Hacking

1,212 views

Published on

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,212
On SlideShare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
201
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Hacking

  1. 1. HACKING Presented By.. Amit Kumar Pandey MCA 4 TH SEM
  2. 2. Introduction : <ul><li>Definition </li></ul><ul><li>Types of Hacker </li></ul><ul><li>Threats </li></ul><ul><li>History of Hacking </li></ul><ul><li>Ethical </li></ul>
  3. 3. Hackers <ul><li>Harmful behavior, </li></ul><ul><li>Illegal access to computer, </li></ul><ul><li>Wicked intention, </li></ul><ul><li>Kind of electronically rebet robber, </li></ul><ul><li>Breaker security system </li></ul>
  4. 4. Definition : <ul><li>“ A person who enjoy in learning the details of computer system & how to stretch their compatibility-as opposed to the most user of computer, who prefer to learn only the minimum amount necessary.” </li></ul><ul><li>“ One who programmers enthusiastically or who enjoys programming rather then just theorizing about programming” </li></ul>
  5. 5. <ul><li>“ A person who – </li></ul><ul><li>is an expert on enthusiast of creativity overcoming or circumventing limitation.” </li></ul><ul><li>-Used as a compliment </li></ul>
  6. 6. Types of Hacking <ul><ul><ul><ul><li>White Hat- “ Ethical hacker who breaks security but who does so far altruistic or at least- malicious reason. </li></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Clear defined code of ethics. </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><li>Gray Hat- “Ambiguous ethics” </li></ul></ul></ul></ul><ul><ul><ul><ul><li>-”Borderline legality” </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Black Hat- ”Subvert computer security without authorization. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Uses technology for Terrorism, Vandalism, identity theft, intellectual, proper theft…….. </li></ul></ul></ul></ul>
  7. 7. Types of Threats <ul><li>Attack on availability </li></ul><ul><li>Attack on confidentially </li></ul><ul><li>Attack on integrity </li></ul><ul><li>Attack on authentication </li></ul>
  8. 8. Attack on Confidentially <ul><li>Attacker listens communication </li></ul><ul><li>Threats </li></ul><ul><li>-Give away private information. </li></ul><ul><li>-Spying password </li></ul><ul><li>Ex. Spy ware </li></ul>source Destination Attacke r Normal information flow Intercepted information flow
  9. 9. Attack on Availability <ul><li>Interrupt communication channel </li></ul><ul><li>Bring down destination </li></ul><ul><li>Threats </li></ul><ul><li>->System not available </li></ul><ul><li>->System not useable </li></ul>source destination
  10. 10. Attack on Integrity <ul><li>Attacker modifies the information and send to channel </li></ul><ul><li>Threats </li></ul><ul><li>Systems are not confidential </li></ul>source Destination Attacker Normal information flow Intercepted information flow
  11. 11. Attack on Authenticity <ul><li>Attacker fakes identity & insert counterfeit object on system. </li></ul><ul><li>Threats </li></ul><ul><li>- System not confidential </li></ul><ul><li>- No one sure to communicate with right partner </li></ul><ul><li>Ex. Forget password </li></ul>source Destination Attacker Normal information flow Forget information
  12. 12. Real threats <ul><li>Loss of confidential information </li></ul><ul><li>Viruses & worms </li></ul><ul><li>Remote administration of system </li></ul><ul><li>Defected web site & Security system. </li></ul><ul><li>Cyber war ??? </li></ul>
  13. 13. Defected website
  14. 14. Information Gathering <ul><li>More information about any organization is good for hacker to attack. </li></ul><ul><li>Way to gather information. </li></ul><ul><li>--port scan </li></ul><ul><li>--ping sweep </li></ul><ul><li>--social engineering </li></ul>
  15. 15. Social Engineering <ul><li>Attacker tries to convince some one to give about information, password…… </li></ul><ul><li>Most innocent question </li></ul><ul><li>--what is phone number/ IP address… </li></ul><ul><li>--Know abut Administrating person, for N/W </li></ul><ul><li>--Network structure </li></ul>
  16. 16. History of Hacking <ul><li>1970 Attack on American telephone system. </li></ul><ul><li>---John Draper found a whistle that produces 2600 Hz tone </li></ul><ul><li>---Tone used for signaling </li></ul><ul><li>---Together with his friend he develop a “Blue Box&quot; which simulates a telephone operator's dialing console </li></ul><ul><li>---In combination he had the possibility to make free calls </li></ul>Cond..
  17. 17. <ul><li>1982 </li></ul><ul><li>---Teenage hacker group 414broke into 60 computer system, including Los Alamos laboratories </li></ul><ul><li>1988 </li></ul><ul><li>---Kevin Mitnick secretly monitor’s the e-mail of the security officials </li></ul><ul><li>---sentenced for one year of jail </li></ul>Cond…
  18. 18. 1988 first computer worms in the internet is developed by “Robert morries” .Wanted to know about the size of ARPA net. He is the first person indicted under the computer fraud. --3 years probation. --400 hours community service --fine $10,050 & cost of his supervision Cond..
  19. 19. <ul><li>1988 </li></ul><ul><li>-- First National Bank of Chicago become victim of $70 million computer theft </li></ul><ul><li>1989 </li></ul><ul><li>--hackers were arrested in western Germany </li></ul><ul><li>--broke into US government &corporate computers </li></ul><ul><li>--Sold operating system source code to soviet </li></ul><ul><li>KGB </li></ul>Cond..
  20. 20. <ul><li>2000 &2003 </li></ul><ul><li>---Hackers broke into Microsoft’s corporate networks & stole Windows & Office source code </li></ul><ul><li>---”I LOVE YOU “ virus spread over the internet & infected image and sound files </li></ul><ul><li>--18 year old arrested for developing & releasing B variant of the blaster warms </li></ul>
  21. 21. Ethical Hacking <ul><li>Breaking system into by order of owner </li></ul><ul><li>Skills:- </li></ul><ul><li>(1). Completely trustworthy </li></ul><ul><li>(2).Strong programming & networking ability </li></ul><ul><li>(3). Vast Knowledge of Software & Hardware </li></ul><ul><li>(4). Good understanding of security </li></ul><ul><li>(5).System management skill. </li></ul>Cond…
  22. 22. <ul><li>Goals :- </li></ul><ul><li>--Finding security holes, </li></ul><ul><li>gather information </li></ul><ul><li>Analysis of Tools </li></ul><ul><li>security administrator tools for network analysis </li></ul>
  23. 23. Thank You

×