Hacking

1,294 views

Published on

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,294
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
28
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Hacking

  1. 1. HACKING Presented by: Harendra Singh MCA
  2. 2. INTRODUCTION  THE PROCESS OF ATTEMPTING TO GAIN OR SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO COMPUTER RESOURCES FOR THE PURPOSE OF HELP OR SECURE SYSTEM IS CALLED HACKING  HACKING IS TECHNIQUE IN WHICH ANY ONE CAN ACESS ANY ONE’S COMPUTER WITHOUT HIS PERMISSION  THE PERSON WHO IS DOING THIS TYPE OF WORK IS CALLED HACKER
  3. 3. HISTORY OF HACKING  1966 – ROBERT MORRIS INTRODUCES THE CONCEPT OF SAFE HACKING.  1969 – DEVELOPMENT IN THE FIELD OF HACKING.  1990 – ELECTRONIC FRONTIER FOUNDATION WAS FOUNDED.  1995 – MARK ANDREESSON & ERIC RELEASE MOSAIC.
  4. 4. WHO IS HACKER?  HACKER IS NOT CYBER CRIMINAL BUT HE IS THE VERY INTELLIGENT PERSON WHO IS USE HIS KNOWLEDGE IN CONSTRUCTIVE MANNER TO SECURE SYSTEM & NEVER DAMAGE DATA  HE KNOW ALL ABOUT THE OPERATING SYSTEM & DIFFERENT HOLES IN THE SYSTEM
  5. 5. WHO IS CRACKER?  PERSON WHO ENTER INTO OTHER’S SYSTEM AND VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE HAVOC IS CALLED CRACKER  CRACKER IS CYBER CRIMINAL  THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR ACTIONS ARE MALICIOUS
  6. 6. WHY DO CRACKERS EXIST?  CRACKERS ARE EXIST BECAUSE HUMAN NATURE IS JUST SO,FREQUENTLY DRIVEN BY TO DESTROY INSTEAD OF CREAT  THEY ARE USE FOR DIFFERENT PURPOSE LIKE FOR PROFIT,SOME COMPANY USE THEM FOR DISABLE THE COMPITITOR COMPANY,FOR CRACKS CREDIT CARD NUMBER
  7. 7. DIFFERENCE BETWEEN HACKER & CRACKER HACKER CRACKER  HACKER’S PROGRAMS TO CHECK INTIGRITY OF OTHER PROGRAMS.THUS WHEN HACKER CREATE PROGRAM IT AUTOMATICALLY CHECK REMOTE MACHINE SECURITY STRUCTURE  CRACKERS RARELY MAKE THEIR OWN PROGRAM .INSTEAD ,THEY STEAL TOOL,PROGRAMS FROM OTHERS  THEY ALWAYS DO CONTRUCTIVE WORK  CRACKERS CREATES NOTHING & DESTROY MUCH
  8. 8. WHICH OPERATING SYSTEM HACKER USE ?  SUN  UNIX  MICROSOFT
  9. 9. SUN  HACKERS USING EITHER SOLARIC X86 OR SCO AS A PLATFORM.  THIS IS BECAUSE THESE PRODUCTS ARE LICENSE WARE & THEY CAN EASILY BE OBTAINED.
  10. 10. UNIX  POPULAR PLATFORM BECAUSE THEY REQUIRED A LOW OVERHEAD.  WE CAN RUN LINUX ON A PALTRAY 386 AND GAIN GOOD PERFORMANCE.  THIS IS REASONABLE.
  11. 11. MICROSOFT  THIS SUPPORTS MANY SECURITY TOOLS THAT CAN BE USED TO ATTACK REMOTE MACHINE.  IT HAS ADVANCED TOOLS FOR NETWORKING AS WELL.
  12. 12. WHY DO PEOPLE HACK ?  JUST FOR FUN.  SHOW OF THEIR KNOWLEDGE.  HACK OTHER SYSTEM SECRETLY.  DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.  FOR PROFIT PEOPLE PAYS A CRACKER.  CRACK FOR SAKE OF CURIOCITY.
  13. 13. THE PSYCOLOGY OF HACKERS  ALL INFORMATION SHOULD BE FREE.  ACCESS TO COMPUTER SHOULD BE UNLIMITED AND FREE.  IT CAN CHANGE LIFR FOR BETTER.  IT CAN CREATE BEAUTY ON COMPUTER.
