Hacking Kishor
Upcoming SlideShare
Loading in...5

Hacking Kishor






Total Views
Views on SlideShare
Embed Views



1 Embed 1

http://www.slideshare.net 1


Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Hacking Kishor Hacking Kishor Presentation Transcript

    • Hacking & Cracking
    • Understand The difference
      • hackers build things,
      • crackers break them
    • HACKER
      • A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
      • One who programs enthusiastically (even obsessively) or who enjoys programming rather than simply theorizing about programming.
      • Positive
      • A Hacker who use his skill for illegal purpose.
      • gaining access to your system resources.
      • checking out the mechanism of attacks against other systems.
      • Negative
    • Hacker's Motivations
      • Fun
      • Profit
      • Extortion
      • Technical Reputation
      • Scorekeeping
      • Revenge/maliciousness
      • Intellectual Challenges
      • Desire to embarrass
      • Experimentation
      • Self Gratification
      • Problem Solving
      • Exposing System Weakness
      • Want to be Hero of Wild Internet
    • Types of hacker’s
      • Professional hackers
        • White Hats – Professional Security Experts
        • Gray Hats – Unsuspecting Users
      • Script kiddies
        • Mostly kids/students- User tools created by black hats
      • Underemployed Adult Hackers
        • Former Script Kiddies
          • Can’t get employment in the field
          • Want recognition in hacker community
    • Types Of Cracker’s
      • Professional hackers
        • Black Hats – the Bad Guys
      • Criminal Hackers
        • Real criminals, are in it for whatever they can get no matter who it hurts
      • Corporate Spies
        • Are relatively rare
      • Disgruntled Employees
        • Most dangerous to an enterprise as they are “insiders”
    • Without Hackers,
      • Programming languages such as C and C++ would not exist
      • Operating Systems such as Unix and Linux would not exist
      • Microsoft might not been developed
      • Basically, no one would be designing new types of software
      • Antivirus Companies would not have became billionaire
    • Without Crackers,
      • Security is thought of and efforts are put forward to making information more private
      • Free software is made available because of these people
      • These crackers create jobs for others to stop them
      • Since home users are more vulnerable with less security they are an easy target for people to hack into for fun
      • Software developers improve their software
    • Attack Methodology
      • The Beginning – Goal : Decide why this system should be attacked.
      • Steps :-
        • Gather the Information about the victim hosts
        • Locate the victim hosts by some scanning program
        • Identify the victim host vulnerability
        • Attack the victim host via this vulnerability
        • Establish backdoors for later access
    • Some Common Attacks
      • Social engineering
        • Pretexting
        • Phishing
        • Dumpster diving
      • Dos(Denial Of Service)
      • POD(Ping Of Death)
      • SQL Injection
    • Once inside, the hacker can...
      • Modify logs
        • To cover their tracks
        • To mess with you
      • Steal files
        • Sometimes destroy after stealing
        • A pro would steal and cover their tracks so to be undetected
      • Modify files
        • To let you know they were there
        • To cause mischief
      • Install back doors
        • So they can get in again
      • Attack other systems
    • Question Is Hacking healthy to the computer industry?