SlideShare a Scribd company logo
HACKING
The Art Of Exploitation
What is Hacking
Hacking refers to the activities which are done to intrude someone else’s personal
information so as to use it for malicious,unwanted purpose
OR
Hacking is a term which refer to the activities aimed to exploiting security amind to
exploiting security flaws to obtain personal information for gaining access to secured
network
Overview of Hacking
● Hack
➔ The rapid crafting of a new program or the making of changes to
existing,usually complicated software
● Hacker
➔ The Person who hacks
● Cracker
➔ System destroyer
Contents
● Who is hacker
● History of Hacking
● Types of Hacking
● Hacking accidents
● Why do hacker hack ?
● What hacker do after hacking ?
● What do hacker know ?
Who is hacker ?
● Hack
○ Cut with repeated irregular blows
○ Examine something very minutely
● Hacker
○ The person who hacks
● Cracker
○ System intruder/destroyer
● Hacker means cracker now days
○ Meaning has been changed
What is Hacker
A Hacker is someone who likes to tinker with electronics
computer system.Hacker like to explore and learn how computer
system work,finding ways to make them do what they do
better,or do things they weren’t intended to do Hcakers
History of Hacking
● 1960-1970
○ Good hack especially clever program code
● 1970-1990
○ Breaking in to computer became very easy
● 1990-present
○ www.developed & internet grow exponentially
○ Hacking can be writing a program for enjoyment
○ Hacking can also be done to perform reverse engineering of software where source code is lost
Types of Hacking
Interruption Interception
Modification Fabrication
Hacking Accidents
● Internet Worm
○ Robert T.Morris made an internet worm.It spread through the internet and crashed about 6000
system
● IP Spoof
○ Kevin Mitnick was caught by TSutomu Shimomura who was security expert.Kelvin uses the IP
Spoof attack in this accident
○ Internet Worm
● Cuckoo’s Egg
○ Clifford stoll caught the hacker who are the German hacker applied by KGB
Why do Hacker Hack?
● Just for fun
● Show off
● Hack other system secretly
● Notify many people their thought
● Steal important information
● Destroy enemy's computer network during the war
What do the Hacker do after hacking
● Patch security hole
○ The other hacker can’t intrude
● Clear logs and hide themselves
● Install rootkit(backdoor)
○ The hacker who hacked the system can use the system later
○ It consist trojan ls,ps and so on
● Install irc related program
○ identd ,irc,bitchx.eggdrop.bnc
● Install exploit porgram
● Install denial of service program
● Use all installed programs silently
What do Hacker Know
● Know how to intrude the system
● Know to crash the system
● Know where the hacking program are
How can protect the system ?
● Patch security hole often
● Encrypted important data
○ Ex:- pgp.ssh
● Do not run unused daemon Remove unused demon
● Remove unused setuid/setuid program
● Setup loghost
● Use switch hub
● Setup firewall
○ Ex ipchains
● Setup IDS
○ Ex:- snort
How can protect the system ?
● Backup the system often
What should do after hacked
● Shutdown the system
● Separate the system from network
● Restore the system with the backup
● Connect the system to the network
● It can be good to call the police
Thank You
If you have any question please don't feel hesitate to ask!
Shubham Choudhary

More Related Content

What's hot

S Dweek12
S Dweek12S Dweek12
S Dweek12
Yuya Kaneda
 
cryptography deepan fav subject
cryptography deepan fav subjectcryptography deepan fav subject
cryptography deepan fav subject
deepan v
 
Protect Your Data Now
Protect Your Data NowProtect Your Data Now
Protect Your Data Now
Jay Gotra
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Samip Shah
 
Uzair ppt
Uzair pptUzair ppt
Uzair ppt
princejhulan
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
PraneshKulkarni22
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
Tony Lauro
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
Ahmed Mater
 
Dark web
Dark webDark web
Dark web
aakshidhingra
 
Hacking
HackingHacking
Hacking
Nicolas Loh
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
KeshavBhardwaj19
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
 
Securing blockchain assets
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assets
Simon Wilson
 
Darknet
DarknetDarknet
Computer security
Computer securityComputer security
Computer security
rjfarraj
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
tangytangling
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
Smit Shah
 
Alice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the netAlice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the net
Chris Hammond-Thrasher
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012
Detectify
 

What's hot (19)

S Dweek12
S Dweek12S Dweek12
S Dweek12
 
cryptography deepan fav subject
cryptography deepan fav subjectcryptography deepan fav subject
cryptography deepan fav subject
 
Protect Your Data Now
Protect Your Data NowProtect Your Data Now
Protect Your Data Now
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Uzair ppt
Uzair pptUzair ppt
Uzair ppt
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Dark web
Dark webDark web
Dark web
 
Hacking
HackingHacking
Hacking
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
 
Securing blockchain assets
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assets
 
