SlideShare a Scribd company logo
ETHICAL HACKING
ADAIKKAPPAN . S
23BBA303
What is Hacking?
Hacking refers to an array of activities which are done to intrude some one
else’s personal information space so as to use it for malicious, unwanted
purposes.
Hacking is a term used to refer to activities aimed at exploiting security flaws
to obtain critical information for gaining access to secured networks.
A Brief History of Hacking
 1980s
- Cyberspace coined
-414 arrested
-Two hacker groups formed
-2600 published
 1990s
-National Crackdown on
hackers
-Kevin Mitnick arrested
-Microsoft’s NT operating
system pierced
Hacking statistics
• There is a hack attack every 39 seconds.
• Russian hackers are the fastest.
• There are 300,000 new malware is created every day.
• Multi-factor authentication and encryption are the biggest hacker obstacles.
• The cybersecurity budget in the U.S is $14.98 billion
○ U.S national debt, April 2020: 23,702,260,238,910
○ Cybercrime is more profitable than global illegal drug trade
A Brief History of Hacking
 2001
– In one of the biggest denial-of-service attack, hackers launched attacks
against eBay, Yahoo!, CNN.com., Amazon and others.
 2007
– Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded nearly $1
Million has been stolen in three months from 250 customer account.
Famous
Hackers in
History
Ian Murphy Kevin Mitnick Johan Helsinguis
Mark Abene
Linus Torvalds Robert Morris
Max Vision
• Extremely intelligent hacker
• As a volunteer for the FBI, he saw a
flaw in the code for nuclear
weapons and fixed it
• After convicted, many say he turned
to the “dark side”
• Now serving 13 years in Federal
prison
It Takes Time to Become a Hacker
• This class alone won’t make you a hacker, or an expert
• It might make you a script kiddie
• It usually takes years of study and experience to earn respect in the hacker
community
• It’s a hobby, a lifestyle, and an attitude
• A drive to figure out how things work
The Role of Security and Penetration
Testers
• Collection of OSs and hacking tools
• Usually on a laptop
• Helps penetration testers and security testers conduct vulnerabilities
assessments and attacks
Certification Programs for Network
Security Personnel
• Certification programs available in almost every area of network security
• Basics:
• CompTIA Security+ (CNIT 120)
• Network+ (CNIT 106 or 201)
Basic Hacking Skills
Learn how to program.
• This, of course, is the fundamental hacking skill.
If you don't know any computer languages, you
cant do hacking.
Get one of the open-source Unix's and learn to
use and run it
• The single most important step any newbie can
take towards acquiring hacker skills is to get a
copy of Linux or one of the BSD-Unix’s, install it on
a personal machine, and run it.
Learn how to use the World Wide Web and
write HTML.
• To be worthwhile, your page must have content -
- it must be interesting and/or useful to other
hackers.
Hacking Premeasured
When you start hacking the first thing you need to
do is: to make sure the victim will not find out your
real identity.
So hide your IP by masking it or using a
anonymous proxy server. This is only effective
when the victim has no knowledge about
computers and internet. Organizations like the
F.B.I, C.I.A and such will find you in no time, so
beware !
The best thing to do is using a dialup connection
that has a variable IP address. Be smart, when you
signup for a internet dialup connection use a fake
name and address.
When hacking never leave traces of your hacking
attempts, clear log files and make sure you are not
monitored. So use a good firewall that keeps out
retaliation hacking attempts of your victim.
What You Can Do Legally
• Laws involving technology change as rapidly as technology itself
• Find what is legal for you locally
• Laws change from place to place
• Be aware of what is allowed and what is not allowed
Laws of the Land
• Tools on your computer might be illegal to possess
• Contact local law enforcement agencies before installing hacking tools
• Written words are open to interpretation
• Governments are getting more serious about punishment for cybercrimes
Is Port Scanning Legal?
 Some states deem it legal
 Not always the case
 Federal Government does not see it as a violation
 Allows each state to address it separately
 Read your ISP’s “Acceptable Use Policy”
 IRC “bots” may be forbidden
 Program that sends automatic responses to users
 Gives the appearance of a person being present
IP Addresses
Every system connected to a network has a unique Internet Protocol (IP)
Address which acts as its identity on that network.
An IP Address is a 32-bit address which is divided into four fields of 8-bits
each. For Example, 203.94.35.12
All data sent or received by a system will be addressed from or to the system.
An attacker’s first step is to find out the IP Address of the target system
IP Addresses: Finding out an IP
Address
A remote IP Address can easily be found out by any of the following methods:
Through Instant Messaging Software
Through Internet Relay Chat
Through Your website
Through Email Headers
Finding an IP Address via Instant
Messengers
 Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system
and your friend’s system:
Your System------Chat Server---- Friend’s System
Friend’s System---------Chat Server------- Your System
Thus in this case, you first have to establish a direct connection with your friend’s computer by either sending him a file or by
using the call feature.
Then, goto MSDOS or the command line and type:
C:>netstat -n
This command will give you the IP Address of your friend’s computer
Finding an IP Address via your
website
 One can easily log the IP Addresses of all visitors to their website by using simply
JAVA applets or JavaScript code.
• Countermeasures
 On should surf the Internet through a Proxy Server.
 One can also make use of the numerous Free Anonymous Surfing Proxy
Services.
• For Example, www.anonymizer.com
NETWORK HACKING
General Hacking Methods
A typical attacker works in the following manner:
1.Identify the target system.
2.Gathering Information on the target system.
3.Finding a possible loophole in the target system.
4.Exploiting this loophole using exploit code.
5.Removing all traces from the log files and escaping without a trace.
Various Types of Attacks
There are an endless number of attacks, which a system administrator
has to protect his system from. However, the most common ones are:
Denial of Services attacks (DOS Attacks)
Threat from Sniffing and Key Logging
Trojan Attacks
IP Spoofing
Buffer Overflows
All other types of Attacks
Denial of Services (DOS) Attacks
DOS Attacks are aimed at denying valid, legitimate Internet and Network
users access to the services offered by the target system.
In other words, a DOS attack is one in which you clog up so much memory on
the target system that it cannot serve legitimate users.
There are numerous types of Denial of Services Attacks or DOS Attacks.
Types of hacker
This is a Floor Plan
Recent Hacking Cases

