information or installing malware.

17/04/22, 5:07 pm - +91 91674 91717: A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer
system or network.

17/04/22, 5:07 pm - +91 82080 72073: <Media omitted>

17/04/22, 5:07 pm - +91 77000 28680: A commonly used hacking definition is the act of compromising digital devices and networks through unauthorized access
to an account or computer system. Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber
criminals.

17/04/22, 5:08 pm - +91 83902 00520: https://timesofindia.indiatimes.com/city/bhubaneswar/state-witnesses-2037-cyber-fraud-cases-in-


21/articleshow/89735835.cms

17/04/22, 5:08 pm - +91 74981 13531: Who is the No 1 hacker in world?what type of hacker is he?

17/04/22, 5:08 pm - +91 99679 62363: https://youtu.be/UcwtDq4SHzU

Even 1000 of youtubers gets hacked each say

17/04/22, 5:08 pm - +91 99679 62363: *Day

17/04/22, 5:08 pm - +91 74003 53929: No. 1 hacker

Kevin Mitnick

17/04/22, 5:08 pm - Sunita Patra: Kevin Mitnick, the world's most famous hacker, will use live demonstrations to illustrate how cyber criminals take advantage
of your employee's trust through the art of social engineering.

17/04/22, 5:08 pm - +91 73031 33005: In the world of hacking we say that nothing is fully secure

17/04/22, 5:09 pm - +91 91362 22492: Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author, and convicted hacker. He
is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes.

17/04/22, 5:09 pm - +91 98190 37144: Hacking is term mainly used to elaborate the activity where one person tries to control the another computer control
devices remotely without even the knowledge of other person. Also if another knows but can not control the details been taken by them

17/04/22, 5:09 pm - +91 77000 28680: Kevin Mitnick, the world's most famous hacker,

17/04/22, 5:09 pm - +91 91674 91717: Kevin Mitnick, the world's most famous hacker

17/04/22, 5:09 pm - +91 99679 62363: https://youtu.be/RNwMeijExjg

17/04/22, 5:09 pm - +91 83902 00520: This is a recent case of feb where 2037 cuber fraud cases were found in odisha

17/04/22, 5:09 pm - +91 70459 86828: Kevin Mitnick, the world's most famous hacker.

17/04/22, 5:09 pm - +91 99679 62363: https://youtu.be/3fT6pUQrY6M

17/04/22, 5:09 pm - +91 74003 53929: Kevin Mitnick, the world's most famous hacker, will use live demonstrations to illustrate how cyber criminals take
advantage of your employee's trust through the art of social engineering

17/04/22, 5:10 pm - +91 99679 62363: Saket modi is an no1 Indian hacking expert

17/04/22, 5:10 pm - +91 79779 46765: https://youtu.be/p_4ZPL31TDA

17/04/22, 5:10 pm - +91 74981 13531: He is a White hat hacker. What are various types of hacker?

17/04/22, 5:10 pm - +91 70459 86828: 1)Black Hat Hacker

2)White Hat Hacker

3)Grey Hat Hacker

17/04/22, 5:10 pm - +91 73031 33005: A hacker tries multiple ways to enter a system and finds possible entry point which would let him enter the system

17/04/22, 5:10 pm - +91 79779 46765: White Hat Hackers

Black Hat Hackers

Gray Hat Hackers


Script Kiddies

Green Hat Hackers

Blue Hat Hackers

Red Hat Hackers

State/Nation Sponsored Hackers

Hacktivist

Malicious insider or Whistleblower

17/04/22, 5:10 pm - +91 74003 53929: Hackers can be classified into three different categories:

Black Hat Hacker.

White Hat Hacker.

Grey Hat Hacker.

17/04/22, 5:11 pm - +91 77000 28680: Black Hat: Criminal Hackers. ...

White Hat: Authorized Hackers. ...

Grey Hat: “Just for Fun” Hackers. ...

Script Kiddies: Ametuer Hackers. ...

Green Hat: Hackers-in-Training. ...

Blue Hat: Authorized Software Hackers. ...

Red Hat: Government-Hired Hackers.

17/04/22, 5:11 pm - +91 74981 13531: Elaborate the meaning of each type

17/04/22, 5:11 pm - +91 99679 62363: https://www.facebook.com/groups/647318839816669/permalink/675220853693134/?app=fbl

17/04/22, 5:11 pm - +91 79779 46765: <Media omitted>

17/04/22, 5:11 pm - +91 91674 91717: Black Hat: Criminal Hackers.

White Hat: Authorized Hackers.

Blue Hat: Authorized Software Hackers.

Red Hat: Government-Hired Hackers.

17/04/22, 5:11 pm - +91 83902 00520: White Hat Hackers, Black Hat Hackers

Gray Hat Hackers

Script Kiddies

, Green Hat Hacker, Blue Hat Hackers and many more

17/04/22, 5:12 pm - Sunita Patra: White Hat Hackers.

Black Hat Hackers.

Gray Hat Hackers.

Script Kiddies.

Green Hat Hackers.

Blue Hat Hackers.

Red Hat Hackers.

17/04/22, 5:12 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:12 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:12 pm - +91 74003 53929: A white hat (or a white hat hacker) is an ethical security hacker. Ethical hacking is a term meant to imply a broader
category than just penetration testing. Under the owner's consent, white hat hackers aim to identify any vulnerabilities the current system has.

17/04/22, 5:12 pm - +91 73031 33005: Hacking Is the art of technique of finding and exploiting security loopholes in a system

17/04/22, 5:12 pm - +91 82080 72073: <Media omitted>


17/04/22, 5:12 pm - +91 70459 86828: https://www.pandasecurity.com/en/mediacenter/security/14-types-of-hackers-to-watch-out-for/

17/04/22, 5:12 pm - +91 91362 22492: Types of Hackers.

White Hat Hackers

Black Hat Hackers

Gray Hat Hackers

Script Kiddies

Green Hat Hackers

Blue Hat Hackers

Red Hat Hackers

State/Nation Sponsored Hackers

Hacktivist

Malicious insider or Whistleblower

17/04/22, 5:12 pm - Sunita Patra: IMG-20220417-WA0016.jpg (file attached)

17/04/22, 5:12 pm - +91 77000 28680: This message was deleted

17/04/22, 5:12 pm - +91 74003 53929: Black hat hackers are malicious hackers, sometimes called crackers. Black hats lack ethics, sometimes violate laws, and
break into computer systems with malicious intent, and they may violate the confidentiality, integrity, or availability of an organization's systems and data

17/04/22, 5:12 pm - +91 79779 46765: <Media omitted>

17/04/22, 5:12 pm - +91 98190 37144: <Media omitted>

17/04/22, 5:12 pm - +91 73031 33005: Hacking Is similar to stealing

17/04/22, 5:12 pm - +91 70459 86828: A white hat hacker -- or ethical hacker -- is an individual who uses hacking skills to identify security vulnerabilities in
hardware, software or networks. However, unlike black hat hackers -- or malicious hackers -- white hat hackers respect the rule of law as it applies to hacking.

17/04/22, 5:13 pm - Sunita Patra: IMG-20220417-WA0017.jpg (file attached)

17/04/22, 5:13 pm - +91 70459 86828: A black hat hacker is a hacker who violates computer security for their own personal profit or out of malice.

17/04/22, 5:13 pm - +91 74003 53929: A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or
typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker

17/04/22, 5:13 pm - +91 82080 72073: This message was deleted

17/04/22, 5:13 pm - +91 70459 86828: A grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical
standards, but usually does not have the malicious intent typical of a black hat hacker. The term came into use in the late 1990s, derived from the concepts of
"white hat" and "black hat" hackers.

17/04/22, 5:13 pm - Sunita Patra: A grey hat hacker is a cybersecurity expert who finds ways to hack into computer networks and systems, but without the
malicious intent of a black hat hacker.

Typically, they engage in hacking activities for the pure enjoyment of finding gaps in computer systems, and they might even let the owner know if any weak
points are found. However, they don’t always take the most ethical route when employing their hacking activities—they may penetrate systems or networks
without the owner’s permission (even though they aren’t trying to cause any harm).

