SlideShare a Scribd company logo
1 of 12
Lecture 18
HACKING (CONTINUED)
WHY DO PEOPLE HACK ?
JUST FOR FUN.
SHOW OF THEIR KNOWLEDGE.
HACK OTHER SYSTEM SECRETLY.
DESTROY ENEMY’S COMPUTER NETWORK
DURING THE WAR.
FOR PROFIT PEOPLE PAYS A CRACKER.
CRACK FOR SAKE OF CURIOCITY.
THE PSYCOLOGY OF HACKERS
ALL INFORMATION SHOULD BE FREE.
ACCESS TO COMPUTER SHOULD BE
UNLIMITED AND FREE.
IT CAN CHANGE LIFE FOR BETTER.
IT CAN CREATE BEAUTY ON COMPUTER.
TYPES OF HACKING
THERE ARE MANY TYPES OF HACKING
LIKE
• PASSWORD HACKING
• SOFTWARE HACKING
• NET HACKING
PASSWORD HACKING
 TWO TYPES
1. BRUTE FORCE
• IN THAT CASE HACKERS TRY OUT ALL THE
COMBINATION OF ALL KEYBOARD LETTERS .IT HAS
GRATER SUCCESS BUT IT TAKES LONG TIME
2. DICTIONARY BASED
• IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS
UNSUCCESSFUL METHOD
SOFTWARE HACKING
IN THAT HACKERS CHANGES THE LOOK &
EXCUTION WAY OF THAT SOFTWARE
 CHANG THE DEMO VERSION INTO FULL
VERSION BY DECODING THE SOURCE CODE
IP ADDRESS
IP ADDRESS IS THE ADDRESS OF YOUR
COMPUTER IN THE INTERNET
IT IS UNIQ
LIKE 192.168.23.45
PORT
 IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR
COMPUTER
 IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER
CAN ENTER
 THERE ARE THOUSANDS OF PORTS INTO COMPUTER
 THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT
 LIKE
PORT 21 : FTP
PORT 23 : TELNET
PORT 80 : HTTP
PORT 25 : MAIL
HACKING TOOLS
THERE ARE MANY TOOLS ARE AVILABLE
• SCANNERS
• TELNET
• FTP
• LAN WATCH
SCANNERS
 IT IS NOT A PHOTO SCANNER
 SCANNER IS PROGRAM THAT AUTOMATICALLY
DETECTS SECURITY WEAKNESS IN REMOTE HOST
 PORT SCANNERS ARE USED IN HACKING
 PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN
PORT ON THAT SYSTEM AND WHICH SERVICE IS
RUNNING ON THAT
 IT CAN USE ALMOST ALL OPERATING SYSTEM
 EX. SATAN,NMAP
TELNET
TELNET IS ULTIMATE HACKING TOOL
 IT IS TERMINAL EMULATION PROGRAM THAT
ALLOWS US TO CONNECT TO REMOTE SYSTEM
 YOU HAVE TO FOLLOW THIS STEP TO USE
TELNET
C:WINDOWSTELNET [IP ADDRESS] PORT
FTP
 FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS
USED AS HACKING TOOL
 PORT 21 FOR THE FTP
 FOR CONNECTING FTP WE NEED SOME FTP S/W
KNOWN AS FTP CLIENT
 FOR CONNECTING FTP SERVER YOU HAVE TO
HAMMER THAT SERVER
 COMMAND:
C:WINDOWSFTP [IP ADDRESS]:PORT

More Related Content

What's hot

Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-statesSecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-statesMikko Hypponen
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical HackingVamshi TG
 
Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer securitySoundaryaB2
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and securityAhmad El Tawil
 
Cyber security review paper
Cyber security review paperCyber security review paper
Cyber security review paperMaheshSwami19
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwarePro Mrkt
 
Umbrella roaming-customer-facing
Umbrella roaming-customer-facingUmbrella roaming-customer-facing
Umbrella roaming-customer-facingRicardo Mendizabal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingdjkhatri
 

What's hot (20)

My presentation
My presentationMy presentation
My presentation
 
Hacking
HackingHacking
Hacking
 
Network Security
Network SecurityNetwork Security
Network Security
 
Hacking
HackingHacking
Hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-statesSecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical Hacking
 
Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer security
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and security
 
Cyber security review paper
Cyber security review paperCyber security review paper
Cyber security review paper
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Ps1
Ps1Ps1
Ps1
 
Network security
Network securityNetwork security
Network security
 
Hacking final
Hacking finalHacking final
Hacking final
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer Malware
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Umbrella roaming-customer-facing
Umbrella roaming-customer-facingUmbrella roaming-customer-facing
Umbrella roaming-customer-facing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Viewers also liked (20)

PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 
Materi ajar eksponensial
Materi ajar eksponensialMateri ajar eksponensial
Materi ajar eksponensial
 
Arm
Arm Arm
Arm
 
Silabus eksponen
Silabus eksponenSilabus eksponen
Silabus eksponen
 
Welcome
WelcomeWelcome
Welcome
 
Never give up
Never give upNever give up
Never give up
 
Spsnj case study 2014
Spsnj case study 2014Spsnj case study 2014
Spsnj case study 2014
 
Leadership
LeadershipLeadership
Leadership
 
Latihan soal
Latihan soalLatihan soal
Latihan soal
 
Presentation3
Presentation3Presentation3
Presentation3
 
Welcome
WelcomeWelcome
Welcome
 
Elements of music: Dynamics and Tone Color
Elements of music: Dynamics and Tone ColorElements of music: Dynamics and Tone Color
Elements of music: Dynamics and Tone Color
 
