This document provides an introduction to hacking, including definitions and types of hackers. It discusses the concept of security and common causes of security failures like ignorance. It outlines different types of attacks like DoS, PoD, DDoS, SYN Flood and SQL injection. SQL injection is discussed as a currently prevalent attack method due to increased database use and novice programmers. Trojan attacks and how they allow remote access are described. The document concludes by listing basic hacking skills, the importance of hiding one's identity when hacking, and providing examples of some famous hackers throughout history.
2. Introduction to hacking
What Is Hacking ?
A Hacking Is An Technique Which Goes Into The
Depths Of Any System, And Tries To Understand How
Things Actually Work, Not Just The Thing Which Runs
A Bunch Of Scripts From The Internet To Try And
Break Into Systems.
Hacking And Computers The Concept Of Hacking
Entered The Computer Culture At The MIT University
In The 1960s. There Are THREE Kinds Of Hackers
Who Give Accomplish The Task HACKING
3.
4. Security
With Hacking, the concept comes
that is Security.
“Most Secured System”
• A system with power cable removed and sealed inside
a many inch thick wall is also not a complete secure
system
• This whole concept of secured system in itself is a
flawed concept.
5. Common Causes of Security failure
IGNORANCE
IGNORANCE
IGNORANCE
IGNORANCE
IGNORANCE
7. Sql Injection Now a days this attack
method is HOT
Reason???
• increase in the use of database.
• A lot more increase in ignorant and novice
programmers.
• And start using of LINUX
8. Next is Trojan Attacks
Trojans : act as a RAT or Remote Administration Tool, which
allow remote control and remote
access to the attacker.
Working:
1. The Server Part of the Trojan is installed on the target
system through trickery or disguise.
2. This server part listens on a predefined port for
connections.
3. The attacker connects to this Server Part using the Client
part of the Trojan on the predefined port number.
4. Once this is done, the attacker has complete control over
the target system.
9. Basic Hacking Skills
Learn how to program.
This, of course, is the fundamental
hacking skill. If you don't know any
computer languages, you cant do hacking.
Get one of the open-source Unix's and learn to use and run
it
The single most important step any newbie can take towards
acquiring hacker skills is to get a copy of Linux or one of the
BSD-Unix’s, install it on a personal machine, and run it.
Learn how to use the World Wide Web and write HTML.
To be worthwhile, your page must have content -- it must be
interesting and/or useful to other hackers.
10. Hacking Premeasured
When you start hacking the first thing you need to do is:
to make sure the victim will not find out
your real identity.
So hide your IP by masking it or using a anonymous
proxy server. This is only effective when the victim
has no knowledge about computers and internet.
Organizations like the F.B.I, C.I.A and such will find you in no
time, so beware !
The best thing to do is using a dialup connection that has a
variable IP address. Be smart, when you signup for a internet dialup
connection use a fake name and address.
When hacking never leave traces of your hacking attempts, clear
log files and make sure you are not monitored. So use a good
firewall that keeps out retaliation hacking attempts of your victim.
11. Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis
Linus Torvalds Mark Abene Robert Morris