Motives: Personal enjoyment

17/04/22, 5:13 pm - +91 99679 62363: Types of Hackers

Hackers can be classified into three different categories:

Black Hat Hacker

White Hat Hacker

Grey Hat Hacker

Types of Hackers

Black Hat Hacker

Black-hat Hackers are also known as an Unethical Hacker or a Security Cracker. These people hack the system illegally to steal money or to achieve their own
illegal goals. They find banks or other companies with weak security and steal money or credit card information. They can also modify or destroy the data as
well. Black hat hacking is illegal.

Types of Hackers
White Hat Hacker

White hat Hackers are also known as Ethical Hackers or a Penetration Tester. White hat hackers are the good guys of the hacker world.

These people use the same technique used by the black hat hackers. They also hack the system, but they can only hack the system that they have permission to
hack in order to test the security of the system. They focus on security and protecting IT system. White hat hacking is legal.

Types of Hackers

Gray Hat Hacker

Gray hat Hackers are Hybrid between Black hat Hackers and White hat hackers. They can hack any system even if they don't have permission to test the security
of the system but they will never steal money or damage the system.

In most cases, they tell the administrator of that system. But they are also illegal because they test the security of the system that they do not have permission
to test. Grey hat hacking is sometimes acted legally and sometimes not.

17/04/22, 5:13 pm - +91 79779 46765: Three Types of Hackers. The three types of hackers are the white hat hacker, the grey hat hacker, and the black hat
hacker. ...

Black Hat Hacker - Evil Doer. The black hat hacker is the one who hacks for malicious intent - he is the bad guy. ...

White Hat Hacker - Savior. The white hat hacker is one who is an ethical hacker

17/04/22, 5:13 pm - +91 91674 91717: Red hat hackers are often dubbed the Robin Hoods of the virtual world. Like the heroic outlaw, they are not opposed to
stealing back what the cybercriminals or cyber attackers stole from their victims.

17/04/22, 5:13 pm - +91 91362 22492: <Media omitted>

17/04/22, 5:13 pm - Sunita Patra: Script Kiddies: Ametuer Hackers

Script kiddies are amateur hackers that don’t possess the same level of skill or expertise as more advanced hackers in the field. To make up for this, they turn to
existing malware created by other hackers to carry out their attacks.

Motives: To cause disruption

Who’s most at risk? Organizations with unsecured networks and systems

17/04/22, 5:13 pm - +91 73031 33005: Hacking Is decided by two parts

1 . ethical hacking

2.un ethical hacking

17/04/22, 5:14 pm - +91 83902 00520: Black Hat Hacker

Black hat hackers are the evil guys who want to use their technical skills to defraud and blackmail others. White Hat Hacker

When it comes to understanding the different types of hackers, there can’t be a bigger difference than the gulf that exists between white and black hat hackers.
White hat hackers (also known as ethical hackers) are the polar opposite of their black hat counterparts. They use their technical skills to protect the world from
bad hackers. Grey Hat Hacker

Next on our list of the different types of hackers is grey hats. These hackers fall somewhere between white hat and black hat hackers. Grey hat hackers’
intentions are often good, but they don’t always take the ethical route with their hacking technics. Red Hat Hacker

Much like white hat hackers, red hat hackers also want to save the world from evil hackers. But they choose extreme and sometimes illegal routes to achieve
their goals.

Red hat hackers are like the pseudo-Robin Hood of the cybersecurity field — they take the wrong path to do the right thing. When they find a black hat hacker,
they deploy dangerous cyber attacks against themBlue Hat Hacker

Two different definitions are prevailing within the cybersecurity field, and they have little to nothing in common.Green Hat Hacker

These are the “newbies” in the world of hacking. Green hat hackers are not aware of the security mechanism and the inner workings of the web, but they are
keen learners and determined (and even desperate) to elevate their position in the hacker community. Although their intention is not necessarily to cause harm,
they may do so while “playing” with various malware and attack techniques.

17/04/22, 5:14 pm - +91 74981 13531: List some Common Hacking Techniques like cookie theft, virus, etc.

17/04/22, 5:14 pm - +91 98190 37144: <Media omitted>

17/04/22, 5:14 pm - Sunita Patra: Green Hat: Hackers-in-Training

A green hat hacker is someone who is new to the hacking world but is intently focused on increasing their cyberattack skills. They primarily focus on gaining
knowledge on how to perform cyberattacks on the same level as their black hat counterparts. Their main intent is to eventually evolve into a full-fledged hacker,
so they spend their time looking for learning opportunities from more experienced hackers.

17/04/22, 5:14 pm - +91 99679 62363: <Media omitted>


17/04/22, 5:14 pm - +91 79779 46765: Phishing is the most common hacking technique. All of our inboxes and text messaging apps are filled with phishing
messages daily. These are messages that are disguised as either as an organization (Amazon, Netflix, etc.) or a person that you trust and will, in most cases, tell a
story to trick you into clicking on a link or opening an attachment.

17/04/22, 5:14 pm - Sunita Patra: Types of Hacking :

Hacking ar some things from that you’ve to protect yourself {this will|this may|this will} solely be done by obtaining information however a hacker can get into
my knowledge.

Phishing –

In this type of hacking, hackers intention to stole critical information of users like account passwords, MasterCard detail, etc. For example, hackers can make a
replicating first website for users interaction and can steal critical information.

Virus –

These are discharged by the hacker into the filters of the net website once they enter into it . The purpose is to corrupt the information or resources on the net
website.

UI redress –

In this technique, the hacker creates a pretend interface and once the user clicks with the intent of progressing to a particular website, they are directed to a
special website along.

Cookie theft –

Hackers access the net website exploitation malicious codes and steal cookies that contain tips, login passwords, etc. Get access to your account then will do any
factor besides your account.

17/04/22, 5:14 pm - +91 70459 86828: https://www.geeksforgeeks.org/types-of-hacking/

17/04/22, 5:14 pm - +91 91674 91717: Phishing. Phishing is the most common hacking technique.Bait and Switch Attack.Key Logger.Denial of Service
(DoS\DDoS) Attacks.ClickJacking Attacks.Fake W.A.P.Cookie Theft. The cookies in your web browsers (Chrome, Safari, etc.)

17/04/22, 5:15 pm - +91 74003 53929: <Media omitted>

17/04/22, 5:15 pm - Sunita Patra: IMG-20220417-WA0010.jpg (file attached)

17/04/22, 5:15 pm - +91 83902 00520: 1. Bait and Switch

Using Bait and Switch the hackers buy advertisement space on any website and then create an eye-catching advertisement on the website’s page. Whenever
user comes to visit that website, most of the time user gets convinced to click on that advertisement due to its presentation to the user and the time user clicks
on that advertisement he gets redirected to malicious web-page. This way hacker can install malicious code to the victim’s system and can steal user
information.

2. Virus, Trojan and Other Spyware

The attacker uses a virus, Trojan and other malicious code and installs them on the victim’s computer to get unprivileged access. Virus and other Trojans keep
sending data to the hacker regularly and can also perform various tasks on victim’s system like sniffing your data and diverting traffic etc.

3. Cookie Theft

We use Browser to search for different websites and those website store cookies in your browser. This includes our search history, some account passwords,
and other useful information, When attacker gets on your browser’s cookie session then he can authenticate himself as you on a browser and then can conduct
attacks. It’s always a best practice to periodically clear search history and cache of your browser to ensure protection from such kind of attacks.

4. Denial of Service

This hacking technique involves flooding the network with a huge amount of data packets to bring the system down. In this manner, users are unable to use the
service due to the real-time crash of the system. Hacker uses too many requests to lower down the system so that the system cannot respond to the actual or
original request from genuine users.

Another attack called DDoS (Distributed Denial of Service) is also used to fulfill the same purpose by using zombies or computers to flood the intended system,
The amount of data packets or requests used to fulfill the requirements of attack increases if it fails every time. You should always use good anti-malware
software and other security measures to make sure they are safe from these attacks.

5. Keylogger

A keylogger is simply a software that is used to record key sequence and store the strokes of keys pressed on your keyboard to a file on your computer. These
log files can contain some useful and sensitive data of the user that may be account information and different passwords. Check your computer regularly for this
type of theft by using security tools and make sure to use virtual keyboard while doing transactions if you have any suspect during login.