More Related Content

Similar to hacking

Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
Animesh Behera
 
Hacking In Detail
Hacking In DetailHacking In Detail
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 
Hack the hack
Hack the hackHack the hack
Hack the hack
Shakti Ranjan
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Top 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfTop 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdf
infosec train
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
JatinRajput67
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Animesh Shaw
 
cyber crime
cyber crimecyber crime
cyber crime
AshwaniKangotra1
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 
Hacking
Hacking Hacking
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Md Mudassir
 

Similar to hacking (20)

Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Top 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfTop 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdf
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Hacking
Hacking Hacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

hacking

  • 2. What is Hacking? Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes. Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
  • 3. A Brief History of Hacking  1980s - Cyberspace coined -414 arrested -Two hacker groups formed -2600 published  1990s -National Crackdown on hackers -Kevin Mitnick arrested -Microsoft’s NT operating system pierced
  • 4. Hacking statistics • There is a hack attack every 39 seconds. • Russian hackers are the fastest. • There are 300,000 new malware is created every day. • Multi-factor authentication and encryption are the biggest hacker obstacles. • The cybersecurity budget in the U.S is $14.98 billion ○ U.S national debt, April 2020: 23,702,260,238,910 ○ Cybercrime is more profitable than global illegal drug trade
  • 5. A Brief History of Hacking  2001 – In one of the biggest denial-of-service attack, hackers launched attacks against eBay, Yahoo!, CNN.com., Amazon and others.  2007 – Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded nearly $1 Million has been stolen in three months from 250 customer account.
  • 6. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis Mark Abene Linus Torvalds Robert Morris
  • 7. Max Vision • Extremely intelligent hacker • As a volunteer for the FBI, he saw a flaw in the code for nuclear weapons and fixed it • After convicted, many say he turned to the “dark side” • Now serving 13 years in Federal prison
  • 8. It Takes Time to Become a Hacker • This class alone won’t make you a hacker, or an expert • It might make you a script kiddie • It usually takes years of study and experience to earn respect in the hacker community • It’s a hobby, a lifestyle, and an attitude • A drive to figure out how things work
  • 9. The Role of Security and Penetration Testers • Collection of OSs and hacking tools • Usually on a laptop • Helps penetration testers and security testers conduct vulnerabilities assessments and attacks
  • 10. Certification Programs for Network Security Personnel • Certification programs available in almost every area of network security • Basics: • CompTIA Security+ (CNIT 120) • Network+ (CNIT 106 or 201)
  • 11. Basic Hacking Skills Learn how to program. • This, of course, is the fundamental hacking skill. If you don't know any computer languages, you cant do hacking. Get one of the open-source Unix's and learn to use and run it • The single most important step any newbie can take towards acquiring hacker skills is to get a copy of Linux or one of the BSD-Unix’s, install it on a personal machine, and run it. Learn how to use the World Wide Web and write HTML. • To be worthwhile, your page must have content - - it must be interesting and/or useful to other hackers.
