Your SlideShare is downloading. ×
Hacking Kishor
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Hacking Kishor


Published on

Published in: Technology, News & Politics

1 Like
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Hacking & Cracking
  • 2. Understand The difference
    • hackers build things,
    • crackers break them
  • 3. HACKER
    • A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    • One who programs enthusiastically (even obsessively) or who enjoys programming rather than simply theorizing about programming.
    • Positive
  • 4. CRACKER
    • A Hacker who use his skill for illegal purpose.
    • gaining access to your system resources.
    • checking out the mechanism of attacks against other systems.
    • Negative
  • 5. Hacker's Motivations
    • Fun
    • Profit
    • Extortion
    • Technical Reputation
    • Scorekeeping
    • Revenge/maliciousness
    • Intellectual Challenges
    • Desire to embarrass
    • Experimentation
    • Self Gratification
    • Problem Solving
    • Exposing System Weakness
    • Want to be Hero of Wild Internet
  • 6. Types of hacker’s
    • Professional hackers
      • White Hats – Professional Security Experts
      • Gray Hats – Unsuspecting Users
    • Script kiddies
      • Mostly kids/students- User tools created by black hats
    • Underemployed Adult Hackers
      • Former Script Kiddies
        • Can’t get employment in the field
        • Want recognition in hacker community
  • 7. Types Of Cracker’s
    • Professional hackers
      • Black Hats – the Bad Guys
    • Criminal Hackers
      • Real criminals, are in it for whatever they can get no matter who it hurts
    • Corporate Spies
      • Are relatively rare
    • Disgruntled Employees
      • Most dangerous to an enterprise as they are “insiders”
  • 8. Without Hackers,
    • Programming languages such as C and C++ would not exist
    • Operating Systems such as Unix and Linux would not exist
    • Microsoft might not been developed
    • Basically, no one would be designing new types of software
    • Antivirus Companies would not have became billionaire
  • 9. Without Crackers,
    • Security is thought of and efforts are put forward to making information more private
    • Free software is made available because of these people
    • These crackers create jobs for others to stop them
    • Since home users are more vulnerable with less security they are an easy target for people to hack into for fun
    • Software developers improve their software
  • 10. Attack Methodology
    • The Beginning – Goal : Decide why this system should be attacked.
    • Steps :-
      • Gather the Information about the victim hosts
      • Locate the victim hosts by some scanning program
      • Identify the victim host vulnerability
      • Attack the victim host via this vulnerability
      • Establish backdoors for later access
  • 11. Some Common Attacks
    • Social engineering
      • Pretexting
      • Phishing
      • Dumpster diving
    • Dos(Denial Of Service)
    • POD(Ping Of Death)
    • SQL Injection
  • 12. Once inside, the hacker can...
    • Modify logs
      • To cover their tracks
      • To mess with you
    • Steal files
      • Sometimes destroy after stealing
      • A pro would steal and cover their tracks so to be undetected
    • Modify files
      • To let you know they were there
      • To cause mischief
    • Install back doors
      • So they can get in again
    • Attack other systems
  • 13. Question Is Hacking healthy to the computer industry?