17/04/22, 5:15 pm - +91 70459 86828: 8 Common Hacking Techniques That Every Business Owner Should Know About

Phishing. Phishing is the most common hacking technique. ...

Bait and Switch Attack.

Key Logger.
Denial of Service (DoS\DDoS) Attacks.

ClickJacking Attacks.

Fake W.A.P.

Cookie Theft. The cookies in your web browsers (Chrome, Safari, etc.) ...

Viruses and Trojans.

17/04/22, 5:15 pm - +91 73031 33005: When a hacker uses his knowledge to steal from or cause damage to other people it is known as unethical hacking

17/04/22, 5:15 pm - +91 98190 37144: <Media omitted>

17/04/22, 5:15 pm - +91 77000 28680: <Media omitted>

17/04/22, 5:16 pm - +91 79779 46765: <Media omitted>

17/04/22, 5:16 pm - +91 79779 46765: Example of phishing

17/04/22, 5:16 pm - +91 73031 33005: Unethical hacking is a crime and and thief will be arrested

17/04/22, 5:16 pm - +91 82080 72073: <Media omitted>

17/04/22, 5:17 pm - +91 98190 37144: Cookie theft occurs when a third party copies unencrypted session data and uses it to impersonate the real user. Cookie
theft most often occurs when a user accesses trusted sites over an unprotected or public Wi-Fi network. Although the username and password for a given site
will be encrypted, the session data traveling back and forth (the cookie) is not.

17/04/22, 5:17 pm - +91 74981 13531: What are the Signs That Your Email or Social Media Account Has Been Hacked?

17/04/22, 5:17 pm - +91 99679 62363: https://youtube.com/shorts/HTGzGEhfOL0?feature=share

17/04/22, 5:18 pm - +91 91674 91717: your social media account has posts you didn't make.you can't log into your email or social media account.your Sent
folder has messages you didn't send, or has been emptied.

17/04/22, 5:18 pm - +91 74003 53929: <Media omitted>

17/04/22, 5:18 pm - Sunita Patra: your social media account has posts you didn’t make

you can’t log into your email or social media account

your Sent folder has messages you didn’t send, or has been emptied

friends and family are getting emails or messages you didn’t send, sometimes with random links or fake pleas for help or money

17/04/22, 5:18 pm - +91 99679 62363: If your account have been hacked. U will get unnecessary cookies

17/04/22, 5:18 pm - +91 70459 86828: Signs That Your Email or Social Media Account Has Been Hacked

your social media account has posts you didn't make.

you can't log into your email or social media account.

your Sent folder has messages you didn't send, or has been emptied.

17/04/22, 5:18 pm - +91 83902 00520: Emails in your sent and inbox that you don’t recognize

The password has been changed, locking you out

Friends complaining of spam coming from your email address

Receiving multiple password change requests from other websites and apps

Your email provider notifies of multiple logins from unfamiliar IPs and locations

17/04/22, 5:18 pm - +91 91674 91717: One of the most obvious signs of your email being hacked is the fact that you can't sign into it. If your email password is
rejected as incorrect and you didn't change it, it's a strong indication that someone else has altered it.

17/04/22, 5:18 pm - +91 98190 37144: There are lots of ways to protect your personal information and data from scammers. But what happens if your email or
social media account gets hacked? Here are some quick steps to help you recover your email or social media account.

17/04/22, 5:19 pm - +91 99679 62363: And unSigns Your Computer Has Been Hacked

Appearance of applications you did not install. ...

Unusual disk activity. ...

Friends and contacts receive strange messages from you. ...

Passwords aren't working. ...

Unwanted browser toolbars, search redirection and popup ads. ...


Unwanted software installations. ...

Strange network traffic patterns

17/04/22, 5:19 pm - +91 98190 37144: <Media omitted>

17/04/22, 5:19 pm - +91 70459 86828: friends and family are getting emails or messages you didn’t send, sometimes with random links or fake pleas for help or
money

17/04/22, 5:19 pm - +91 79779 46765: Cookie theft occurs when hackers steal a victim's session ID and mimic that person's cookie over the same network.
There are several ways they can do this. The first is by tricking a user into clicking a malicious link with a pre-set session ID. The second is by stealing the current
session cookie.

17/04/22, 5:19 pm - +91 74003 53929: https://youtu.be/bZzJ11TgE8s

17/04/22, 5:19 pm - +91 77000 28680: Email: Your password has been changed

One of the most obvious signs of your email being hacked is the fact that you can't sign into it. If your email password is rejected as incorrect and you didn't
change it, it's a strong indication that someone else has altered it.

17/04/22, 5:19 pm - Sunita Patra: https://blog.lastpass.com/2019/05/5-signs-email-hacked/amp/

17/04/22, 5:19 pm - +91 91362 22492: <Media omitted>

17/04/22, 5:19 pm - +91 74003 53929: Check uf your Instagram account is hacked or not

17/04/22, 5:19 pm - +91 99679 62363: Quarantine Your PC

Simply unplug your computer from the network and avoid any kind of wireless or physical connection. The goal is to prevent the virus from spreading! Make
sure you're offline and turn all Wi-Fi connections off, both by software and hardware. Some laptops even have a switch for this.

17/04/22, 5:19 pm - +91 99679 62363: Measured to be taken

17/04/22, 5:19 pm - +91 74981 13531: What are the Steps To Get Back Into Your Account?

17/04/22, 5:19 pm - Sunita Patra: You get a ransomware message

You get a fake antivirus message

You have unwanted browser toolbars

Your internet searches are redirected

You see frequent, random popups

Your friends receive social media invitations from you that you didn’t send

Your online password isn’t working

You observe unexpected software installs

Your mouse moves between programs and makes selections

Antimalware, Task Manager or Registry Editor is disabled

Your online account is missing money

You’ve been notified by someone you’ve been hacked

Confidential data has been leaked

Your credentials are in a password dump

You observe strange network traffic patterns

17/04/22, 5:20 pm - +91 79779 46765: Never click-on any links in emails and tests unless you were expecting them

Always confirm the validity of the email with the sender before you click on a link or download a file

Always check the sender’s email address because this will help you identify a phishing email. In the Amazon example below, the email address is
[email protected]. This is not an official @amazon.com email address.

Report phishing emails to the Federal Trade Commission at [email protected]

17/04/22, 5:20 pm - +91 74003 53929: https://youtu.be/kqsESLZzyzw

17/04/22, 5:20 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:20 pm - +91 73031 33005: When the hacker helps organization or individuals with finding security loopholes and finding them with their permission
it is referred to as ethical hacking .and this is legal because you take permission from the system owner and your motive is not harm or seal .
17/04/22, 5:20 pm - +91 91362 22492: Go to facebook.com/login/identify and follow the instructions. Make sure to use a computer or mobile phone that you
have previously used to log into your Facebook account. Search for the account you want to recover. You can search for your account by name, email address, or
phone number.

17/04/22, 5:20 pm - +91 91674 91717: <iframe title="vimeo-player" src="https://player.vimeo.com/video/352069099?h=35ab10b754" width="640"


height="360" frameborder="0" allowfullscreen></iframe>

17/04/22, 5:20 pm - +91 70459 86828: <Media omitted>

17/04/22, 5:20 pm - +91 77000 28680: This message was deleted

17/04/22, 5:20 pm - +91 82080 72073: How to know your email has been hacked

You may get an urgent message from a friend or family member who received a suspicious email from you. They may ask if you sent the email. Or they may
simply send these panic-inducing words: “You’ve been hacked.”

But you may be able to spot signs of trouble before you get tipped off by a friend. Here are three indicators that your email account has likely been hacked.

You can’t log into your email account. When you try to log in, you may get a message that your username or password is incorrect. This could mean the hacker
changed your credentials to lock you out of your own account.

Your sent-messages folder looks odd. Your sent messages folder may hold scammy messages you didn’t write. Or, the folder may be sitting empty when you
never deleted your sent messages.

Strange messages appear on your social media accounts. If your latest Instagram post or tweet is touting some product you’ve never used, a hacker may have
gained access to both your email and social media accounts. You email account can act as a gateway into other accounts. The hacker can simply click “forgot
password” at login and have a password reset link sent right to your email inbox, which they now control.

