Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
HACKING  ANDCRACKING   BY:   Deepak Dedha   Vanketesh Mishra   Aayush Yadav
Objectives of Hacking and Cracking What is Hacking? Difference between Hacking and  cracking Types of Hackers Types of...
HACKING Authorized  or Unauthorized  attempts to bypass the security  mechanisms of an information  systems or network I...
Why do people hack ?   Just for fun   Hack other systems secretly   Notify many people their thought   Steal important...
Literal Definitions  Hacker :           Someone who uses hacks.  Cracker :          some one who destructs things.  Hacks ...
Types of Hackers
White-hat Hackers   The good guys who identify the    security weakness of the system or    network and inform the owner ...
Black Hat Hackers       A black hat is the villain or bad guy, who crash into victim‟s security to steal information and d...
Grey hat HackersA grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and bla...
PretextingPhishing
 Pretexting:             Pretexting is the act of creating and using an invented scenario to persuade a target to release...
Language of hackers1 -> i or l   || -> n3 -> e        |/| -> m4 -> a        s -> z7 -> t              z -> s9 -> g        ...
Example:1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1swh3|| 1 h4ck3d 1nI did not hack this page, it was like thiswhen I hacked...
World famous hackers Stephen    Wozniac   Tsutomu    Shimomura
 Kevin   Mitnick Kevin   Poulsen
Random Fact !!!! The average age group of hackers are aged between 14-24 yrs. …
Did you know ? Socialnetworking sites like „FACEBOOK‟, ‟GMAIL‟, ‟YAHOO” comprised of 60% of direct or indirect hacking in...
Most popular virus Links  involving private pictures  of celebrities. Links showing pictures of  famous personalities li...
Another popular scamFacebook lottery scam.
Preventive measures   Install a strong anti-virus   Always run a anti-virus check before you    download a program or a ...
How to become HackerThe best approach is to gain as muchknowledge about stuff as you can.Good command over C / C++ / Perl ...
Some Examples of CrackingWindows    Cracking   1).BIOS Password Breaking   2).Windows LogonPassword Breaking
Bios password breakingWe can break BIOS password in any one of the following ways:Trying default passwordHardware approach
Trying default passwords            some default BIOS passwords             Lkwpeter  AMI                         cmos   ...
Hardware approach If the default passwords did not work,  then try to reset the Bios to its default  settings so that it ...
Window log on password         breaking   To hack windows login password, reboot and wait for the message:     When we se...
Easy and Simple approach                    On many computers a series of keystrokes may crash the password program.     k...
Hacking and cracking
Hacking and cracking
Hacking and cracking
Hacking and cracking
Hacking and cracking
Upcoming SlideShare
Loading in …5
×

Hacking and cracking

659 views

Published on

  • Be the first to comment

Hacking and cracking

  1. 1. HACKING ANDCRACKING BY: Deepak Dedha Vanketesh Mishra Aayush Yadav
  2. 2. Objectives of Hacking and Cracking What is Hacking? Difference between Hacking and cracking Types of Hackers Types of Hacking Techniques Preventive measures Some Cracking Examples
  3. 3. HACKING Authorized or Unauthorized attempts to bypass the security mechanisms of an information systems or network In simple words Hacking means finding out weaknesses in a computer or computer network
  4. 4. Why do people hack ? Just for fun Hack other systems secretly Notify many people their thought Steal important information Destroy enemy’s computer network
  5. 5. Literal Definitions Hacker : Someone who uses hacks. Cracker : some one who destructs things. Hacks : A different approach with some significant advantage over the current approach
  6. 6. Types of Hackers
  7. 7. White-hat Hackers The good guys who identify the security weakness of the system or network and inform the owner about them
  8. 8. Black Hat Hackers A black hat is the villain or bad guy, who crash into victim‟s security to steal information and destroy the victims security network.
  9. 9. Grey hat HackersA grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers
  10. 10. PretextingPhishing
  11. 11.  Pretexting: Pretexting is the act of creating and using an invented scenario to persuade a target to release information (e.g. date of birth, Social Security Number, last bill amt.) Phishing: Phishing is an e-mail fraud method in which the perpetrator sends out email in an attempt to gather personal and financial information from recipients. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details .Ebay and PayPal are two of the most targeted companies, and online banks are also common targets
  12. 12. Language of hackers1 -> i or l || -> n3 -> e |/| -> m4 -> a s -> z7 -> t z -> s9 -> g f -> ph0 -> o$ -> s ph -> f| -> i or l x -> ck ck -> x
  13. 13. Example:1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1swh3|| 1 h4ck3d 1nI did not hack this page, it was like thiswhen I hacked in.
  14. 14. World famous hackers Stephen Wozniac Tsutomu Shimomura
  15. 15.  Kevin Mitnick Kevin Poulsen
  16. 16. Random Fact !!!! The average age group of hackers are aged between 14-24 yrs. …
  17. 17. Did you know ? Socialnetworking sites like „FACEBOOK‟, ‟GMAIL‟, ‟YAHOO” comprised of 60% of direct or indirect hacking incidents.
  18. 18. Most popular virus Links involving private pictures of celebrities. Links showing pictures of famous personalities like videos of Osama Bin Laden‟s killing.
  19. 19. Another popular scamFacebook lottery scam.
  20. 20. Preventive measures Install a strong anti-virus Always run a anti-virus check before you download a program or a file from the internet. Avoid disclosing personal details like phone number, credit card details to strangers. A good firewall (Sygate personal) A good spy ware / Trojan buster. Use of genuine software
  21. 21. How to become HackerThe best approach is to gain as muchknowledge about stuff as you can.Good command over C / C++ / Perl willdefinitely help.But above all you need a good logicalbrain.
  22. 22. Some Examples of CrackingWindows Cracking 1).BIOS Password Breaking 2).Windows LogonPassword Breaking
  23. 23. Bios password breakingWe can break BIOS password in any one of the following ways:Trying default passwordHardware approach
  24. 24. Trying default passwords  some default BIOS passwords Lkwpeter AMI cmos j262 Award AMI!SW1 AWARD_SW bios AMI? SW1 AWARD_PW BIOS password Biostar setup hewittrand„j262‟ opens most version of Award bios; it works about 80 per cent of the time
  25. 25. Hardware approach If the default passwords did not work, then try to reset the Bios to its default settings so that it asks for no password at all. Procedure for hardware approach is as follows First, we have to open the computer and then look for a round lithium battery, it probably looks like a silver coin. So, remove the battery and after 30 seconds or so put it back.
  26. 26. Window log on password breaking To hack windows login password, reboot and wait for the message: When we see the boot menu on the screen, press F2 or F12 before “Starting Windows 9x…” . The boot menu will come up. Select option to boot into DOS . C:>cd windows C:windows>ren *.pwl *.xyz // RENAME Or delete them by typing C:windows>del *.pwl *.xyz //DELETE
  27. 27. Easy and Simple approach On many computers a series of keystrokes may crash the password program. keep pressing ESC 15 to 20 times . This will result in the crashing of the password program and the computer will continue booting .BY BOOTING We can break into a computer by using live tools like conboot live cd which are readly available on internet .The live cd can be used to make a bootable pen drive and then we can break into any computer.

×