Sie sind auf Seite 1von 34

1

5/24/2013

SMVITM,BANTAKAL

HACKING

5/24/2013

SMVITM,BANTAKAL

5/24/2013

Contents:

Introduction What is HACKING? Who is HACKER? Who is cracker? History of hacking Types of hackers Basic hacking skills. Why do people hack

Language of hacker Most popular virus. Popular hacked sites. General hacking method. Types of hacking. Hacking tools and security.
SMVITM,BANTAKAL

5/24/2013

INTRODUCTION
What

is HACKING?

The Process Of Attempting To Gain Or Successfully Gaining, unauthorized Access To Computer Resources For The Purpose Of Help Or Secure System Is Called Hacking.
SMVITM,BANTAKAL

5/24/2013

Who is HACKER?
Hacker

Is Not Cyber Criminal. Intelligent Person Who Uses His Knowledge In Constructive Manner To Secure System & Never Damage Data Operating System. Different Holes.

SMVITM,BANTAKAL

5/24/2013

WHO IS CRACKER?
Person

Who Enter Into Others System And Violate The System, damage The Data, create Havoc Is Called Cracker. Is Cyber Criminal.

Cracker They

Can Be Easily Identified Because Their Actions.


SMVITM,BANTAKAL

5/24/2013

WHY DO CRACKERS EXIST?


Crackers

Exist Because Human Nature Is Just So, frequently Driven To Destroy Instead Of Create.

They

Are Used For Different Purpose Like For Profit, some Company Use Them For Disable The Competitor Company, for Cracks Credit Card Number.
SMVITM,BANTAKAL

5/24/2013

A Brief History of Hacking


Hacking has been around for more than a century. Early 1960s : At first, "hacker" was a positive term for a person. Early 1970s : The members of Californias Home Brew Club began making Blue Boxes.
SMVITM,BANTAKAL

5/24/2013

History
Early

1980s : In 1988 a "worm program" This was the beginning of the era of cyber attacks. The Computer Emergency response team is formed by U.S. Defense Agency. Today we have about 10,000 incidents of cyber attacks which are reported.
SMVITM,BANTAKAL

10

5/24/2013

History

Early 1990s : Russian hackers broke into the computers of Citibank Christopher Pile becomes the first person to be jailed for writing and distributing a computer virus. FBI Arrests 29-year-old New Jersey computer programmer, David L Smith. U.S. Defense Department Computers sustained 2,50,000 attacks by hackers.
SMVITM,BANTAKAL

11

5/24/2013

History
Early

2000s : Some of the most popular websites in the world Are being flooded with bogus requests for data. ILOVEYOU virus is unleashed and clogs computers worldwide released that manage to catch out companies that didn't do enough to protect themselves.
SMVITM,BANTAKAL

12

5/24/2013

Famous Hackers in History

Ian Murphy

Kevin Mitnick

Johan Helsinguis

Linus Torvalds

Mark Abene

Robert Morris
SMVITM,BANTAKAL

13

5/24/2013

Types of Hackers

SMVITM,BANTAKAL

14

5/24/2013

White-hat Hackers
The

good guys who identify the security weakness of the system or network and inform the owner about them.

SMVITM,BANTAKAL

15

5/24/2013

Black Hat Hackers


A

black hat is the villain or bad guy, who crash into victims security to steal information and destroy the victims security network. Also known as cracker.

SMVITM,BANTAKAL

16

5/24/2013

Grey hat Hackers


A

grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.

SMVITM,BANTAKAL

17

5/24/2013

Basic Hacking Skills


Learn how to program. This, of course, is the fundamental hacking skill. If you don't know any computer languages, you cant do hacking. Get one of the open-source Unix's and learn to use and run it

Learn how to use the World Wide Web and write HTML. To be worthwhile, your page must have content -- it must be interesting and/or useful to other hackers.
SMVITM,BANTAKAL

18

5/24/2013

Just

Show

Of Their Knowledge. Hack Other System Secretly. Destroy Enemys Computer Network During The War. For Profit People Pays A Cracker. Crack For Sake Of Curiosity.