17/04/22, 5:20 pm - Sunita Patra: https://youtu.be/yu-PKBtcwT8

17/04/22, 5:20 pm - +91 83902 00520: 1. Posts that you didn’t write appear suddenly on your wall! 2. Somebody logged into your account from an unusual
location 3. Spammy ads flood your Facebook page 4. You are unable to login to your account 5. You’re suddenly following a lot of new, unknown people

17/04/22, 5:21 pm - +91 74981 13531: Is there anyone in the group, who is the victim of hacking?

17/04/22, 5:21 pm - +91 91362 22492: <Media omitted>

17/04/22, 5:21 pm - +91 99679 62363: My brother is a Mumbai highcourt advocate

17/04/22, 5:21 pm - +91 99679 62363: You can call Cyber police station on 022-26504008 or email at [email protected].

And register complaint under IT act 2000

Under Section 43 , 66A, 67, and 69A of IT Act?

charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer
network, he shall be liable to pay damages by way of compensation to the person so affected.

But Indian police only takes complaint when your NC (negotiable complaint) is taken up by cyber cell in order to trace the hacker but if the hacker is unknown
then they take up case on basis if any deputy police commissionor has gone through your matter has approved it with his sign.

17/04/22, 5:21 pm - +91 79779 46765: 1. Update your security software, run a scan, and delete any malware.

. 2.Change your passwords

3. Set up multi-factor authentication.

17/04/22, 5:21 pm - +91 70459 86828: No Ma'am

17/04/22, 5:21 pm - +91 74003 53929: No ma'am

17/04/22, 5:21 pm - +91 73031 33005: According to the Indian cyber laws and the Indian it act , hacking is considered a cyber crime

17/04/22, 5:21 pm - +91 98190 37144: No ma'am

17/04/22, 5:21 pm - +91 77000 28680: https://youtu.be/kUMdN7ThCHg

17/04/22, 5:21 pm - +91 79779 46765: No ma'am

17/04/22, 5:21 pm - +91 82080 72073: No ma'am

17/04/22, 5:21 pm - Sunita Patra: If the hacker has locked you out, you may have to contact your email service provider for help. You will probably have to
provide an array of information to prove your identity and regain control of your email. If you do still have access to your account, make these changes right
away: Get a new username and password

17/04/22, 5:22 pm - +91 99679 62363: He has given me following suggestions

17/04/22, 5:22 pm - +91 91362 22492: Yes maam ... i facebook account was hacked

17/04/22, 5:22 pm - +91 73031 33005: No mam


17/04/22, 5:22 pm - Sunita Patra: No ma'am

17/04/22, 5:22 pm - +91 99679 62363: You can call Cyber police station on 022-26504008 or email at [email protected].

And register complaint under IT act 2000

Under Section 43 , 66A, 67, and 69A of IT Act?

charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer
network, he shall be liable to pay damages by way of compensation to the person so affected.

But Indian police only takes complaint when your NC (negotiable complaint) is taken up by cyber cell in order to trace the hacker but if the hacker is unknown
then they take up case on basis if any deputy police commissionor has gone through your matter has approved it with his sign.

17/04/22, 5:22 pm - +91 79779 46765: They tend to be younger and more inexperienced, and often operate as part of a small group or even alone. The main
incentive here is an ideology or an agenda they're willing to follow, with their targets often institutions or companies that are at odds with these strongly held
beliefs

17/04/22, 5:22 pm - +91 91674 91717: Not exactly but yeah...someone tried to hack my instagram account !

17/04/22, 5:22 pm - +91 79779 46765: Hackers especially hacks them

17/04/22, 5:22 pm - +91 77000 28680: No ma'am

17/04/22, 5:23 pm - +91 83902 00520: This message was deleted

17/04/22, 5:23 pm - +91 79779 46765: Small and medium business are the top target for cyberattacks.

17/04/22, 5:23 pm - +91 83902 00520: no ma'am

17/04/22, 5:23 pm - +91 74981 13531: How can we Protect our Accounts From Getting Hacked?

17/04/22, 5:23 pm - +91 99679 62363: No ma'am but i have to share a story of hackingIt was just two days back my elder brother who is an advocate of Mumbai
highcourt. He has been assigned duty by his senior judge to supervised matters, negotiable complaints (NC), NBW (Non Bailable Warrent), Anticipatory Bails
and FIR at nearest police station so while he was

Along with him there was one elder person (age more 60 year) with his 26 years old daughter and 31 yearold was sitting to lodge complaint against a mobile
repair shop owner whom they have given the phone for screen replacement but after repairing he had install some offencive hacking software system inside
their father's phone and tried to hack all his personal and bank details.

17/04/22, 5:24 pm - +91 98190 37144: Strong password

17/04/22, 5:24 pm - +91 79779 46765: <Media omitted>

17/04/22, 5:24 pm - Sunita Patra: Beyond your messages, encrypting the files on your devices can help reduce the chances of your data being compromised if
you're hacked or lose your devices. Both iPhone and iOS encrypt your hard drive by default. Just make sure you use a strong password or PIN for your devices.

17/04/22, 5:24 pm - +91 83902 00520: This message was deleted

17/04/22, 5:24 pm - +91 79779 46765: By changing password regularly

17/04/22, 5:24 pm - +91 70459 86828: https://www.wired.com/story/how-to-prevent-getting-hacked/

17/04/22, 5:24 pm - Sunita Patra: Recommendations to avoid hacking:

Don’t access personal or financial data with public Wi-Fi:

This may seem like a no-brainer, but you’d be surprised how many people check their bank accounts or make purchases with a credit card while using public Wi-
Fi. It’s best to do those things on a secure connection.

Turn off anything you don’t need:

Hackers can use certain features on your phone to get at your information, location or connection. So, instead of keeping your GPS, wireless connection and
geo-tracking on all the time, just turn them on when you need them.

Choose your apps wisely:

Only download apps from trustworthy sources that have established a good reputation. Make sure you update your software and apps regularly and get rid of
old apps you don’t use.

Use a password, lock code or encryption:

Make sure your passwords are at least eight characters long, with a mix of upper and lower case, and include numbers or other characters, and never use the
auto-complete feature for passwords. You can use the storage encryption feature on your phone to protect your private data, and set your screen to timeout
after five minutes or less.

Be skeptical about links and attachments:

If you’re not sure about the source, don’t use the link or open the attachment.
Trace or erase:

Make sure your data is secure if your mobile device is stolen or lost. You can set up your device to lock itself after a pre-set number of failed log-in attempts.

17/04/22, 5:24 pm - +91 79779 46765: Cleaning up the browsing history

17/04/22, 5:24 pm - +91 83902 00520: Cyber Security Measures for Organizations to Prevent Cyber Attacks

1. Educate employees on the emerging cyber attacks with security awareness training.

2. Keep all software and systems updated from time to time with the latest security patches.

3. Implement email authentication protocols such as DMARC, DKIM and SPF to secure your email domain from email-based cyber attacks.

4. Get regular Vulnerability Assessment and Penetration Testing to patch and remove the existing vulnerabilities in the network and web application.

5. Limit employee access to sensitive data or confidential information and limit their authority to install the software.

6. Use highly strong passwords for accounts and make sure to update them at long intervals.

7. Avoid the practice of openly password sharing at work.

17/04/22, 5:24 pm - +91 98190 37144: https://www.chubb.com/us-en/individuals-families/resources/6-ways-to-protect-yourself-from-hackers.html

17/04/22, 5:24 pm - +91 91362 22492: Add or update account recovery options. ...

Remove risky access to your data. ...

Turn on screen locks. ...

Update your browser. ...

Update your operating system. ...

Update your apps. ...

Manage your passwords. ...

Help protect your password from ha

17/04/22, 5:24 pm - +91 99679 62363: Don't let a data breach drag your business under. This is how you should respond after finding out your business network
has been hacked.

Cyberattacks targeting small businesses are especially dangerous, as the cost can be enough to close a business’s doors for good.

Taking measures to prevent a data breach via cyberattacks like phishing, malware and ransomware can protect your business from losing tens of thousands of
dollars.

