Hacking Kishor
Upcoming SlideShare
Loading in...5
×
 

Hacking Kishor

on

  • 1,199 views

 

Statistics

Views

Total Views
1,199
Views on SlideShare
1,198
Embed Views
1

Actions

Likes
1
Downloads
66
Comments
0

1 Embed 1

http://www.slideshare.net 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Hacking Kishor Hacking Kishor Presentation Transcript

  • Hacking & Cracking
  • Understand The difference
    • hackers build things,
    • crackers break them
  • HACKER
    • A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    • One who programs enthusiastically (even obsessively) or who enjoys programming rather than simply theorizing about programming.
    • Positive
  • CRACKER
    • A Hacker who use his skill for illegal purpose.
    • gaining access to your system resources.
    • checking out the mechanism of attacks against other systems.
    • Negative
  • Hacker's Motivations
    • Fun
    • Profit
    • Extortion
    • Technical Reputation
    • Scorekeeping
    • Revenge/maliciousness
    • Intellectual Challenges
    • Desire to embarrass
    • Experimentation
    • Self Gratification
    • Problem Solving
    • Exposing System Weakness
    • Want to be Hero of Wild Internet
  • Types of hacker’s
    • Professional hackers
      • White Hats – Professional Security Experts
      • Gray Hats – Unsuspecting Users
    • Script kiddies
      • Mostly kids/students- User tools created by black hats
    • Underemployed Adult Hackers
      • Former Script Kiddies
        • Can’t get employment in the field
        • Want recognition in hacker community
  • Types Of Cracker’s
    • Professional hackers
      • Black Hats – the Bad Guys
    • Criminal Hackers
      • Real criminals, are in it for whatever they can get no matter who it hurts
    • Corporate Spies
      • Are relatively rare
    • Disgruntled Employees
      • Most dangerous to an enterprise as they are “insiders”
  • Without Hackers,
    • Programming languages such as C and C++ would not exist
    • Operating Systems such as Unix and Linux would not exist
    • Microsoft might not been developed
    • Basically, no one would be designing new types of software
    • Antivirus Companies would not have became billionaire
  • Without Crackers,
    • Security is thought of and efforts are put forward to making information more private
    • Free software is made available because of these people
    • These crackers create jobs for others to stop them
    • Since home users are more vulnerable with less security they are an easy target for people to hack into for fun
    • Software developers improve their software
  • Attack Methodology
    • The Beginning – Goal : Decide why this system should be attacked.
    • Steps :-
      • Gather the Information about the victim hosts
      • Locate the victim hosts by some scanning program
      • Identify the victim host vulnerability
      • Attack the victim host via this vulnerability
      • Establish backdoors for later access
  • Some Common Attacks
    • Social engineering
      • Pretexting
      • Phishing
      • Dumpster diving
    • Dos(Denial Of Service)
    • POD(Ping Of Death)
    • SQL Injection
  • Once inside, the hacker can...
    • Modify logs
      • To cover their tracks
      • To mess with you
    • Steal files
      • Sometimes destroy after stealing
      • A pro would steal and cover their tracks so to be undetected
    • Modify files
      • To let you know they were there
      • To cause mischief
    • Install back doors
      • So they can get in again
    • Attack other systems
  • Question Is Hacking healthy to the computer industry?