• Like
Hacking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Hacking

  • 972 views
Published

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
972
On SlideShare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
58
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. HACKING Presented By.. Amit Kumar Pandey MCA 4 TH SEM
  • 2. Introduction :
    • Definition
    • Types of Hacker
    • Threats
    • History of Hacking
    • Ethical
  • 3. Hackers
    • Harmful behavior,
    • Illegal access to computer,
    • Wicked intention,
    • Kind of electronically rebet robber,
    • Breaker security system
  • 4. Definition :
    • “ A person who enjoy in learning the details of computer system & how to stretch their compatibility-as opposed to the most user of computer, who prefer to learn only the minimum amount necessary.”
    • “ One who programmers enthusiastically or who enjoys programming rather then just theorizing about programming”
  • 5.
    • “ A person who –
    • is an expert on enthusiast of creativity overcoming or circumventing limitation.”
    • -Used as a compliment
  • 6. Types of Hacking
          • White Hat- “ Ethical hacker who breaks security but who does so far altruistic or at least- malicious reason.
            • Clear defined code of ethics.
          • Gray Hat- “Ambiguous ethics”
          • -”Borderline legality”
          • Black Hat- ”Subvert computer security without authorization.
          • Uses technology for Terrorism, Vandalism, identity theft, intellectual, proper theft……..
  • 7. Types of Threats
    • Attack on availability
    • Attack on confidentially
    • Attack on integrity
    • Attack on authentication
  • 8. Attack on Confidentially
    • Attacker listens communication
    • Threats
    • -Give away private information.
    • -Spying password
    • Ex. Spy ware
    source Destination Attacke r Normal information flow Intercepted information flow
  • 9. Attack on Availability
    • Interrupt communication channel
    • Bring down destination
    • Threats
    • ->System not available
    • ->System not useable
    source destination
  • 10. Attack on Integrity
    • Attacker modifies the information and send to channel
    • Threats
    • Systems are not confidential
    source Destination Attacker Normal information flow Intercepted information flow
  • 11. Attack on Authenticity
    • Attacker fakes identity & insert counterfeit object on system.
    • Threats
    • - System not confidential
    • - No one sure to communicate with right partner
    • Ex. Forget password
    source Destination Attacker Normal information flow Forget information
  • 12. Real threats
    • Loss of confidential information
    • Viruses & worms
    • Remote administration of system
    • Defected web site & Security system.
    • Cyber war ???
  • 13. Defected website
  • 14. Information Gathering
    • More information about any organization is good for hacker to attack.
    • Way to gather information.
    • --port scan
    • --ping sweep
    • --social engineering
  • 15. Social Engineering
    • Attacker tries to convince some one to give about information, password……
    • Most innocent question
    • --what is phone number/ IP address…
    • --Know abut Administrating person, for N/W
    • --Network structure
  • 16. History of Hacking
    • 1970 Attack on American telephone system.
    • ---John Draper found a whistle that produces 2600 Hz tone
    • ---Tone used for signaling
    • ---Together with his friend he develop a “Blue Box" which simulates a telephone operator's dialing console
    • ---In combination he had the possibility to make free calls
    Cond..
  • 17.
    • 1982
    • ---Teenage hacker group 414broke into 60 computer system, including Los Alamos laboratories
    • 1988
    • ---Kevin Mitnick secretly monitor’s the e-mail of the security officials
    • ---sentenced for one year of jail
    Cond…
  • 18. 1988 first computer worms in the internet is developed by “Robert morries” .Wanted to know about the size of ARPA net. He is the first person indicted under the computer fraud. --3 years probation. --400 hours community service --fine $10,050 & cost of his supervision Cond..
  • 19.
    • 1988
    • -- First National Bank of Chicago become victim of $70 million computer theft
    • 1989
    • --hackers were arrested in western Germany
    • --broke into US government &corporate computers
    • --Sold operating system source code to soviet
    • KGB
    Cond..
  • 20.
    • 2000 &2003
    • ---Hackers broke into Microsoft’s corporate networks & stole Windows & Office source code
    • ---”I LOVE YOU “ virus spread over the internet & infected image and sound files
    • --18 year old arrested for developing & releasing B variant of the blaster warms
  • 21. Ethical Hacking
    • Breaking system into by order of owner
    • Skills:-
    • (1). Completely trustworthy
    • (2).Strong programming & networking ability
    • (3). Vast Knowledge of Software & Hardware
    • (4). Good understanding of security
    • (5).System management skill.
    Cond…
  • 22.
    • Goals :-
    • --Finding security holes,
    • gather information
    • Analysis of Tools
    • security administrator tools for network analysis
  • 23. Thank You