Hacking refers to exploiting security flaws to obtain personal information without permission. There are different types of hackers with varying intentions - some hack just for fun or to learn, while others seek to steal information or damage systems. A hacker's skills may include intruding networks, crashing systems, and using exploitation programs. To protect against hacking, system administrators should patch security holes, encrypt data, remove unnecessary programs/users, set up firewalls and intrusion detection, and backup systems regularly.
2. What is Hacking
Hacking refers to the activities which are done to intrude someone else’s personal
information so as to use it for malicious,unwanted purpose
OR
Hacking is a term which refer to the activities aimed to exploiting security amind to
exploiting security flaws to obtain personal information for gaining access to secured
network
3. Overview of Hacking
● Hack
➔ The rapid crafting of a new program or the making of changes to
existing,usually complicated software
● Hacker
➔ The Person who hacks
● Cracker
➔ System destroyer
4. Contents
● Who is hacker
● History of Hacking
● Types of Hacking
● Hacking accidents
● Why do hacker hack ?
● What hacker do after hacking ?
● What do hacker know ?
5. Who is hacker ?
● Hack
○ Cut with repeated irregular blows
○ Examine something very minutely
● Hacker
○ The person who hacks
● Cracker
○ System intruder/destroyer
● Hacker means cracker now days
○ Meaning has been changed
6. What is Hacker
A Hacker is someone who likes to tinker with electronics
computer system.Hacker like to explore and learn how computer
system work,finding ways to make them do what they do
better,or do things they weren’t intended to do Hcakers
7. History of Hacking
● 1960-1970
○ Good hack especially clever program code
● 1970-1990
○ Breaking in to computer became very easy
● 1990-present
○ www.developed & internet grow exponentially
○ Hacking can be writing a program for enjoyment
○ Hacking can also be done to perform reverse engineering of software where source code is lost
9. Hacking Accidents
● Internet Worm
○ Robert T.Morris made an internet worm.It spread through the internet and crashed about 6000
system
● IP Spoof
○ Kevin Mitnick was caught by TSutomu Shimomura who was security expert.Kelvin uses the IP
Spoof attack in this accident
○ Internet Worm
● Cuckoo’s Egg
○ Clifford stoll caught the hacker who are the German hacker applied by KGB
10. Why do Hacker Hack?
● Just for fun
● Show off
● Hack other system secretly
● Notify many people their thought
● Steal important information
● Destroy enemy's computer network during the war
11. What do the Hacker do after hacking
● Patch security hole
○ The other hacker can’t intrude
● Clear logs and hide themselves
● Install rootkit(backdoor)
○ The hacker who hacked the system can use the system later
○ It consist trojan ls,ps and so on
● Install irc related program
○ identd ,irc,bitchx.eggdrop.bnc
● Install exploit porgram
● Install denial of service program
● Use all installed programs silently
12. What do Hacker Know
● Know how to intrude the system
● Know to crash the system
● Know where the hacking program are
13. How can protect the system ?
● Patch security hole often
● Encrypted important data
○ Ex:- pgp.ssh
● Do not run unused daemon Remove unused demon
● Remove unused setuid/setuid program
● Setup loghost
● Use switch hub
● Setup firewall
○ Ex ipchains
● Setup IDS
○ Ex:- snort
15. What should do after hacked
● Shutdown the system
● Separate the system from network
● Restore the system with the backup
● Connect the system to the network
● It can be good to call the police
16. Thank You
If you have any question please don't feel hesitate to ask!
Shubham Choudhary