Hacking Kishor


Published on

Published in: Technology, News & Politics
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Hacking Kishor

  1. 1. Hacking & Cracking
  2. 2. Understand The difference <ul><li>hackers build things, </li></ul><ul><li>crackers break them </li></ul>
  3. 3. HACKER <ul><li>A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. </li></ul><ul><li>One who programs enthusiastically (even obsessively) or who enjoys programming rather than simply theorizing about programming. </li></ul><ul><li>Positive </li></ul>
  4. 4. CRACKER <ul><li>A Hacker who use his skill for illegal purpose. </li></ul><ul><li>gaining access to your system resources. </li></ul><ul><li>checking out the mechanism of attacks against other systems. </li></ul><ul><li>Negative </li></ul>
  5. 5. Hacker's Motivations <ul><li>Fun </li></ul><ul><li>Profit </li></ul><ul><li>Extortion </li></ul><ul><li>Technical Reputation </li></ul><ul><li>Scorekeeping </li></ul><ul><li>Revenge/maliciousness </li></ul><ul><li>Intellectual Challenges </li></ul><ul><li>Desire to embarrass </li></ul><ul><li>Experimentation </li></ul><ul><li>Self Gratification </li></ul><ul><li>Problem Solving </li></ul><ul><li>Exposing System Weakness </li></ul><ul><li>Want to be Hero of Wild Internet </li></ul>
  6. 6. Types of hacker’s <ul><li>Professional hackers </li></ul><ul><ul><li>White Hats – Professional Security Experts </li></ul></ul><ul><ul><li>Gray Hats – Unsuspecting Users </li></ul></ul><ul><li>Script kiddies </li></ul><ul><ul><li>Mostly kids/students- User tools created by black hats </li></ul></ul><ul><li>Underemployed Adult Hackers </li></ul><ul><ul><li>Former Script Kiddies </li></ul></ul><ul><ul><ul><li>Can’t get employment in the field </li></ul></ul></ul><ul><ul><ul><li>Want recognition in hacker community </li></ul></ul></ul>
  7. 7. Types Of Cracker’s <ul><li>Professional hackers </li></ul><ul><ul><li>Black Hats – the Bad Guys </li></ul></ul><ul><li>Criminal Hackers </li></ul><ul><ul><li>Real criminals, are in it for whatever they can get no matter who it hurts </li></ul></ul><ul><li>Corporate Spies </li></ul><ul><ul><li>Are relatively rare </li></ul></ul><ul><li>Disgruntled Employees </li></ul><ul><ul><li>Most dangerous to an enterprise as they are “insiders” </li></ul></ul>
  8. 8. Without Hackers, <ul><li>Programming languages such as C and C++ would not exist </li></ul><ul><li>Operating Systems such as Unix and Linux would not exist </li></ul><ul><li>Microsoft might not been developed </li></ul><ul><li>Basically, no one would be designing new types of software </li></ul><ul><li>Antivirus Companies would not have became billionaire </li></ul>
  9. 9. Without Crackers, <ul><li>Security is thought of and efforts are put forward to making information more private </li></ul><ul><li>Free software is made available because of these people </li></ul><ul><li>These crackers create jobs for others to stop them </li></ul><ul><li>Since home users are more vulnerable with less security they are an easy target for people to hack into for fun </li></ul><ul><li>Software developers improve their software </li></ul>
  10. 10. Attack Methodology <ul><li>The Beginning – Goal : Decide why this system should be attacked. </li></ul><ul><li>Steps :- </li></ul><ul><ul><li>Gather the Information about the victim hosts </li></ul></ul><ul><ul><li>Locate the victim hosts by some scanning program </li></ul></ul><ul><ul><li>Identify the victim host vulnerability </li></ul></ul><ul><ul><li>Attack the victim host via this vulnerability </li></ul></ul><ul><ul><li>Establish backdoors for later access </li></ul></ul>
  11. 11. Some Common Attacks <ul><li>Social engineering </li></ul><ul><ul><li>Pretexting </li></ul></ul><ul><ul><li>Phishing </li></ul></ul><ul><ul><li>Dumpster diving </li></ul></ul><ul><li>Dos(Denial Of Service) </li></ul><ul><li>POD(Ping Of Death) </li></ul><ul><li>SQL Injection </li></ul>
  12. 12. Once inside, the hacker can... <ul><li>Modify logs </li></ul><ul><ul><li>To cover their tracks </li></ul></ul><ul><ul><li>To mess with you </li></ul></ul><ul><li>Steal files </li></ul><ul><ul><li>Sometimes destroy after stealing </li></ul></ul><ul><ul><li>A pro would steal and cover their tracks so to be undetected </li></ul></ul><ul><li>Modify files </li></ul><ul><ul><li>To let you know they were there </li></ul></ul><ul><ul><li>To cause mischief </li></ul></ul><ul><li>Install back doors </li></ul><ul><ul><li>So they can get in again </li></ul></ul><ul><li>Attack other systems </li></ul>
  13. 13. Question Is Hacking healthy to the computer industry?