Sie sind auf Seite 1von 12

Acknowledgement

I give a special thank to people who have helped me in this project. I would specially like to thank Deepak gupta sir who has guided us all the way through.

I would also like to thank the giant search engine Google for the data used in this project.

Index
y Definition of hacking and hacker y History of hacking y Hacking groups y Hacking into the groups y Techniques of hacking y Notable hackers y Hacking reports in recent years

What does Hacking mean and who is a Hacker?

Hacking means finding out weaknesses in an established system and exploiting them. A computer hacker is a person who finds out weaknesses in the computer and exploits it. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.

History of hacking:In 1983, Mark Abene [wiki] was nothing more than a beanie-wearing mall rat with too much spare time. He didn t own a computer, so one day he wandered into a Radio Shack, cozied up to one at the store, and tapped out a few commands. And that s how his hacking habit began as simple as that. By 1984, with echoes of Orwellian symmetry, he was already using his own PC to sneak into other people s computer systems. While his parents were busy upgrading to a touch-tone phone, Abene was figuring out how to redirect traffic between switchboards. Then the world learned what a pimple-faced intruder with simple Radio Shack gear was truly capable of. In 1991, in response to the AT&T telephone system crash that left 60,000 customers without a phone line for nine hours, federal authorities burst into Abene s bedroom, guns drawn, and confiscated his computer equipment. Although Abene was ultimately acquitted in the scandal, authorities nailed him for related mischief. Today, his phone hacking, or "phreaking," is

an infamous milestone in hacker history. At just 19 years old, Abene (a.k.a. Phiber Optik) became the first hacker to serve time in a federal prison.

Hacking Groups around the world:-

The computer underground is supported by regular realworld gatherings called hacker conventions or "hacker cons". These draw many people every year including SummerCon (summer), DEFCON, HoHoCon (Christma s), ShmooCon (February), BlackHat, Hacker Halted, and H.O.P.E. In the early 1980s Hacker Groups became popular; Hacker groups provided access to information and resources, and a place to learn from other members. Hackers could also gain credibility by being affiliated with an elite group.

Hacking into the groups:White hat:A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system. The term "white hat" in Internet slang refers to an ethical hacker.

Black hat:-

A Black Hat Hacker is a hacker who "violates computer security for little reason beyond maliciousness or for

personal gain .Black Hat Hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.

Grey hat A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator Elite hacker A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.[10] Script kiddie A script kiddie(or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept. Neophyte A neophyte, "n00b", or newbie is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking. Blue hat A Blue Hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed.

Techniques of hacking:Password cracking Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Packet sniffer A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network. Spoofing attack (Phishing) A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. Rootkit A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security.

Viruses A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. Worms Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program. Key loggers A key logger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data.

Notable Hackers :-

Eric Corley, Gordon Lyon , Gary McKinnon , Kevin Mitnick , Rafael Nunez , Michael Zalweski.

Hacking Reports in Recent Years :2009




April 4: Conficker worm infiltrated millions of PCs worldwide including many government-level top-security computer networks]

2010


March 24: UN department of safety and security hacked by Turkish hacker Digital (1923Turk). January 12: Operation Aurora Google publicly reveals that it has been on the receiving end of a "highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google"

2011
 

The Hacker group Lulz security is formed September: Bangladeshi hacker Tiger-M@TE made world record in defacement history by hacking 700,000 websites in one shot.[36]

October 16: The YouTube channel of Sesame Street was hacked, streaming pornographic content for about 22 minutes.[37]

2012


Saudi hacker, 0xOmar, published over 400,000 credit cards online, and threatened Israel to release 1 million credit cards in the future.


In response to that incident, an Israeli hacker published over 200 Saudi's credit cards online.

Securing computers from hackers Instructions:- Basic Steps


o

1 Open "Start" and click on "All Programs." 2 Click on "Windows Update" and download the latest updates for your computer. 3 Reboot your computer after installing the required updates. 4 Open "Start" and open the "Control Panel." 5 Click on the "Security Center" or "Windows Firewall." 6 Click the "On" button to keep your computer safely guarded behind a firewall, preventing Internet traffic from indiscriminately accessing your computer

Thank You Made By: - Jayesh Kasera

Das könnte Ihnen auch gefallen