  • 12. Hacking Premeasured When you start hacking the first thing you need to do is: to make sure the victim will not find out your real identity. So hide your IP by masking it or using a anonymous proxy server. This is only effective when the victim has no knowledge about computers and internet. Organizations like the F.B.I, C.I.A and such will find you in no time, so beware ! The best thing to do is using a dialup connection that has a variable IP address. Be smart, when you signup for a internet dialup connection use a fake name and address. When hacking never leave traces of your hacking attempts, clear log files and make sure you are not monitored. So use a good firewall that keeps out retaliation hacking attempts of your victim.
  • 13. What You Can Do Legally • Laws involving technology change as rapidly as technology itself • Find what is legal for you locally • Laws change from place to place • Be aware of what is allowed and what is not allowed
  • 14. Laws of the Land • Tools on your computer might be illegal to possess • Contact local law enforcement agencies before installing hacking tools • Written words are open to interpretation • Governments are getting more serious about punishment for cybercrimes
  • 15. Is Port Scanning Legal?  Some states deem it legal  Not always the case  Federal Government does not see it as a violation  Allows each state to address it separately  Read your ISP’s “Acceptable Use Policy”  IRC “bots” may be forbidden  Program that sends automatic responses to users  Gives the appearance of a person being present
  • 16. IP Addresses Every system connected to a network has a unique Internet Protocol (IP) Address which acts as its identity on that network. An IP Address is a 32-bit address which is divided into four fields of 8-bits each. For Example, 203.94.35.12 All data sent or received by a system will be addressed from or to the system. An attacker’s first step is to find out the IP Address of the target system
  • 17. IP Addresses: Finding out an IP Address A remote IP Address can easily be found out by any of the following methods: Through Instant Messaging Software Through Internet Relay Chat Through Your website Through Email Headers
  • 18. Finding an IP Address via Instant Messengers  Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friend’s system: Your System------Chat Server---- Friend’s System Friend’s System---------Chat Server------- Your System Thus in this case, you first have to establish a direct connection with your friend’s computer by either sending him a file or by using the call feature. Then, goto MSDOS or the command line and type: C:>netstat -n This command will give you the IP Address of your friend’s computer
  • 19. Finding an IP Address via your website  One can easily log the IP Addresses of all visitors to their website by using simply JAVA applets or JavaScript code. • Countermeasures  On should surf the Internet through a Proxy Server.  One can also make use of the numerous Free Anonymous Surfing Proxy Services. • For Example, www.anonymizer.com
  • 21. General Hacking Methods A typical attacker works in the following manner: 1.Identify the target system. 2.Gathering Information on the target system. 3.Finding a possible loophole in the target system. 4.Exploiting this loophole using exploit code. 5.Removing all traces from the log files and escaping without a trace.
  • 22. Various Types of Attacks There are an endless number of attacks, which a system administrator has to protect his system from. However, the most common ones are: Denial of Services attacks (DOS Attacks) Threat from Sniffing and Key Logging Trojan Attacks IP Spoofing Buffer Overflows All other types of Attacks
  • 23. Denial of Services (DOS) Attacks DOS Attacks are aimed at denying valid, legitimate Internet and Network users access to the services offered by the target system. In other words, a DOS attack is one in which you clog up so much memory on the target system that it cannot serve legitimate users. There are numerous types of Denial of Services Attacks or DOS Attacks.
  • 25.
  • 26. This is a Floor Plan