Insurance companies are now offering cyber insurance to underwrite the potential costs of a data breach or cyberattack, and small businesses may benefit from
this product.

This article is for small business owners who want to take proactive steps to protect their business from cyberattacks.

Every business is at risk of being hacked, especially small businesses. This constant state of vulnerability is terrifying, but the reality of a security breach
experience can be even worse.

It’s extremely difficult to regain control of everything the hackers accessed, but you can still take action and salvage your reputation with your customers and
clients. If you’re properly prepared for an attack, it’s possible to get back to business with minimal impact.

“Since it is really more of a question of when than if, when it comes to data breaches, we always recommend having a detailed and thorough data breach
response plan in place,” said Michael Bruemmer, vice president of the data breach team at Experian. “And not only should that plan be created, but it needs to
be practiced and updated on a regular basis to ensure it accounts for the latest threats, including attacks like ransomware.”

Legal and technology experts shared their insights on how owners can best recover from a small business data breach. [Read related article: Cyberattacks and
Your Small Business: A Primer for Cybersecurity]

17/04/22, 5:24 pm - +91 79779 46765: Reading the links before clicking

17/04/22, 5:25 pm - +91 77000 28680: <Media omitted>

17/04/22, 5:25 pm - +91 74003 53929: https://youtu.be/gZygfPJD0aA

17/04/22, 5:25 pm - +91 79779 46765: Avoid using free wifi

17/04/22, 5:25 pm - +91 74003 53929: https://youtu.be/-l9hma2fKTg

17/04/22, 5:25 pm - +91 70459 86828: This message was deleted

17/04/22, 5:25 pm - +91 91674 91717: Turn on Two-Factor Authentication


17/04/22, 5:25 pm - +91 82080 72073: Prevention from hacking:

1) Software update

2) Use unique password for different account

3) HTTPS encryption

4) Avoid clicking on Ads or strange links, etc

17/04/22, 5:25 pm - +91 73031 33005: <Media omitted>

17/04/22, 5:25 pm - +91 73031 33005: <Media omitted>

17/04/22, 5:25 pm - +91 70459 86828: Keep tabs on what sites may be compromised

17/04/22, 5:25 pm - Sunita Patra: IMG-20220417-WA0022.jpg (file attached)

17/04/22, 5:25 pm - +91 70459 86828: Check whether your accounts have been compromised

17/04/22, 5:26 pm - +91 74003 53929: https://www.chubb.com/us-en/individuals-families/resources/6-ways-to-protect-yourself-from-hackers.html

17/04/22, 5:26 pm - +91 99679 62363: https://youtu.be/NKLfaSv3y2A

You should avoid signing here in Kali linux

17/04/22, 5:26 pm - +91 70459 86828: Create strong passwords

17/04/22, 5:26 pm - +91 79779 46765: Avoid clicking on ads links

17/04/22, 5:26 pm - +91 98190 37144: Protect your accounts

It's important that you protect your accounts whether it's a personal account such as a Microsoft account, or a work or school account someone in your
organization created for you.

Take precautions with sensitive info

Don't send emails that include sensitive information such as passwords, credit card numbers, passport numbers, or other government issued identification such
as a social security number or other tax related identification.

If you absolutely must send sensitive info via email, use email encryption to help protect it.

For more information see Encryption in Outlook.

Is that message real?

Watch out for phishing attacks which try to trick you into providing sensitive information, or clicking a malicious link or attachment.

Phishing uses messages that pretend to be from a legitimate source such as a bank or an organization you trust. The message invites you to sign in with your
email address and password, but it's actually a fake website. Or they may look like emails from someone you know which ask you to click a link or open an
attachment.

If you click the link in the message or open the attachment, your computer can become infected or an attacker can gain access to your device or your data.

If you receive an email that looks even slightly suspicious, do the following:

Look carefully at the sender's email address. If the message claims to be from your bank, but was actually sent from a domain other than the bank's official
domain it's probably fake.

Hover over the link and look for the name of the actual website the link is sending you to. Make sure it's what you expect and not misspelled.

Go to the legitimate website using your own saved favorite or bookmark, or from an internet search, instead of clicking a link in the message.

If you receive a message from someone you know, but it looks a bit unusual, it could mean the sender's email account and contact list was compromised.
Contact the sender directly, describe the mail you just received and ask if it was legitimate.

17/04/22, 5:26 pm - +91 91362 22492: <Media omitted>

17/04/22, 5:26 pm - +91 70459 86828: <Media omitted>

17/04/22, 5:26 pm - +91 79779 46765: Always use two factor authentication

17/04/22, 5:26 pm - +91 77000 28680: Ignore fraud links.

17/04/22, 5:27 pm - +91 70459 86828: Use a password manager

17/04/22, 5:27 pm - +91 74981 13531: Do you know that not all hacking is illegal?throw some light on this.

17/04/22, 5:27 pm - +91 74003 53929: Create strong password and don't share with anyone.

Use double verification option.


Block unknown notification.

17/04/22, 5:27 pm - +91 91362 22492: Never share password and personal details with anyone

17/04/22, 5:27 pm - +91 83902 00520: Use Multi-Factor Authentication Get a Password Manager Learn How to Spot a Phishing Attack Update Everything
Update Everything Wipe Your Digital Footprint

17/04/22, 5:27 pm - +91 99679 62363: What is a data breach?

A data breach is any incident of an unauthorized person bypassing cybersecurity measures to view or steal confidential information. A data breach could take
many forms, ranging from unintentional access to protected information to the deliberate penetration of a database to copy or steal corporate secrets.
Sometimes, cybercriminals even try to corrupt an entire system.

17/04/22, 5:27 pm - +91 79779 46765: A federal case of computer hacking usually involves illegal access to a government, business or personal computer with
intent to cause harm, commit fraud, or obtain something of value. It should be noted that computer hacking can be prosecuted at both the state and federal
leve

17/04/22, 5:27 pm - +91 91362 22492: Ethical hacking is completely legal and is one of the highest paid, fastest growing professions in information technology
today. Often, an ethical hacker would work as an employee in an organization, a security firm or as an independent security consultant.

17/04/22, 5:27 pm - +91 73031 33005: Hacking is the tool through which the system can be accessed with the help of this weakness by finding the weakness of
any system device or profile.

17/04/22, 5:28 pm - +91 74003 53929: Ethical Hacking is about improving the security of computer systems and/or computer networks. Ethical Hacking is legal

17/04/22, 5:28 pm - +91 99679 62363: Legal Hackers is a grassroots movement that seeks to foster creative problem-solving at the intersection of law and
technology by creating an open culture for law.

17/04/22, 5:28 pm - +91 79779 46765: ethical hacking or better known as white collar hacking was considered legal.

17/04/22, 5:28 pm - +91 91362 22492: So ethical hacking is legal as it is performed with the permission of the owner to discover vulnerabilities of the system
and suggest ways to improve it. It is part of an information risk management program that allows security improvement

17/04/22, 5:28 pm - Sunita Patra: Hacking is not necessarily legal or illegal. On its own, Hacking is a skill — like coding, or writing, or martial arts. And just like any
other skill, you can use hacking for good or bad reasons. Whether it is legal or not depends on the hacker and their intentions.

17/04/22, 5:28 pm - +91 82080 72073: Only download apps from trustworthy sources that have established a good reputation. Make sure you update your
software and apps regularly and get rid of old apps you don't use.

17/04/22, 5:28 pm - +91 83902 00520: Hackers are opportunistic criminals, always on the lookout for valuable information. The most important thing you need
to know about hackers is their relationship with cloud services security. While “hacking,” in a general sense, isn’t illegal, the malicious type of hacking you think
of when you hear the term is.

Many “hackers” are actually employed by cloud services security companies. These people are known as “white hat” hackers, and help to point out potential
security holes and shore up defenses. “Black hat” hackers, on the other hand, are rogue operators who use computer systems to steal sensitive information.

The best way to keep your information safe from hackers is to not have it on the internet to begin with. There is no such think as an impenetrable server. If you
must have your data stored online, make sure it is only stored with organizations and websites you know and trust. Remember: you can never be too careful
with your personal information.