Darknet
DarknetDarknet
Darknet
 
Computer security
Computer securityComputer security
Computer security
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Hacking & Attack vector
Hacking & Attack vectorHacking & Attack vector
Hacking & Attack vector
 
Alice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the netAlice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the net
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012
 

Similar to Hacking its types and the art of exploitation

Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
Aitezaz Mohsin
 
Hacker
HackerHacker
Hacker
Ramasubbu .P
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rishabha Garg
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
 
Ethical Hacking - An Overview
Ethical Hacking - An OverviewEthical Hacking - An Overview
Ethical Hacking - An Overview
Afaq Mansoor Khan
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
himanshujoshi238
 
Ethical hacking.pptx
Ethical hacking.pptxEthical hacking.pptx
Ethical hacking.pptx
NilkanthPatel38
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
SourabhRuhil4
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
B.A.
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
cyber cure
 
Hacking intro
Hacking introHacking intro
Hacking intro
Milind Mishra
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
Abhilash Ak
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
Sravani Reddy
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
dhirujapla
 

Similar to Hacking its types and the art of exploitation (20)

Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Hacker
HackerHacker
Hacker
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking - An Overview
Ethical Hacking - An OverviewEthical Hacking - An Overview
Ethical Hacking - An Overview
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking.pptx
Ethical hacking.pptxEthical hacking.pptx
Ethical hacking.pptx
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 

Recently uploaded

High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 

Recently uploaded (20)

High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 

Hacking its types and the art of exploitation

  • 1. HACKING The Art Of Exploitation
  • 2. What is Hacking Hacking refers to the activities which are done to intrude someone else’s personal information so as to use it for malicious,unwanted purpose OR Hacking is a term which refer to the activities aimed to exploiting security amind to exploiting security flaws to obtain personal information for gaining access to secured network
  • 3. Overview of Hacking ● Hack ➔ The rapid crafting of a new program or the making of changes to existing,usually complicated software ● Hacker ➔ The Person who hacks ● Cracker ➔ System destroyer
  • 4. Contents ● Who is hacker ● History of Hacking ● Types of Hacking ● Hacking accidents ● Why do hacker hack ? ● What hacker do after hacking ? ● What do hacker know ?
  • 5. Who is hacker ? ● Hack ○ Cut with repeated irregular blows ○ Examine something very minutely ● Hacker ○ The person who hacks ● Cracker ○ System intruder/destroyer ● Hacker means cracker now days ○ Meaning has been changed
  • 6. What is Hacker A Hacker is someone who likes to tinker with electronics computer system.Hacker like to explore and learn how computer system work,finding ways to make them do what they do better,or do things they weren’t intended to do Hcakers
  • 7. History of Hacking ● 1960-1970 ○ Good hack especially clever program code ● 1970-1990 ○ Breaking in to computer became very easy ● 1990-present ○ www.developed & internet grow exponentially ○ Hacking can be writing a program for enjoyment ○ Hacking can also be done to perform reverse engineering of software where source code is lost
  • 8. Types of Hacking Interruption Interception Modification Fabrication
  • 9. Hacking Accidents ● Internet Worm ○ Robert T.Morris made an internet worm.It spread through the internet and crashed about 6000 system ● IP Spoof ○ Kevin Mitnick was caught by TSutomu Shimomura who was security expert.Kelvin uses the IP Spoof attack in this accident ○ Internet Worm ● Cuckoo’s Egg ○ Clifford stoll caught the hacker who are the German hacker applied by KGB
  • 10. Why do Hacker Hack? ● Just for fun ● Show off ● Hack other system secretly ● Notify many people their thought ● Steal important information ● Destroy enemy's computer network during the war
  • 11. What do the Hacker do after hacking ● Patch security hole ○ The other hacker can’t intrude ● Clear logs and hide themselves ● Install rootkit(backdoor) ○ The hacker who hacked the system can use the system later ○ It consist trojan ls,ps and so on ● Install irc related program ○ identd ,irc,bitchx.eggdrop.bnc ● Install exploit porgram ● Install denial of service program ● Use all installed programs silently
  • 12. What do Hacker Know ● Know how to intrude the system ● Know to crash the system ● Know where the hacking program are
  • 13. How can protect the system ? ● Patch security hole often ● Encrypted important data ○ Ex:- pgp.ssh ● Do not run unused daemon Remove unused demon ● Remove unused setuid/setuid program ● Setup loghost ● Use switch hub ● Setup firewall ○ Ex ipchains ● Setup IDS ○ Ex:- snort
  • 14. How can protect the system ? ● Backup the system often
  • 15. What should do after hacked ● Shutdown the system ● Separate the system from network ● Restore the system with the backup ● Connect the system to the network ● It can be good to call the police
  • 16. Thank You If you have any question please don't feel hesitate to ask! Shubham Choudhary