The calendar of events october 13 - october 19
The calendar of events october 13 - october 19The calendar of events october 13 - october 19
The calendar of events october 13 - october 19
 
Personal branding project
Personal branding projectPersonal branding project
Personal branding project
 
Elements of Music: Form Notes
Elements of Music: Form NotesElements of Music: Form Notes
Elements of Music: Form Notes
 
Elements of music: Tone Color
Elements of music: Tone ColorElements of music: Tone Color
Elements of music: Tone Color
 
Events1
Events1Events1
Events1
 
Music video timeline part 2
Music video timeline part 2Music video timeline part 2
Music video timeline part 2
 
Roads (en)
Roads (en)Roads (en)
Roads (en)
 
The walking dead 01
The walking dead 01The walking dead 01
The walking dead 01
 

Similar to PPIT Lecture 18 (20)

Hacking
Hacking Hacking
Hacking
 
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
 
Backtrack Manual Part8
Backtrack Manual Part8Backtrack Manual Part8
Backtrack Manual Part8
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
 
Network security
Network securityNetwork security
Network security
 
Hacker
HackerHacker
Hacker
 
ETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGEETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGE
 
cyber sequirety Terms.pptx
cyber sequirety Terms.pptxcyber sequirety Terms.pptx
cyber sequirety Terms.pptx
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Introduction to ceh
Introduction  to cehIntroduction  to ceh
Introduction to ceh
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
 
G3t R00t at IUT
G3t R00t at IUTG3t R00t at IUT
G3t R00t at IUT
 
Tor Tracer
Tor TracerTor Tracer
Tor Tracer
 
HES2011 - Sebastien Tricaud - Capture me if you can
HES2011 - Sebastien Tricaud - Capture me if you canHES2011 - Sebastien Tricaud - Capture me if you can
HES2011 - Sebastien Tricaud - Capture me if you can
 

More from Kashif Sohail

More from Kashif Sohail (10)

PPIT Lecture 20
PPIT Lecture 20PPIT Lecture 20
PPIT Lecture 20
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
PPIT Lecture 2
PPIT Lecture 2PPIT Lecture 2
PPIT Lecture 2
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
 

Recently uploaded

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 

Recently uploaded (20)

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 

PPIT Lecture 18

  • 2. WHY DO PEOPLE HACK ? JUST FOR FUN. SHOW OF THEIR KNOWLEDGE. HACK OTHER SYSTEM SECRETLY. DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR. FOR PROFIT PEOPLE PAYS A CRACKER. CRACK FOR SAKE OF CURIOCITY.
  • 3. THE PSYCOLOGY OF HACKERS ALL INFORMATION SHOULD BE FREE. ACCESS TO COMPUTER SHOULD BE UNLIMITED AND FREE. IT CAN CHANGE LIFE FOR BETTER. IT CAN CREATE BEAUTY ON COMPUTER.
  • 4. TYPES OF HACKING THERE ARE MANY TYPES OF HACKING LIKE • PASSWORD HACKING • SOFTWARE HACKING • NET HACKING
  • 5. PASSWORD HACKING  TWO TYPES 1. BRUTE FORCE • IN THAT CASE HACKERS TRY OUT ALL THE COMBINATION OF ALL KEYBOARD LETTERS .IT HAS GRATER SUCCESS BUT IT TAKES LONG TIME 2. DICTIONARY BASED • IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS UNSUCCESSFUL METHOD
  • 6. SOFTWARE HACKING IN THAT HACKERS CHANGES THE LOOK & EXCUTION WAY OF THAT SOFTWARE  CHANG THE DEMO VERSION INTO FULL VERSION BY DECODING THE SOURCE CODE
  • 7. IP ADDRESS IP ADDRESS IS THE ADDRESS OF YOUR COMPUTER IN THE INTERNET IT IS UNIQ LIKE 192.168.23.45
  • 8. PORT  IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR COMPUTER  IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER CAN ENTER  THERE ARE THOUSANDS OF PORTS INTO COMPUTER  THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT  LIKE PORT 21 : FTP PORT 23 : TELNET PORT 80 : HTTP PORT 25 : MAIL
  • 9. HACKING TOOLS THERE ARE MANY TOOLS ARE AVILABLE • SCANNERS • TELNET • FTP • LAN WATCH
  • 10. SCANNERS  IT IS NOT A PHOTO SCANNER  SCANNER IS PROGRAM THAT AUTOMATICALLY DETECTS SECURITY WEAKNESS IN REMOTE HOST  PORT SCANNERS ARE USED IN HACKING  PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN PORT ON THAT SYSTEM AND WHICH SERVICE IS RUNNING ON THAT  IT CAN USE ALMOST ALL OPERATING SYSTEM  EX. SATAN,NMAP
  • 11. TELNET TELNET IS ULTIMATE HACKING TOOL  IT IS TERMINAL EMULATION PROGRAM THAT ALLOWS US TO CONNECT TO REMOTE SYSTEM  YOU HAVE TO FOLLOW THIS STEP TO USE TELNET C:WINDOWSTELNET [IP ADDRESS] PORT
  • 12. FTP  FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS USED AS HACKING TOOL  PORT 21 FOR THE FTP  FOR CONNECTING FTP WE NEED SOME FTP S/W KNOWN AS FTP CLIENT  FOR CONNECTING FTP SERVER YOU HAVE TO HAMMER THAT SERVER  COMMAND: C:WINDOWSFTP [IP ADDRESS]:PORT