17/04/22, 5:28 pm - +91 70459 86828: <Media omitted>

17/04/22, 5:28 pm - +91 99679 62363: Legal Hackers - Hacking the way to justice

The hacker culture emerged at the Massachusetts Institute of Technology (MIT) in the late 1950s and 1960s where gifted technology enthusiasts worked day
and night to build computer programs and live by a unwritten “hacker ethic” that view computer technologies as a tool for creative exploration and the public
good. The culture has since spread through free and open source software communities, and eventually changed the world forever. For example, the Homebrew
Computer Club in Silicon Valley played an important role in the development of the personal computer which has since revolutionized the way humans interact.

17/04/22, 5:28 pm - Sunita Patra: The phrase “computer hacking” normally refers to illegally using a computer to make an attempt to access another computer
without consent to cause harm or commit fraud. Most federal computer hacking charges are prosecuted under the Computer Fraud and Abuse Act.

17/04/22, 5:29 pm - Sunita Patra: IMG-20220417-WA0009.jpg (file attached)

17/04/22, 5:29 pm - +91 98190 37144: All hacking is not illegal as the goverment officials police also uses hacking to tackle the cyber crime.

Also it has been used to improve the security system.

This type of hacking is called as ethical hacking

17/04/22, 5:29 pm - +91 70459 86828: https://youtu.be/9gpvG7ypx5c

17/04/22, 5:29 pm - +91 91674 91717: Legal Hackers is a grassroots movement that seeks to foster creative problem-solving at the intersection of law and
technology by creating an open culture for law.

17/04/22, 5:29 pm - +91 73031 33005: If the password is week, then any hacker can easily access it through password cracking.

17/04/22, 5:29 pm - Sunita Patra: Hacking is illegal if you are doing it without permission from the owner of the computer or computer network. Hacking
without permission can attract criminal charges and a jail term if found guilty.
17/04/22, 5:29 pm - +91 77000 28680: Illegal:The phrase “computer hacking” normally refers to illegally using a computer to make an attempt to access another
computer without consent to cause harm or commit fraud. Most federal computer hacking charges are prosecuted under the Computer Fraud and Abuse Act.

Legal:There are also some different types of hacking, and one of the most popular and fast-growing is legal hacking. It means that lawyers are using technologies
to solve legal problems and optimize their work process on the one side, and people are using technologies to solve their own legal problems on the other.

17/04/22, 5:29 pm - +91 83902 00520: https://darkwebjournal.com/is-hacking-illegal/

17/04/22, 5:30 pm - +91 74981 13531: What are the cyber laws in India for hacking?

17/04/22, 5:30 pm - +91 79779 46765: Hacking is illegal if you are doing it without permission from the owner of the computer or computer network. Hacking
without permission can attract criminal charges and a jail term if found guilty. Hacker’s trespass into a computer or computer network for a number of reasons,
such as theft of data, espionage, piracy, and extortion

17/04/22, 5:30 pm - +91 79779 46765: Section 43 and section 66 of the IT Act cover the civil and criminal offenses of data theft or hacking respectively. Under
section 43, a simple civil offense where a person without permission of the owner accesses the computer and extracts any data or damages the data contained
therein will come under civil liability.

17/04/22, 5:30 pm - +91 74003 53929: <Media omitted>

17/04/22, 5:30 pm - +91 99679 62363: https://www.makeuseof.com/tag/websites-legally-hack/

17/04/22, 5:30 pm - +91 91674 91717: Section 66 – Hacking with computer systems or unauthorised usage of computer system and network. Punishment if
found guilty can be imprisonment up to three years and/or a fine of up to Rs 5 lakh.

17/04/22, 5:30 pm - +91 70459 86828: This message was deleted

17/04/22, 5:30 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:30 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:30 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:30 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:31 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:31 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:31 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:31 pm - +91 98190 37144: Section 65 – Tampering with Computer Source Documents. Penalties if found guilty can be imprisonment up to 3 years
and/or up-to Rs 2 lakh fine. An example of such crime is: Employees of a telecom company were held guilty by the court for tampering with the Electronic Serial
Number of cellphones of another company that had locked the handset before selling it so as to work with its SIM only.

Section 66 – Hacking with computer systems or unauthorised usage of computer system and network. Punishment if found guilty can be imprisonment up to
three years and/or a fine of up to Rs 5 lakh. An example: When a criminal hacked into an academy network by unauthorized access of broadband and modified
the passwords of users to deny access. The criminal was punished under Section 66 of IT Act.

Section 66C – Identity theft using passwords, digital signatures, biometric thumb impressions or other identifying features of another person for fraudulent
purposes. An example is – when a criminal obtained the login and password of an online trading account and transferred the profit to his account by doing
online transactions in the trading account in an unauthorized manner. The criminal was charged under Section 66C.

Section 66D – Cheating by Personation Using Computer Resources. Punishment if found guilty can be imprisonment up to three years and/or up to Rs 1 lakh fine.
An example: A criminal who posed as a woman and tried to seduce a businessman to extort Rs 96 lakh from him by creating a fake email Id and trapping him in a
cyber relationship. The criminal was arrested and charged under Section 66D and various other IPC sections.

17/04/22, 5:31 pm - +91 91362 22492: <Media omitted>

17/04/22, 5:31 pm - +91 79779 46765: In India, cyber laws are contained in the Information Technology Act, 2000 (“IT Act”) which came into force on October
17, 2000. The main purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government

17/04/22, 5:31 pm - +91 74003 53929: Section 66 – Hacking with computer systems or unauthorised usage of computer system and network. Punishment if
found guilty can be imprisonment up to three years and/or a fine of up to Rs 5 lakh

17/04/22, 5:31 pm - +91 70459 86828: https://timesofindia.indiatimes.com/blogs/livesimply/violating-these-cyber-laws-can-land-you-in-jail/

17/04/22, 5:31 pm - Sunita Patra: Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a
network. The company that owns the system or network allows Cyber Security engineers to perform such activities in order to test the system's defenses

17/04/22, 5:31 pm - +91 99679 62363: And register complaint under IT act 2000

Under Section 43 , 66A, 67, and 69A of IT Act?

charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer
network, he shall be liable to pay damages by way of compensation to the person so affected.

17/04/22, 5:31 pm - +91 73031 33005: Ethical hacking is legal because you take permission from the system owner
17/04/22, 5:31 pm - +91 70459 86828: Section 66C – Identity theft using passwords, digital signatures, biometric thumb impressions or other identifying
features of another person for fraudulent purposes. An example is – when a criminal obtained the login and password of an online trading account and
transferred the profit to his account by doing online transactions in the trading account in an unauthorized manner. The criminal was charged under Section 66C

17/04/22, 5:32 pm - +91 79779 46765: https://www.thehindu.com/news/national/indias-national-cyber-security-strategy-features-


implementation/article65317407.ece

17/04/22, 5:32 pm - +91 91674 91717: <Media omitted>

Indian cyber laws

17/04/22, 5:32 pm - Sunita Patra: IMG-20220417-WA0002.jpg (file attached)

17/04/22, 5:32 pm - +91 77000 28680: <Media omitted>

17/04/22, 5:32 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:32 pm - +91 70459 86828: Section 379 – Punishment for theft for up to three years and/or fine. Since many cybercrimes are committed using stolen
mobile/computers or stolen data this IPC Section comes into the picture.

17/04/22, 5:32 pm - +91 83902 00520: Section 43

If any person uses a computer or system network without permission

of the owner or any other person who is incharge

Access, download, Copy any data from such computer

Introduces Computer Virus into any computer.

Damages any computer network or computer.

Changes Account Settings.

Punishment

He shall be liable to pay damages by the way of compensation not

exceeding 1 Crore to affected person.

20

Section 66

Hacking with Computer System

Information residing in a computer resources must be either:

• Destroyed

• Deleted

• Altered

• Diminished in value or utility

• Affected Injuriously

Punishment

3 yrs. Or Fine up to 2 lakh.

Section 67

Publication or transmitted in the electronic form any material which

contains sexually explicit acts or conduct.

Punishment

st conviction with 2 to 5 years of imprisonment and fine of 1 lakh

rupees.

nd or subsequent conviction with the imprisonment up to 7-10 years

and also with fine which may extend to 10 lakh rupees.


