2. Contents
1.Introduction
2. General Hacking Methods
3. Why do Hackers Hack
4. Negative Effects of Hackers
5. History of Hackers
6. Misuse of Hacking Technology
7. Classes of Attacks
3. Introduction
Hacking refers to the activities which are
done to intrude some one else’s personal
information so as to use it for malicious,
unwanted purposes.
4. Hacking Methods
A typical attacker works in the following manner: Identify the
target system. Gathering Information on the target system.
Finding a possible loophole in the target system. Exploiting this
loophole using exploit code. Removing all traces from the log
files and escaping without a trace
5. Why do Hackers Hack
When someone hacks a computer or network system, it's typically for one of the following
reasons:
1. Credit Card Information(for money) In recent years it has become increasingly possible for
hackers to steal credit card information. With online shopping and online banking
becoming more prevalent, the opportunity for a skilled hacker to acquire credit card
information continues to grow.
2. Identity Theft Hackers can potentially steal identity by simply hacking into a computer.
With a stolen identity, a hacker can do almost everything.
3. 3. Business Information In the modern world it is not at all uncommon for incredibly
important business information to be stored on computers. Hackers can steal financial
information, account numbers, and even client information.
6. Negative Effects of Hackers
1. FINANCIAL LOSSES In 2011, Sony lost $170 million due to a
hack of their PlayStation system. Also in 2011, CitiGroup
lost $2.7 million and AT&T lost $2 million as a result of
hackers.
2. 2. LOSS OF INFORMATION Hacking often results in a loss of
data due to files being deleted or changed. leak of top
secret information could cause real-world security issues.
Servers at the Pentagon, FBI, Interpol and NASA have all
been compromised at various points.
7. History of Hackers
1980s - Cyberspace coined-414 arrested -Two
hacker groups formed -2600 published
1990s -National Crackdown on hackers -Kevin
Mitnick arrested -Microsoft’s NT operating
system pierced
8. Misuse of Hacking Technology
Hacking is an attempt to misuse a
computer or private system/network. It is
an unauthorised access to get control over
other computer network security systems
for illegal usage. ... It is finding a weakness
in computer network or system and gaining
access to the particular network which
leads to misuse of personal data
9. Classes of Attacks
• Authentication
The Authentication section covers attacks that target a web site's method of
validating the identity of a user, service or application.
• Authorization
The Authorization section covers attacks that target a web site's method of
determining if a user, service, or application has the necessary permissions to
perform a requested action.
• Client-side Attacks
The Client-side Attacks section focuses on the abuse or exploitation of a web site's
users.
• Command Execution
The Command Execution section covers attacks designed to execute remote
commands on the web site. All web sites utilize user-supplied input to fulfill
requests.
• Logical Attacks
The Logical Attacks section focuses on the abuse or exploitation of a web
application's logic flow.