Your SlideShare is downloading. ×
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Basic Introduction to hacking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Basic Introduction to hacking

653

Published on

How to be a real hacker? …

How to be a real hacker?
hacking is not a child play.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
653
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
53
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. What is hacking?
  • 2. Contents (1) Who is hacker? Types of hacking Why do hackers hack? Hacking demo on a live website Some hacked passwords What hackers do after hacking? What do hackers know?
  • 3. Who is hacker? (1) Hack   Cut with repeated irregular blows Examine something very minutely Hacker  The person who hacks Cracker  System intruder/destroyer
  • 4. Who is hacker? (2) Hacker means cracker nowadays  Meaning has been changed
  • 5. Types of hackers 1)White hat 2)Gray hat 3)Black hat
  • 6. Types of hacking Normal data transfer Interruption Modification Interception
  • 7. Types of hacking key logging Sniffing Man in the middle Session hijacking Social engineering System hacking Dos, Ddos Session hijacking Sql injection and many more.
  • 8. Why do hackers hack? Just for fun Show off To clarify the doubts in relationship Notify many people their thought Steal important information Destroy enemy’s computer network during the war To earn money
  • 9. What do hackers do after hacking? (1) Patch security hole  The other hackers can’t intrude Clear logs and hide themselves Install rootkit ( backdoor )   The hacker who hacked the system can use the system later It contains trojans.
  • 10. What do hackers do after hacking? (2) Install exploit program Install denial of service program Use all of installed programs silently
  • 11. How can be a real hacker? Study C/C++/assembly language Study computer architecture Study operating system Study computer network Examine the hacking tools for a month Think the problem of the computer
  • 12. Why can’t we defend against hackers? There are many unknown security hole Hackers need to know only one security hole to hack the system Admin need to know all security holes to defend the system
  • 13. How to protect the system? (1) Patch security hole often Encrypt important data Do not run unused daemon Setup loghost Use firewalls Backup the system often
  • 14. Deep freeze Download deepfreeze and install it and later restart the system
  • 15. What to do after hacked? Shutdown the system Remove the network cable Restore the system with the backup  Or reinstall all programs Connect the system to the network
  • 16. How to translate the hackers’ language (1) 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x
  • 17. How to translate the hackers’ language (2) Ex)  1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1 h4ck3d 1n  I did not hack this page, it was like this when I hacked in

×