Some other Sections

Section 65 : Tampering with computer source document.

Punishments:

Offences are punishable with imprisonment up to 3 yrs

and/or fine up to Rs. 2 lakh.

Section 69: Interception, monitoring of any information regarding the

integrity, Security or defense of India, friendly relations with foreign

countries.

Punishment:

2 lakh and /or jail not extending 5 yrs

Section 72: Violation of the privacy policy

Punishment:

Fine up to 5 lakh and jail not extending 2 yrs

17/04/22, 5:33 pm - +91 74003 53929: Section 66C – Identity theft using passwords, digital signatures, biometric thumb impressions or other identifying
features of another person for fraudulent purposes. An example is – when a criminal obtained the login and password of an online trading account and
transferred the profit to his account by doing online transactions in the trading account in an unauthorized manner. The criminal was charged under Section 66C

17/04/22, 5:33 pm - +91 77000 28680: Hacking earlier used to refer to a crime under section 43 of the IT Act but at the same time, ethical hacking or better
known as white collar hacking was considered legal. Ethical hacking is also being taught by various professionals at schools and colleges. So a need was felt to
differentiate between good and bad hacking. Under the amendment IT Act in 2008, the word ‘hacker was removed from the act. The reason for the same was
that ethical hacking is taught by a lot of professionals at various schools and colleges, and colleges cannot teach anything illegal. So the same word should not be
used. The amendment rephrased section 66 and section 43 by removing the word hacking from the Act.

17/04/22, 5:33 pm - +91 99679 62363: https://timesofindia.indiatimes.com/blogs/livesimply/violating-these-cyber-laws-can-land-you-in-jail/

17/04/22, 5:33 pm - +91 91362 22492: Cyber Laws in India

Why Cyberlaw in India ?

When Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could transform itself into an all pervading revolution
which could be misused for criminal activities and which required regulation. Today, there are many disturbing things happening in cyberspace. Due to the
anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly
misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. Hence the need for Cyberlaws in India.

17/04/22, 5:33 pm - +91 79779 46765: The Information Technology Act (2000) (the IT Act) 5 contains provisions for the protection of electronic data. The IT Act
penalises 'cyber contraventions' (Section 43(a)–(h)), which attract civil prosecution, and 'cyber offences' (Sections 63–74), which attract criminal action

17/04/22, 5:33 pm - +91 70459 86828: https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.hindustantimes.com/india-news/chinese-


hackers-targeted-7-indian-power-hubs-govt-says-ops-failed-101649356540330-
amp.html&ved=2ahUKEwiqltbphpv3AhUFL6YKHSOIBB0QyM8BKAB6BAgSEAI&usg=AOvVaw3xfbpTKmhWuREey8r9QlNa

17/04/22, 5:33 pm - +91 73031 33005: Hacking is not only for fraud, but all the companies that do online marketing, they hire ethical hackers.

17/04/22, 5:33 pm - Sunita Patra: Indian legal provisions for hacking

According to Section 66 of the IT Act, the following are the essentials for an offence to count as hacking: There should be the malicious intention of the accused
to tamper or break into the computer of the other person and steal or destroy its data or sources

17/04/22, 5:34 pm - +91 70459 86828: https://www.indiatoday.in/technology/news/story/north-korean-hackers-behind-600-million-crypto-heist-involving-nft-


game-says-fbi-1937972-2022-04-15

17/04/22, 5:34 pm - +91 82080 72073: Section 66 – Hacking with computer systems or unauthorised usage of computer system and network. Punishment if
found guilty can be imprisonment up to three years and/or a fine of up to Rs 5 lakh.

17/04/22, 5:34 pm - +91 74981 13531: Girls, please conclude our today's discussion.

17/04/22, 5:35 pm - +91 79779 46765: Closing the internet when not in use

17/04/22, 5:35 pm - +91 73031 33005: Hacker can be classified into three different categories

. Black hat Hacker

. white hat Hacker

.grey hat Hacker

17/04/22, 5:35 pm - +91 83902 00520: Important Cyber Law Provisions in India
Offence Section under IT Act

Tampering with Computer source documents

(with out the permission of in charge) Sec.43

Hacking with Computer systems, Data alteration Sec.66

Publishing obscene information Sec.67

Un-authorized access to protected system Sec.70

Breach of Confidentiality and Privacy Sec.72

Publishing false digital signature certificates Sec.73

17/04/22, 5:35 pm - +91 79779 46765: Proper Ethical hacker should be employed

17/04/22, 5:35 pm - +91 99679 62363: <Media omitted>

Ma'am we should be aware of day to day news

17/04/22, 5:35 pm - Sunita Patra: Hacking is a serious concern for any business nowadays. In fact, it is almost a statisticalcertainty that at some point, any given
company will suffer a data breach. In spite of this, the pressureto keep up with the rapidly developing technology industry leads to carelessness in securing
computersystems. While the desire to maximize profit is understandable, computer crime can affect people'slives so dramatically that companies are ethically
obligated to secure their systems, even if the extratime and resources reduce revenue. To this end, a full-disclosure policy is needed.

17/04/22, 5:35 pm - +91 91674 91717: Hackers are criminals who gain unauthorized access to a network and devices, usually with the intent to steal sensitive
data, such as financial information or company secrets.You can protect your computers by using firewalls and antivirus software and by following best practices
for computer use.You can protect your mobile devices by turning off Bluetooth when it’s not in use, being mindful of the Wi-Fi networks you connect to and
using security applications to improve monitoring and protection.

17/04/22, 5:35 pm - +91 79779 46765: Practice using regular web address

17/04/22, 5:35 pm - +91 70459 86828: Hacking can be boon if we use it in a positive way. But most of the people use it in negative way which causes damage.

17/04/22, 5:35 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:36 pm - +91 98190 37144: We discussed what is hacking?

What are different types of hacking?

How we can prevent our accounts from hacking?

What is ethical hacking?

17/04/22, 5:36 pm - +91 79779 46765: Always confirm the validity of email with the sender

17/04/22, 5:36 pm - +91 98190 37144: What is Indian standard and laws for hacking?

17/04/22, 5:36 pm - Sunita Patra: We should be aware of these illegal practices and adopt safety measures

17/04/22, 5:36 pm - +91 77000 28680: Its need of time to spread awareness of cyber hacking.

17/04/22, 5:37 pm - +91 83902 00520: CONCLUSION

• Hacking is a good computing skill that can be

used for good or bad intention.

• There is reason to do the hack, and there are

ways to prevent it.

17/04/22, 5:37 pm - +91 99679 62363: ConclusionHacking is a serious concern for any business nowadays. In fact, it is almost a statisticalcertainty that at some
point, any given company will suffer a data breach. In spite of this, the pressureto keep up with the rapidly developing technology industry leads to carelessness
in securing computersystems. While the desire to maximize profit is understandable, computer crime can affect people'slives so dramatically that companies are
ethically obligated to secure their systems, even if the extratime and resources reduce revenue. To this end, a full-disclosure policy is needed. Users and
developers

must be able to see the underlying flaws and vulnerabilities in the systems they employ if they are toperfect them.The task of ensuring computer security does
not rest with the developers alone. As holes inoutdated software can be used to break in and cause an entire system to collapse, users have theresponsibility to
be aware of updates and act promptly. For companies employing software developedby others, they are required to ensure everything is properly configured
and up-to-date, regardless ofthe financial cost of such a setup. Furthermore, if full-disclosure policies are to be implemented bydevelopers, then the public has
the additional duty of carefully reviewing the analysis of security issuesand demanding patches for problems encountered. Security requires two-way
communication, withdevelopers spelling out the details of their products and consumers reporting any new issues theyencounter. Such a change will require a
shift in marketing tactics and development cycles, but as ourlives revolve more and more around computerized systems, these must be able to see the
underlying flaws and vulnerabilities in the systems they employ if they are toperfect them.The task of ensuring computer security does not rest with the
developers alone. As holes inoutdated software can be used to break in and cause an entire system to collapse, users have theresponsibility to be aware of
updates and act promptly. For companies employing software developedby others, they are required to ensure everything is properly configured and up-to-
date, regardless ofthe financial cost of such a setup. Furthermore, if full-disclosure policies are to be implemented bydevelopers, then the public has the
additional duty of carefully reviewing the analysis of security issuesand demanding patches for problems encountered. Security requires two-way
communication, withdevelopers spelling out the details of their products and consumers reporting any new issues theyencounter. Such a change will require a
shift in marketing tactics and development cycles, but as ourlives revolve more and more around computerized systems, these changes become all the
morenecessary.

