COMPUTER SECURITY By:Satyajit Das 8thSem GITA,bbsr.
What is Computer Security?
What is Hacking?
Methods and Prevention.
How to increase security of a Computer?
What is Computer Security? The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.
WHAT IS HACKING? The meaning associated to the word 'hacking' is a positive one, and it mainly refers to the ability and desire to understand the inner mechanisms through which different components in the ICT world (typically computer programs) work. For this reason, even regular computer programmers are sometimes referred to as hackers. HACKERS WHITE HAT GREY HAT BLACK HAT
METHODS Brute Force Dictionary Attack Social Engineering Forgot Password Attack Phishing Denial of Service Attack(DOS) SQL Injection Attack ARP Poison Routing Attack using Tools
PHISHING GET THE SPOOF/FAKE PAGE .PHP SEARCH THE “ACTION =” FOR LOGIN ASSIGN “.PHP” FILE TO IT .HTML UPLOAD THE FILES TO WEB SPACE GET THE LINK OF THE HTML FILE SEND THE LINK TO VICTIM & WAIT FOR THE LOG FILE
TOOLS KEYLOGGERS MAIL BOMBER RATS CRYPTERS BINDERS JOINERS CAIN & ABEL SNIFFERS SUPER PHISHER ICON CHANGER SQLiHELPER V 2.7 VIRUS GENERATOR .BAT TO .EXE CONVERTER SANDBOXIE
Trojans "A Trojan horse also called as TROJAN, is non-self replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology."
Use of the machine as part of a botnet (i.e. to perform spamming or to perform Distributed Denial-of-service(DDoS) attacks).
Data theft(e.g. passwords, credit card information, etc.).
Installation of software (including other malware).
Downloading or uploading of files.
Modification or deletion of files.
Viewing the user's screen.
Wasting computer storage space.
How to make a FUD SERVER USE IT ON OWN COMPUTER CLIENT TROJAN SERVER BINDING CHANGE ICON SCAN WITH novirusthanks.com FUD SEND TO VICTIM
VIRUS A virus is an entity that uses the resources of the host to spread and reproduce itself, usually without informed operator action. Let us stress here the word “informed”. A virus cannot run completely of its own volition. The computer user must always take some action , even if it is only to turn the computer on. This is the major strength of a virus: it uses normal computer operations to do its dirty work, and so there is no single unique characteristic that can be used to identify a previously unknown viral program. VIRUS INFECTION PAYLOAD TRIGGER
REMOTE ADMISTRATION TOOLS A Remote Administration Tool (known more commonly on the Internet as a RAT) is used to remotely connect and manage a single or multiple computers with a variety of tools, such as: Screen/camera capture or control File management (download/upload/execute/etc.) Shell control (usually piped from command prompt) Computer control (power off/on/log off) Registry management (query/add/delete/modify) Other product-specific function
FULLY UNDETECABLE When a system is to be attacked by a Trojan or R.A.T then the server part of it is made fully undectable by a crypter with the recent stub so that it can not be detected by the antivirus of the victim.By doing this the server of the trojan or R.A.T can escape from the antivirus and can be runned at the background. After accomplishing this one can check the authencity with the help of multiple antivirus engine ie. www.novirusthanks.com
CONCLUSION Hacking has a positive sense as compared to cracking.Knowing the tricks of hacking not only make one equiped with it but also make make the user maintain his/her security when working online.The hacking triks described above are for educational purpose not to harm anyone.