WELCOME INTRODUCTION INTRODUCTION The story of hacking INTRODUCTION The story of hacking The termes refer to hacking INTRODUCTION The story of hacking The termes refer to hacking What haching consist in ? INTRODUCTION The story of hacking The termes refer to hacking What haching consist in ? Advantages of hacking INTRODUCTION The story of hacking The termes refer to hacking What haching consist in ? Advantages of hacking Drawbacks of hacking INTRODUCTION The story of hacking The termes refer to hacking What haching consist in ? Advantages of hacking Drawbacks of hacking CONCLUSION INTRODUCTION Hacking originally refers to tinkering and experimentation, motivated in particular by passion, play, plea sure, exchange, need, and sharing. This practice, established by hackers, appeared with the first home computers and inherited traditions from electronics and amateur radio. More generally, hacking is a set of techniques allowing the exploitation of possibilities, flaws, and vulnerabilities in an element or a group of hardware or human elements. It also includes repairing, maintaining, or improving old hardware or software whose documentation is no longer available, through reverse engineering. The story of hacking 1/4 Computer hacking began in the 1960s, when researchers and enthusiasts explored computer systems out of simple curiosity. Over the decades, it evolved from mere experiments to sophisticated cyberattacks carried out by criminal groups, governments, and also by ethical cybersecurity experts working to protect systems. The story of hacking 2/4 In 1969, John Draper managed, using a whistle that had the same tone as the American telephone net work, to make long distance calls for free by whistling into the receiver. This technique was called phreaking by its creator and inspired a new wave of computer hackers who sought to modify and develop early computers. It was not until 1980 that the media began publishing articles about hacking. They reported on Kevin Poulsen, who managed to infiltrate a network reserved for the military, universities, and companies. In 1983, the film Wargames was released, centered on a hacker who accesses the U.S. military computer system. The first computer virus also appeared during these years. The story of hacking 3/4 Many crackers began their activity by trying to break copy protection restrictions or bypass rules of video games. But when the media revealed in the early 1990s that Chaos Computer Club France was a fake hacker group collaborating with the police, the French hacker community shifted toward free software and many independent communities emerged. The birth of the Internet in the 1990s was accompanied by the first cases of cybercrime. Practitioners w ere initially divided: black hats carried out criminal activities, while white hats sought vulnerabilities in order to disclose and fix theme. The story of hacking 4/4 In the 2000s, hackers again aimed to push technology further and “break the locks imposed by manufacturers.” For example, Jon Johansen managed to bypass DVD protections and copy their contents. Another trend that appeared in the 2000s was the use of hacking for activism, such as groups like Anony mous, RTMark, or the Chaos Computer Club. In 2017, hackers continued to make resources available, often in the form of wikis or repositories. Attacks in the era of Kevin Mitnick, Kevin Poulsen, or Jon Johansen were few compared with those launched in the 2000s. By 2017 the threat was less virulent but far more massive, especially due to the increasing number of “script kiddies,” or novice hackers. The terms refer to hacking 1/2 Hacker - pirate informatique : The person who practise hacking . Cybersecurity – Cybersécurité: Measures and practices used to protect computers, networks, and data from attacks or unauthorized access. Cyberattack – Cyberattaque: An attempt by hackers to damage, disrupt, or gain unauthorized access to a computer system or network. The terms refer to hacking 2/2 Vulnerability – Vulnérabilité: A weakness in a system or software that can be exploited by hackers to gain unauthorized access. Malware – Logiciel malveillant : Software designed to harm or exploit computers, networks, or users. Examples include viruses, worms, and ransomware. Data Privacy – Protection des données : Ensuring that personal or sensitive information is collected, stored, and used safely, without unauthorized access. What hacking consist in? 1/2 General definition: Hacking is the act of exploring, manipulating, or exploiting computer systems and networks to access information or disrupt their operation. Purpose of hacking: Access personal or sensitive data Test the security of a system (ethical hacking) Cause disruptions or attack targets (malicious hacking) Defend or promote a cause (hacktivism) Worldwide, encrypting their files and demanding a ransom to recover them. What hacking consist in? 2/2 Common methods: Phishing → sending fake emails to steal passwords Malware / Viruses → infecting a computer to control it or steal data Brute force → trying all possible combinations to find a password Exploiting vulnerabilities → taking advantage of software or network flaws Social engineering → manipulating a person to obtain confidential information Advantages of hacking 1/2 Security improvement (Renforcement de la sécurité) : Ethical hackers help companies identify vulnerabilities before attackers can exploit them. Early threat detection(Détection précoce des menaces) : Hacking allows discovering flaws that might have gone unnoticed and fixing them quickly. Advantages of hacking 2/2 Innovation and system improvement (Innovation et amélioration des systèmes) : Hacking tests encourage developers to improve software security and functionality. Awareness( Sensibilisation ) : Ethical hacking raises awareness among companies and the public about cybersecurity risks. Drawbacks of hacking 1/2 Data theft( Vol de données ) : Malicious hackers can steal personal, banking, or confidential information. Financial losses(Pertes financières) : Cyberattacks can cause significant financial losses for businesses and individuals. Privacy violations(Atteinte à la vie privée) : Private information can be exposed or misused. Drawbacks of hacking 2/2 Service disruption(Perturbation des services) : Critical systems like hospitals, banks, or power grids can be paralyzed. Conclusion In summary, hacking is a double-edged sword. It can be dangerous, but it can also help improve security. It depends on how it is used. THANK YOU FOR YOUR LISTENING Kevin mitnick Kevin poulsen John johanser Add to our exposé Types of Hackers Black Hat Hackers: criminals who exploit vulnerabilities to steal data, extort money, or disrupt systems. White Hat Hackers: cybersecurity experts who use the same techniques but legally, for penetration testing and audits. Gray Hat Hackers: intermediaries who may reveal flaws without authorization, sometimes to gain recognition or rewards. Hacktivists: hackers motivated by political or social causes. Script Kiddies: amateurs who rely on existing tools without real technical expertise. Tools Used by Professionals Burp Suite, Metasploit, Nmap: standard tools for scanning, exploiting, and testing vulnerabilities. Wireshark: network traffic analysis to detect sensitive data or anomalies. Kali Linux: a specialized distribution that includes hundreds of hacking and penetration testing tools. Automation frameworks: custom scripts to automate repetitive or largescale attacks.