17/04/22, 5:37 pm - +91 98190 37144: Why cyber security is important in today's date?

What is our government's priority about cyber security

17/04/22, 5:37 pm - +91 74003 53929: Good hackers not only help expose flaws in systems, but they assist in repairing them before criminals even have a shot
at exploitation. They are an essential part of the cybersecurity ecosystem and can often unearth serious unknown vulnerabilities in systems better than any
security solution ever could.

17/04/22, 5:38 pm - Sunita Patra: IMG-20220417-WA0001.jpg (file attached)

17/04/22, 5:38 pm - Sunita Patra: IMG-20220417-WA0004.jpg (file attached)

17/04/22, 5:38 pm - +91 91362 22492: Conclusion : Hacking is a serious concern for any business nowadays. In fact, it is almost a statisticalcertainty that at some
point, any given company will suffer a data breach. In spite of this, the pressureto keep up with the rapidly developing technology industry leads to carelessness
in securing computersystems. While the desire to maximize profit is understandable, computer crime can affect people'slives so dramatically that companies are
ethically obligated to secure their systems, even if the extratime and resources reduce revenue. To this end, a full-disclosure policy is needed. Users and
developers

17/04/22, 5:38 pm - +91 73031 33005: Kavin mitnick the world's most famous hacker will use live demonstration to illustrate how cyber criminals take
advantage of your employees trust through the art of social engineering

17/04/22, 5:38 pm - +91 79779 46765: Ethical hacking can help in lot of ways like it strengthens computer and network security by performing penetration
testing, it enables one to take preventive measures to avoid any security breach situations

17/04/22, 5:38 pm - +91 83902 00520: Conclusion

The Ethical Hacking Project provides Exact User Action performed in the Browser’s ,Computer and NetworkIP. The Main objective of this application is ,it tracked
the previous IP Address that the user used even when the internet is down.

Additionally it encountered the timing ,title of the web search and count that the user used in the browsing history.

17/04/22, 5:38 pm - +91 74981 13531: Yes, hacking makes us insecure of the information we can or cannot put on the internet. It takes only a matter of seconds
to become a victim of such type of cyber crime.

To make sure that such crimes decrease, everyone must make efforts to keep themselves safe and educate those around them to not fall for illegal activities,
scams or frauds.

Hence, we can conclude that hacking, one of the cyber crime, is a great problem and threat in this techno world but with cooperation and being alert we can
overcome with it.

17/04/22, 5:38 pm - +91 99679 62363: Today the internet has taken the world by storm. Especially after the Pandemic, almost every task is being done online,
right from education to banking. With the increasing use of the Internet, the cybercrime rate too has gone up. Cybercrime is any crime conducted by the use of
Computers and/or networks where the computer is used either as a weapon or as the target. Everyday stories about cybercrime related to cloning of
credit/debit cards at ATMs, ransomware, identity theft, KYC (know your customer) frauds, cryptojacking, drugs and illegal arms sale through Dark Web, social-
media stalking, child pornography, online job fraud and lottery, social engineering, web defacement, cyber terrorism etc. are being published in the media.

17/04/22, 5:38 pm - +91 79779 46765: Yes ma'am

17/04/22, 5:39 pm - Sunita Patra: Hacking may be defined as legal or illegal, ethical or unethical. The media’s portrayal of hacking has boosted one version of
discourse. The conflict between discourses is important for our understanding of computer hacking subculture. Also, the outcome of the conflict may prove
critical in deciding whether or not our society and institutions remain in the control of a small elite or we move towards a radical democracy (a.k.a. socialism). It
is my hope that the hackers of the future will move beyond their limitations (through inclusion of women, a deeper politicization, and more concern for
recruitment and teaching) and become hacktivists. They need to work with non-technologically based and technology-borrowing social movements (like most
modern social movements who use technology to do their task more easily) in the struggle for global justice. Otherwise the non-technologically based social
movements may face difficulty continuing to resist as their power base is eroded while that of the new technopower elite is growing

17/04/22, 5:39 pm - +91 73031 33005: Yes mam

17/04/22, 5:39 pm - +91 77000 28680: Yes

17/04/22, 5:39 pm - +91 98190 37144: There is always flaws in system which can be taken in both good & bad ways it's upto you how you deal with that

17/04/22, 5:39 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:39 pm - +91 74981 13531: <Media omitted>

Internet is a boon but sometimes can become a curse. Hence, it is advisable to all of us that :-

"THINK BEFORE A CLICK"

17/04/22, 5:39 pm - Sunita Patra: Yes ma'am

17/04/22, 5:39 pm - +91 83902 00520: https://www.youtube.com/watch?v=nsKIADw7TEM


17/04/22, 5:39 pm - +91 74003 53929: Conclusion: Hacking is increasing now a days we should be aware. And not all hackers are bad.

Sometimes hacking is a boon.Good hackers not only help expose flaws in systems, but they assist in repairing them before criminals even have a shot at
exploitation. They are an essential part of the cybersecurity ecosystem and can often unearth serious unknown vulnerabilities in systems better than any
security solution ever could.

17/04/22, 5:39 pm - +91 79779 46765:

17/04/22, 5:40 pm - +91 70459 86828: Yes Ma'am

17/04/22, 5:40 pm - +91 83902 00520: In this documentary, learn about "white hat" hackers, the U.S. Secret Service's cyber crime division working to protect us
from the risks associated with persistent connectivity.

This Hacking Documentary takes you to the world of Modern Hackers and their Hacking techniques.

Hacking documentary

hacker documentary

cybersecurity

17/04/22, 5:40 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:40 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:40 pm - +91 91674 91717: <Media omitted>

17/04/22, 5:40 pm - +91 99679 62363: Yes ma'am wonderfully explained

17/04/22, 5:40 pm - +91 74981 13531: <Media omitted>

17/04/22, 5:40 pm - +91 74981 13531: <Media omitted>

17/04/22, 5:40 pm - +91 74981 13531: <Media omitted>

17/04/22, 5:40 pm - +91 74981 13531: <Media omitted>

17/04/22, 5:41 pm - +91 98190 37144:

17/04/22, 5:41 pm - +91 91674 91717: https://images.app.goo.gl/o4zxzeBCzs4oUq7X6

17/04/22, 5:42 pm - +91 91362 22492: <Media omitted>

17/04/22, 5:42 pm - +91 99679 62363: <Media omitted>

17/04/22, 5:42 pm - +91 74981 13531: <Media omitted>

Today's discussion was quite worthy. That's all for the day.

17/04/22, 5:42 pm - +91 79779 46765:

17/04/22, 5:43 pm - +91 98190 37144: S ma'am.

17/04/22, 5:43 pm - +91 91362 22492: Thank u maam ...its was wonderful and informative session

17/04/22, 5:43 pm - +91 83902 00520: Thank you Ma'am

17/04/22, 5:43 pm - Sunita Patra: Thank you ma'am

17/04/22, 5:43 pm - +91 70459 86828: Thank you Ma'am

17/04/22, 5:43 pm - +91 98190 37144: Thanku ma'am

17/04/22, 5:43 pm - +91 77000 28680: Thank you ma'am

17/04/22, 5:43 pm - +91 82080 72073: Thank you ma'am

17/04/22, 5:43 pm - +91 79779 46765: Thank you ma'am

17/04/22, 5:44 pm - +91 73031 33005: Thank you ma'am

17/04/22, 5:44 pm - +91 91674 91717: It was really an informative discussion !

17/04/22, 5:44 pm - +91 99679 62363: Thank you ma'am it's was just of one of the precious moment in my life to learn about hacking with the help of such
WhatsApp group chat disscussion

17/04/22, 5:47 pm - +91 99679 62363: Mindful quote.

You might also like