Hacking Kishor
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,227
On Slideshare
1,226
From Embeds
1
Number of Embeds
1

Actions

Shares
Downloads
66
Comments
0
Likes
1

Embeds 1

http://www.slideshare.net 1

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Hacking & Cracking
  • 2. Understand The difference
    • hackers build things,
    • crackers break them
  • 3. HACKER
    • A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    • One who programs enthusiastically (even obsessively) or who enjoys programming rather than simply theorizing about programming.
    • Positive
  • 4. CRACKER
    • A Hacker who use his skill for illegal purpose.
    • gaining access to your system resources.
    • checking out the mechanism of attacks against other systems.
    • Negative
  • 5. Hacker's Motivations
    • Fun
    • Profit
    • Extortion
    • Technical Reputation
    • Scorekeeping
    • Revenge/maliciousness
    • Intellectual Challenges
    • Desire to embarrass
    • Experimentation
    • Self Gratification
    • Problem Solving
    • Exposing System Weakness
    • Want to be Hero of Wild Internet
  • 6. Types of hacker’s
    • Professional hackers
      • White Hats – Professional Security Experts
      • Gray Hats – Unsuspecting Users
    • Script kiddies
      • Mostly kids/students- User tools created by black hats
    • Underemployed Adult Hackers
      • Former Script Kiddies
        • Can’t get employment in the field
        • Want recognition in hacker community
  • 7. Types Of Cracker’s
    • Professional hackers
      • Black Hats – the Bad Guys
    • Criminal Hackers
      • Real criminals, are in it for whatever they can get no matter who it hurts
    • Corporate Spies
      • Are relatively rare
    • Disgruntled Employees
      • Most dangerous to an enterprise as they are “insiders”
  • 8. Without Hackers,
    • Programming languages such as C and C++ would not exist
    • Operating Systems such as Unix and Linux would not exist
    • Microsoft might not been developed
    • Basically, no one would be designing new types of software
    • Antivirus Companies would not have became billionaire
  • 9. Without Crackers,
    • Security is thought of and efforts are put forward to making information more private
    • Free software is made available because of these people
    • These crackers create jobs for others to stop them
    • Since home users are more vulnerable with less security they are an easy target for people to hack into for fun
    • Software developers improve their software
  • 10. Attack Methodology
    • The Beginning – Goal : Decide why this system should be attacked.
    • Steps :-
      • Gather the Information about the victim hosts
      • Locate the victim hosts by some scanning program
      • Identify the victim host vulnerability
      • Attack the victim host via this vulnerability
      • Establish backdoors for later access
  • 11. Some Common Attacks
    • Social engineering
      • Pretexting
      • Phishing
      • Dumpster diving
    • Dos(Denial Of Service)
    • POD(Ping Of Death)
    • SQL Injection
  • 12. Once inside, the hacker can...
    • Modify logs
      • To cover their tracks
      • To mess with you
    • Steal files
      • Sometimes destroy after stealing
      • A pro would steal and cover their tracks so to be undetected
    • Modify files
      • To let you know they were there
      • To cause mischief
    • Install back doors
      • So they can get in again
    • Attack other systems
  • 13. Question Is Hacking healthy to the computer industry?