For Fun. WHY DO PEOPLE HACK

SMVITM,BANTAKAL

19

5/24/2013

Language of hackers
1

-> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l

|\|

-> n |\/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x


SMVITM,BANTAKAL

20

5/24/2013

Example:
1

d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|\| 1 h4ck3d 1n

did not hack this page, it was like this when I hacked in.
SMVITM,BANTAKAL

21

5/24/2013

Random Fact !!!!


The

average age group of hackers are aged between 14-24 yrs.

SMVITM,BANTAKAL

22

5/24/2013

Most popular virus


Links

involving private pictures of celebrities. Links showing pictures of famous personalities like Gaddafis dead body or videos of Osama Bin Ladens killing. Facebook lottery scam.

SMVITM,BANTAKAL

23

5/24/2013

Popular Hacked sites


www.jntu.ac.in was hacked on 7 Nov 2010. www.songs.pk was hacked on 15 July 2011. Songs.pk

JNTU homepage after it was hacked

SMVITM,BANTAKAL

24

5/24/2013

General Hacking Methods


Identify the target system. Gathering Information on the target system. Finding a possible loophole in the target system. Exploiting this loophole using exploit code. Removing all traces from the log files and escaping without a trace.
SMVITM,BANTAKAL

25

5/24/2013

TYPES OF HACKING
THERE

ARE MANY TYPES OF HACKING LIKE :

IP Addresses Port

SMVITM,BANTAKAL

26

5/24/2013

IP ADDRESS:

Ip Address Is The Address Of Your Computer In The Internet. It Is Unique. An Ip Address Is A 32-bit Address Which Is Divided Into Four Fields Of 8-bits Each. For Example, 203.94.35.12. All Data Sent Or Received By A System Will Be Addressed From Or To The System. An Attackers First Step Is To Find Out The Ip Address Of The Target System.
SMVITM,BANTAKAL

27

5/24/2013

IP Addresses: Finding out an IP Address


A remote IP Address can easily be found out by any of the following methods: Through Instant Messaging Software Through Internet Relay Chat Through Your website Through Email Headers
SMVITM,BANTAKAL

28

5/24/2013

Finding an IP Address via Instant Messengers

Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friends system: Your System------Chat Server---Friends System Your System

Friends System---------Chat Server-------

Thus in this case, you first have to establish a direct connection with your friends computer by either sending him a file or by using the call feature. Then, go to MSDOS or the command line and type: C:\>netstat -n This command will give you the IP Address of your friends computer.

SMVITM,BANTAKAL

29

5/24/2013

PORT

It Is Not Physical Port But It Is Logical Port In Your Computer It Is Just Like Hole Onto The System. Through Hacker Can Enter There Are Thousands Of Ports Into Computer The Particular Service Is Running On Particular Port Like Port 21 : Ftp Port 23 : Telnet Port 80 : Http Port 25 : Mail
SMVITM,BANTAKAL

30

5/24/2013

HACKING TOOLS
THERE

ARE MANY TOOLS ARE AVILABLE SCANNERS TELNET FTP LAN WATCH

SMVITM,BANTAKAL

31

5/24/2013

NEED FOR SECURITY


SOME EXELLENT SOFTWARE CAN PROVIDE YOU BEST SECURITY LIKE TROJAN WINDOWS TROJANS ARE SMALL ASPECT OF WINDOWS SECURUTY FIREWALL FIREWALL IS ANY DEVICE USED TO PREVENT OUTSIDERS FROM GAINING ACCESS TO YOUR NETWORK
SMVITM,BANTAKAL

32

5/24/2013

Did you know ?


Social

networking sites like FACEBOOK,GMAIL,YAHOO comprised of 60% of direct or indirect hacking incidents.

SMVITM,BANTAKAL

33

5/24/2013

Conclusions
Computer

Security is a continuous battle

As computer security gets tighter hackers are getting smarter. VIDEO How Hacking Passwords Works YouTube.mp4
SMVITM,BANTAKAL

34

5/24/2013

SMVITM,BANTAKAL

Das könnte Ihnen auch gefallen