SlideShare a Scribd company logo
1 of 13
Introduction to hacking
What Is Hacking ?
A Hacking Is An Technique Which Goes Into The
Depths Of Any System, And Tries To Understand How
Things Actually Work, Not Just The Thing Which Runs
A Bunch Of Scripts From The Internet To Try And
Break Into Systems.
Hacking And Computers The Concept Of Hacking
Entered The Computer Culture At The MIT University
In The 1960s. There Are THREE Kinds Of Hackers
Who Give Accomplish The Task HACKING
Security
With Hacking, the concept comes
that is Security.


“Most Secured System”
• A system with power cable removed and sealed inside
  a many inch thick wall is also not a complete secure
  system
• This whole concept of secured system in itself is a
  flawed concept.
Common Causes of Security failure

IGNORANCE
IGNORANCE
IGNORANCE
IGNORANCE
IGNORANCE
Types Of Attack
•   DoS
•   PoD
•   DDoS
•   SYN Flood
•   UDP
•   Sql injection
Sql Injection Now a days this attack
 method is   HOT
Reason???
• increase in the use of database.
• A lot more increase in ignorant and novice
  programmers.
• And start using of LINUX
Next is Trojan Attacks
   Trojans : act as a RAT or Remote Administration Tool, which
    allow remote control and remote
    access to the attacker.

    Working:

    1. The Server Part of the Trojan is installed on the target
       system through trickery or disguise.

    2. This server part listens on a predefined port for
       connections.

    3. The attacker connects to this Server Part using the Client
       part of the Trojan on the predefined port number.

    4. Once this is done, the attacker has complete control over
       the target system.
Basic Hacking Skills
Learn how to program.
 This, of course, is the fundamental
 hacking skill. If you don't know any
 computer languages, you cant do hacking.

Get one of the open-source Unix's and learn to use and run
 it
  The single most important step any newbie can take towards
 acquiring hacker skills is to get a copy of Linux or one of the
 BSD-Unix’s, install it on a personal machine, and run it.

Learn how to use the World Wide Web and write HTML.
  To be worthwhile, your page must have content -- it must be
 interesting and/or useful to other hackers.
Hacking Premeasured
 When you start hacking the first thing you need to do is:
  to make sure the victim will not find out
   your real identity.

 So hide your IP by masking it or using a anonymous
  proxy server. This is only effective when the victim
  has no knowledge about computers and internet.
  Organizations like the F.B.I, C.I.A and such will find you in no
 time, so beware !

 The best thing to do is using a dialup connection that has a
 variable IP address. Be smart, when you signup for a internet dialup
 connection use a fake name and address.

 When hacking never leave traces of your hacking attempts, clear
 log files and make sure you are not monitored. So use a good
 firewall that keeps out retaliation hacking attempts of your victim.
Famous Hackers in History




 Ian Murphy      Kevin Mitnick   Johan Helsinguis




Linus Torvalds   Mark Abene       Robert Morris
Questions & Comments
Thank you
Made by: milind   mishra

More Related Content

What's hot

Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationLaura Platt
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information securityJayanth Vinay
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Web defacement
Web defacementWeb defacement
Web defacementstudent
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hackingnitish mehta
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!EMBplc.com
 

What's hot (19)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Hacking
HackingHacking
Hacking
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Web defacement
Web defacementWeb defacement
Web defacement
 
New internet security
New internet securityNew internet security
New internet security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
internet security
internet securityinternet security
internet security
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hacking
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 

Similar to Hacking intro

Similar to Hacking intro (20)

Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
31.ppt
31.ppt31.ppt
31.ppt
 
31.ppt
31.ppt31.ppt
31.ppt
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
hacking
hackinghacking
hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Hacking
HackingHacking
Hacking
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 

Hacking intro

  • 1.
  • 2. Introduction to hacking What Is Hacking ? A Hacking Is An Technique Which Goes Into The Depths Of Any System, And Tries To Understand How Things Actually Work, Not Just The Thing Which Runs A Bunch Of Scripts From The Internet To Try And Break Into Systems. Hacking And Computers The Concept Of Hacking Entered The Computer Culture At The MIT University In The 1960s. There Are THREE Kinds Of Hackers Who Give Accomplish The Task HACKING
  • 3.
  • 4. Security With Hacking, the concept comes that is Security. “Most Secured System” • A system with power cable removed and sealed inside a many inch thick wall is also not a complete secure system • This whole concept of secured system in itself is a flawed concept.
  • 5. Common Causes of Security failure IGNORANCE IGNORANCE IGNORANCE IGNORANCE IGNORANCE
  • 6. Types Of Attack • DoS • PoD • DDoS • SYN Flood • UDP • Sql injection
  • 7. Sql Injection Now a days this attack method is HOT Reason??? • increase in the use of database. • A lot more increase in ignorant and novice programmers. • And start using of LINUX
  • 8. Next is Trojan Attacks  Trojans : act as a RAT or Remote Administration Tool, which allow remote control and remote access to the attacker. Working: 1. The Server Part of the Trojan is installed on the target system through trickery or disguise. 2. This server part listens on a predefined port for connections. 3. The attacker connects to this Server Part using the Client part of the Trojan on the predefined port number. 4. Once this is done, the attacker has complete control over the target system.
  • 9. Basic Hacking Skills Learn how to program. This, of course, is the fundamental hacking skill. If you don't know any computer languages, you cant do hacking. Get one of the open-source Unix's and learn to use and run it The single most important step any newbie can take towards acquiring hacker skills is to get a copy of Linux or one of the BSD-Unix’s, install it on a personal machine, and run it. Learn how to use the World Wide Web and write HTML. To be worthwhile, your page must have content -- it must be interesting and/or useful to other hackers.
  • 10. Hacking Premeasured  When you start hacking the first thing you need to do is: to make sure the victim will not find out your real identity.  So hide your IP by masking it or using a anonymous proxy server. This is only effective when the victim has no knowledge about computers and internet. Organizations like the F.B.I, C.I.A and such will find you in no time, so beware !  The best thing to do is using a dialup connection that has a variable IP address. Be smart, when you signup for a internet dialup connection use a fake name and address.  When hacking never leave traces of your hacking attempts, clear log files and make sure you are not monitored. So use a good firewall that keeps out retaliation hacking attempts of your victim.
  • 11. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis Linus Torvalds Mark Abene Robert Morris
  • 13. Thank you Made by: milind mishra