Hacking
Hacking
•Reporter
01 Understanding Hacking
02 Hacking Techniques
03 Types of Hackers
CONTENT
04 Prevention Strategies
1
【
【
Definition of Hacking
01 02 03
What is hacking? Different types of hacking Hacking vs. Programming
Hacking refers to the Hacking can be categorized While programming involves
manipulation of systems and into several types, including writing code to create software
networks with the intent to white-hat hacking (ethical and systems, hacking focuses
gain unauthorized access or hacking), black-hat hacking on understanding and
control over devices, data, or (malicious attacks), and gray- potentially exploiting existing
networks. Hacking can be hat hacking (a blend of both). code and applications. It
ethical or unethical depending Each type serves different requires deep knowledge of
on the intent behind the purposes, from improving programming principles, but it
actions, and it often utilizes security to engaging in primarily emphasizes problem-
various technical skills and criminal activities, highlighting solving and security concerns
tools to exploit vulnerabilities. the complexity and spectrum rather than software
of hacking behaviors. development.
History of Hacking
01 Origins of hacking
1960s, with individuals seeking computer viruses in the 1980s, Hacking has evolved
to push boundaries in computer the emergence of Internet- considerably over the decades,
systems and networks. based attacks in the 1990s, transitioning from playful
and the establishment of activities among programmers
hacker groups that began to to sophisticated criminal
influence public perception and enterprises. Today, hackers can
policy regarding cybersecurity. leverage artificial intelligence
and global networks, making
cyber attacks more complex
and damaging than ever
0 【
Hacking Techniques
2
Common Hacking Methods
01 02 03
Phishing Malware Social engineering
01 02 03
SQL injection
Cross-site scripting Remote file inclusion
SQL injection attacks occur when an
Cross-site scripting (XSS) allows Remote file inclusion (RFI) occurs
attacker inserts malicious SQL code into
attackers to inject malicious scripts when an attacker exploits
a query to manipulate databases. These
into web applications viewed by vulnerabilities in web applications
attacks can lead to unauthorized
other users. This vulnerability can to include files from a remote
access, data corruption, or even
lead to session hijacking or server. This technique enables
complete data breach for web
redirecting users to harmful sites, attackers to execute harmful
applications.
compromising user trust and scripts or gain access to sensitive
0 【
Types of Hackers
• White Hat Hackers
• Gray Hat Hackers
3
• Black Hat Hackers
White Hat Hackers
Definition and role
01 A white hat hacker which can be known as ethical hacker, is an individual
who uses hacking skills to identify security vulnerabilities in hardware,
software or networks. White hat Hacker respect the rule of the law and
unlike other hackers they are legally permitted to seek vulnerabilities or
exploits. Ethical hacking practices
02
Ethical hacking practices include penetration testing, security audits, and
vulnerability assessments without stealing any data. These practices are
performed with permission and aim to strengthen defenses against
malicious attacks, ultimately enhancing overall cybersecurity.
Certification and training
03 In Kathmandu, we can pursue a Certified Ethical Hacker (CEH) which is
offered by EC-Council. Training programs emphasize both technical skills
and ethical considerations, covering each ethical hacking domain and
methodology.
Grey Hat Hackers
Characteristics and motivations
Grey hat hacking is somewhere between the white and black hat hackers who
often looks for vulnerabilities in a system without the owners permission or
knowledge. If issues are found, they report them to the owner, requesting a
small fee to fix the problem.
Way they Work
After successfully gaining illegal access to a system, they suggest the system
administrator that they can fix the problem for a fee. But this is not always the
case, getting company permission is the only way to guarantee that a hacker
will be within the law.
Real-world examples
A well-known example of a grey hat hacker is the case of Kevin Mitnick, who
initially engaged in unauthorized access but later became a consultant and
speaker on cybersecurity. His transformation illustrates the potential for
positive contributions from those with hacking backgrounds.
Black Hat Hackers
03
Notable black hat cases
Notable black hat hacking
4
Security Measures
Importance of programs
cybersecurity training Employee awareness Keeping software and
Cybersecurity training is vital programs focus on educating security systems updated is
for employees to recognize staff about common attack crucial in combating new
and properly respond to vectors, such as phishing threats. Regular updates help
threats. Regular training and social engineering. patch vulnerabilities, while
sessions can help create a These programs enhance ongoing vigilance ensures
security-aware culture within the organization’s overall that organizations can
an organization, minimizing security posture by quickly identify and respond
the chances of successful promoting vigilance and to potential incidents.
attacks. proactive measures.
Incident Response
03
Recovery processes
Implementing robust
5
Emerging Trends
01 02 03
As hacking techniques become The rising frequency and sophistication Governments are responding to
more advanced, concerns about of cyber attacks significantly impact the rise of hacking through
personal privacy escalate. Data businesses, leading to financial losses, enhanced regulations and
breaches can result in reputational damage, and regulatory initiatives aimed at bolstering
unauthorized disclosures of repercussions. Organizations must cybersecurity. Collaborative efforts
sensitive information, prompting invest in comprehensive security between public and private sectors
increased scrutiny of data measures to mitigate these risks. are crucial in developing strategies
to combat cyber threats effectively.
Preparing for Future Challenges
Continuous improvement
Collaborative efforts
of cybersecurity measures
between various 03 Future skills needed in
is essential to address the cybersecurity
stakeholders, including
evolving threat landscape.
governments, businesses, As the cybersecurity
Organizations should
and cybersecurity domain evolves, there will
adopt a proactive
professionals, are vital to be an increasing demand
approach, integrating
enhancing collective for professionals with
cutting-edge technologies
defenses against cyber specialized skills, such as
and strategies into their
threats. Sharing threat hunting, incident
security frameworks.
intelligence and resources response, and risk
can significantly improve management. Education
resilience. and training in these areas
Thank you
•Reporter