COMPUTER  SECURITYBy:Satyajit Das                8thSemGITA,bbsr.
CONTENTS What is Computer Security?
 What is Hacking?
 Methods and Prevention.
 Tools
 Trojans
 Virus
 RATS
 FUDS
 Backdoors
 E-mail  Security
 Demos
 How to increase  security of a Computer?What  is  Computer  Security?The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.
WHAT IS HACKING?The meaning associated to the word 'hacking' is a positive one, and it mainly refers to the ability and desire to understand the inner mechanisms through which different components in the ICT  world (typically computer programs) work. For this reason, even regular computer programmers are sometimes referred to as hackers.HACKERSWHITE  HATGREY  HATBLACK  HAT

Computer Security

  • 1.
    COMPUTER SECURITYBy:SatyajitDas 8thSemGITA,bbsr.
  • 2.
    CONTENTS What isComputer Security?
  • 3.
    What isHacking?
  • 4.
    Methods andPrevention.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
    E-mail Security
  • 12.
  • 13.
    How toincrease security of a Computer?What is Computer Security?The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.
  • 14.
    WHAT IS HACKING?Themeaning associated to the word 'hacking' is a positive one, and it mainly refers to the ability and desire to understand the inner mechanisms through which different components in the ICT world (typically computer programs) work. For this reason, even regular computer programmers are sometimes referred to as hackers.HACKERSWHITE HATGREY HATBLACK HAT
  • 15.
    METHODSBrute ForceDictionary AttackSocialEngineeringForgot Password AttackPhishingDenial of Service Attack(DOS)SQL Injection AttackARP Poison RoutingAttack using Tools
  • 16.
    PHISHINGGET THE SPOOF/FAKEPAGE.PHPSEARCH THE “ACTION =” FOR LOGINASSIGN “.PHP” FILE TO IT.HTMLUPLOAD THE FILES TO WEB SPACEGET THE LINK OF THE HTML FILESEND THE LINK TO VICTIM & WAIT FOR THE LOG FILE
  • 17.
    TOOLSKEYLOGGERSMAIL BOMBERRATSCRYPTERSBINDERSJOINERSCAIN& ABELSNIFFERSSUPER PHISHERICON CHANGERSQLiHELPER V 2.7VIRUS GENERATOR.BAT TO .EXE CONVERTERSANDBOXIE
  • 18.
    Trojans"A Trojan horse  alsocalled as TROJAN, is non-self replicating  malware  that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology."Use of the machine as part of a botnet (i.e. to perform spamming or to perform Distributed Denial-of-service(DDoS) attacks).
  • 19.
    Data theft(e.g. passwords,credit card information, etc.).
  • 20.
    Installation of software(including other malware).
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
    Wasting computer storagespace.How to make a FUD SERVERUSE IT ON OWN COMPUTERCLIENTTROJANSERVERBINDINGCHANGE ICONSCAN WITH novirusthanks.comFUDSEND TO VICTIM
  • 26.
    VIRUSA virus isan entity that uses the resources of the host to spread and reproduce itself, usually without informed operator action. Let us stress here the word “informed”. A virus cannot run completely of its own volition. The computer user must always take some action , even if it is only to turn the computer on. This is the major strength of a virus: it uses normal computer operations to do its dirty work, and so there is no single unique characteristic that can be used to identify a previously unknown viral program.VIRUSINFECTIONPAYLOADTRIGGER
  • 27.
    REMOTE ADMISTRATION TOOLSA Remote Administration Tool (known more commonly on the Internet as a RAT) is used to remotely connect and manage a single or multiple computers with a variety of tools, such as:Screen/camera capture or controlFile management (download/upload/execute/etc.)Shell control (usually piped from command prompt)Computer control (power off/on/log off)Registry management (query/add/delete/modify)Other product-specific function
  • 28.
    FULLY UNDETECABLEWhen a system is to be attacked by a Trojan or R.A.T then the server part of it is made fully undectable by a crypter with the recent stub so that it can not be detected by the antivirus of the victim.By doing this the server of the trojan or R.A.T can escape from the antivirus and can be runned at the background.After accomplishing this one can check the authencity with the help of multiple antivirus engine ie. www.novirusthanks.com
  • 29.
    CONCLUSIONHacking has a positive sense as compared to cracking.Knowing the tricks of hacking not only make one equiped with it but also make make the user maintain his/her security when working online.The hacking triks described above are for educational purpose not to harm anyone.
  • 30.