Lecture 17
Introduction to Hacking
WHAT IS NETWORK SECURITY?
• Security is much larger than just packets, firewalls,
and hackers. Security includes:
– Policies and procedures
– Liabilities and laws
– Human behavior patterns
– Corporate security programs and implementation
– Technical aspects- firewalls, intrusion detection systems,
proxies, encryption, antivirus software, hacks, cracks, and
attacks
• Understanding hacking tools and how attacks are
carried out is only one piece of the puzzle.
2
Hacking
 THE PROCESS OF ATTEMPTING TO GAIN OR
SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO
COMPUTER RESOURCES FOR THE PURPOSE OF HELP
OR SECURE SYSTEM IS CALLED HACKING
HISTORY OF HACKING
1966 – ROBERT MORRIS INTRODUCES THE
CONCEPT OF SAFE HACKING.
1969 – DEVELOPMENT IN THE FIELD OF
HACKING.
1990 – ELECTRONIC FRONTIER FOUNDATION
WAS FOUNDED.
1995 – MARK ANDREESSON & ERIC RELEASE
MOSAIC.
WHO IS HACKER?
 HACKER IS NOT CYBER CRIMINAL BUT HE IS THE VERY
INTELLIGENT PERSON WHO USES HIS KNOWLEDGE
IN CONSTRUCTIVE MANNER TO SECURE SYSTEM &
NEVER DAMAGE DATA
 HE KNOWS ALL ABOUT THE OPERATING SYSTEM &
DIFFERENT HOLES IN THE SYSTEM
WHO IS CRACKER?
 PERSON WHO ENTER INTO OTHER’S SYSTEM AND
VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE
HAVOC IS CALLED CRACKER
 CRACKER IS CYBER CRIMINAL
 THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR
ACTIONS ARE MALICIOUS
WHY DO CRACKERS EXIST?
 CRACKERS EXIST BECAUSE HUMAN NATURE IS JUST
SO,FREQUENTLY DRIVEN BY TO DESTROY INSTEAD OF
CREATE
 THEY ARE USED FOR DIFFERENT PURPOSES LIKE FOR
PROFIT,SOME COMPANY USE THEM FOR DISABLING
THE COMPITITOR COMPANY, FOR CRACKING CREDIT
CARD NUMBER
DIFFERENCE BETWEEN HACKER &
CRACKER
 HACKER’S PROGRAMS TO
CHECK INTIGRITY OF OTHER
PROGRAMS.THUS WHEN
HACKERS CREATE PROGRAM
IT AUTOMATICALLY CHECKS
REMOTE MACHINE
SECURITY STRUCTURE
 THEY ALWAYS DO
CONTRUCTIVE WORK
 CRACKERS RARELY MAKE
THEIR OWN PROGRAM
.INSTEAD ,THEY STEAL
TOOL,PROGRAMS FROM
OTHERS
 CRACKERS CREATES
NOTHING & DESTROY
MUCH
WHICH OPERATING SYSTEM HACKER USE
SUN
UNIX
MICROSOFT
SUN
HACKERS Use EITHER SOLARIC X86 OR SCO AS
A PLATFORM.
THIS IS BECAUSE THESE PRODUCTS ARE
LICENSED WARE & THEY CAN EASILY BE
OBTAINED.
UNIX
POPULAR PLATFORM BECAUSE THEY
REQUIRED A LOW OVERHEAD.
WE CAN RUN LINUX ON A PALTRAY 386 AND
GAIN GOOD PERFORMANCE.
THIS IS REASONABLE.
MICROSOFT
THIS SUPPORTS MANY SECURITY TOOLS THAT
CAN BE USED TO ATTACK REMOTE MACHINE.
IT HAS ADVANCED TOOLS FOR NETWORKING
AS WELL.

PPIT Lecture 17

  • 1.
  • 2.
    WHAT IS NETWORKSECURITY? • Security is much larger than just packets, firewalls, and hackers. Security includes: – Policies and procedures – Liabilities and laws – Human behavior patterns – Corporate security programs and implementation – Technical aspects- firewalls, intrusion detection systems, proxies, encryption, antivirus software, hacks, cracks, and attacks • Understanding hacking tools and how attacks are carried out is only one piece of the puzzle. 2
  • 3.
    Hacking  THE PROCESSOF ATTEMPTING TO GAIN OR SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO COMPUTER RESOURCES FOR THE PURPOSE OF HELP OR SECURE SYSTEM IS CALLED HACKING
  • 4.
    HISTORY OF HACKING 1966– ROBERT MORRIS INTRODUCES THE CONCEPT OF SAFE HACKING. 1969 – DEVELOPMENT IN THE FIELD OF HACKING. 1990 – ELECTRONIC FRONTIER FOUNDATION WAS FOUNDED. 1995 – MARK ANDREESSON & ERIC RELEASE MOSAIC.
  • 5.
    WHO IS HACKER? HACKER IS NOT CYBER CRIMINAL BUT HE IS THE VERY INTELLIGENT PERSON WHO USES HIS KNOWLEDGE IN CONSTRUCTIVE MANNER TO SECURE SYSTEM & NEVER DAMAGE DATA  HE KNOWS ALL ABOUT THE OPERATING SYSTEM & DIFFERENT HOLES IN THE SYSTEM
  • 6.
    WHO IS CRACKER? PERSON WHO ENTER INTO OTHER’S SYSTEM AND VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE HAVOC IS CALLED CRACKER  CRACKER IS CYBER CRIMINAL  THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR ACTIONS ARE MALICIOUS
  • 7.
    WHY DO CRACKERSEXIST?  CRACKERS EXIST BECAUSE HUMAN NATURE IS JUST SO,FREQUENTLY DRIVEN BY TO DESTROY INSTEAD OF CREATE  THEY ARE USED FOR DIFFERENT PURPOSES LIKE FOR PROFIT,SOME COMPANY USE THEM FOR DISABLING THE COMPITITOR COMPANY, FOR CRACKING CREDIT CARD NUMBER
  • 8.
    DIFFERENCE BETWEEN HACKER& CRACKER  HACKER’S PROGRAMS TO CHECK INTIGRITY OF OTHER PROGRAMS.THUS WHEN HACKERS CREATE PROGRAM IT AUTOMATICALLY CHECKS REMOTE MACHINE SECURITY STRUCTURE  THEY ALWAYS DO CONTRUCTIVE WORK  CRACKERS RARELY MAKE THEIR OWN PROGRAM .INSTEAD ,THEY STEAL TOOL,PROGRAMS FROM OTHERS  CRACKERS CREATES NOTHING & DESTROY MUCH
  • 9.
    WHICH OPERATING SYSTEMHACKER USE SUN UNIX MICROSOFT
  • 10.
    SUN HACKERS Use EITHERSOLARIC X86 OR SCO AS A PLATFORM. THIS IS BECAUSE THESE PRODUCTS ARE LICENSED WARE & THEY CAN EASILY BE OBTAINED.
  • 11.
    UNIX POPULAR PLATFORM BECAUSETHEY REQUIRED A LOW OVERHEAD. WE CAN RUN LINUX ON A PALTRAY 386 AND GAIN GOOD PERFORMANCE. THIS IS REASONABLE.
  • 12.
    MICROSOFT THIS SUPPORTS MANYSECURITY TOOLS THAT CAN BE USED TO ATTACK REMOTE MACHINE. IT HAS ADVANCED TOOLS FOR NETWORKING AS WELL.