  14. 14. TYPES OF HACKING  THERE ARE MANY TYPES OF HACKING LIKE • PASSWORD HACKING • SOFTWARE HACKING • NET HACKING
  15. 15. PASSWORD HACKING  TWO TYPES 1. BRUTE FORCE • IN THAT CASE HACKERS TRY OUT ALL THE COMBINATION OF ALL KEYBOARD LETTERS .IT HAS GRATER SUCCESS BUT IT TAKES LONG TIME 2. DICTIONARY BASED • IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS UNSUCCESSFUL METHOD
  16. 16. SOFTWARE HACKING  IN THAT HACKERS CHANGES THE LOOK & EXCUTION WAY OF THAT SOFTWARE  CHANG THE DEMO VERSION INTO FULL VERSION BY DECODE THE SOURCE CODE
  17. 17. IP ADDRESS  IP ADDRESS IS THE ADDRESS OF YOUR COMPUTER IN THE INTERNET  IT IS UNIQ  LIKE 192.168.23.45
  18. 18. PORT  IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR COMPUTER  IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER CAN ENTER  THERE ARE THOUSANDS OF PORTS INTO COMPUTER  THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT  LIKE PORT 21 : FTP PORT 23 : TELNET PORT 80 : HTTP PORT 25 : MAIL
  19. 19. HACKING TOOLS THERE ARE MANY TOOLS ARE AVILABLE: • • • • SCANNERS TELNET FTP LAN WATCH
  20. 20. SCANNERS  IT IS NOT A PHOTO SCANNER  SCANNER IS PROGRAM THAT AUTOMATICALLY DETECTS SECURITY WEAKNESS IN REMOTE HOST  PORT SCANNERS ARE USE IN HACKING  PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN PORT ON THAT SYSTEM AND WHICH SERVICE IS RUNNING ON THAT  IT CAN USE ALMOST ALL OPERATING SYSTEM  EX. SATAN,NMAP
  21. 21. TELNET  TELNET IS ALTIMATE HACKING TOOL  IT IS TERMINAL EMULATION PROGRAM THAT ALLOW US TO CONNECT TO REMOTE SYSTEM  YOU HAVE TO FOLLOW THIS STEP TO USE TELNET C:WINDOWSTELNET [IP ADDRESS] PORT
  22. 22. FTP  FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS USE AS HACKING TOOL  PORT 21 FOR THE FTP  FOR CONNECTING FTP WE NEED SOME FTP S/W KNOWN AS FTP CLIENT  FOR CONNECTING FTP SERVER YOU HAVE TO HAMMERING THAT SERVER  COMMAND: C:WINDOWSFTP [IP ADDRESS]:PORT
  23. 23. LAN WATCH  LAN WATCH IS A SOFTWARE WHICH NOT ATTACK AND NOT DAMAGE REMOTE NETWORK  BUT IT KEEP WATCH ON THE REMOTE NETWORK & GIVE ALL THE INFORMATION WHAT IS GOING ON THAT NETWORK
  24. 24. ATTACKS THERE ARE MANY TYPES OF ATTACKS: • • • • • • SPOOFING ATTACK TELNET BASED ATTACK DOS (Daniel of service) ATTACK PING OF DEATH DISTRIBUTED DOS ATTACK MAILBOMBS
  25. 25. NEED FOR SECURITY SOME EXELLENT SOFTWARE CAN PROVIDE YOU BEST SECURITY LIKE: • TROJAN • FIREWALL
  26. 26. TROJAN  WINDOWS TROJANS ARE SMALL ASPECT OF WINDOWS SECURUTY  TROJAN IS UNOTHORIZED PROGRAM CONTAINED WITHIN A LEGIMATE PROGRAM  THIS PROGRAM PERFORMS FUNCTION UNKNOWN BY USER
  27. 27. FIREWALL FIREWALL IS ANY DEVICE USED TO PREVENT OUTSIDERS FROM GAINING ACCESS TO YOUR NETWORK TYPES OF FIREWALLS: • PACKET FILTER • APPLICATION PROXY • PACKET INSPECTION
  28. 28. CONCLUSION

×