Beruflich Dokumente
Kultur Dokumente
5/24/2013
SMVITM,BANTAKAL
HACKING
5/24/2013
SMVITM,BANTAKAL
5/24/2013
Contents:
Introduction What is HACKING? Who is HACKER? Who is cracker? History of hacking Types of hackers Basic hacking skills. Why do people hack
Language of hacker Most popular virus. Popular hacked sites. General hacking method. Types of hacking. Hacking tools and security.
SMVITM,BANTAKAL
5/24/2013
INTRODUCTION
What
is HACKING?
The Process Of Attempting To Gain Or Successfully Gaining, unauthorized Access To Computer Resources For The Purpose Of Help Or Secure System Is Called Hacking.
SMVITM,BANTAKAL
5/24/2013
Who is HACKER?
Hacker
Is Not Cyber Criminal. Intelligent Person Who Uses His Knowledge In Constructive Manner To Secure System & Never Damage Data Operating System. Different Holes.
SMVITM,BANTAKAL
5/24/2013
WHO IS CRACKER?
Person
Who Enter Into Others System And Violate The System, damage The Data, create Havoc Is Called Cracker. Is Cyber Criminal.
Cracker They
5/24/2013
Exist Because Human Nature Is Just So, frequently Driven To Destroy Instead Of Create.
They
Are Used For Different Purpose Like For Profit, some Company Use Them For Disable The Competitor Company, for Cracks Credit Card Number.
SMVITM,BANTAKAL
5/24/2013
5/24/2013
History
Early
1980s : In 1988 a "worm program" This was the beginning of the era of cyber attacks. The Computer Emergency response team is formed by U.S. Defense Agency. Today we have about 10,000 incidents of cyber attacks which are reported.
SMVITM,BANTAKAL
10
5/24/2013
History
Early 1990s : Russian hackers broke into the computers of Citibank Christopher Pile becomes the first person to be jailed for writing and distributing a computer virus. FBI Arrests 29-year-old New Jersey computer programmer, David L Smith. U.S. Defense Department Computers sustained 2,50,000 attacks by hackers.
SMVITM,BANTAKAL
11
5/24/2013
History
Early
2000s : Some of the most popular websites in the world Are being flooded with bogus requests for data. ILOVEYOU virus is unleashed and clogs computers worldwide released that manage to catch out companies that didn't do enough to protect themselves.
SMVITM,BANTAKAL
12
5/24/2013
Ian Murphy
Kevin Mitnick
Johan Helsinguis
Linus Torvalds
Mark Abene
Robert Morris
SMVITM,BANTAKAL
13
5/24/2013
Types of Hackers
SMVITM,BANTAKAL
14
5/24/2013
White-hat Hackers
The
good guys who identify the security weakness of the system or network and inform the owner about them.
SMVITM,BANTAKAL
15
5/24/2013
black hat is the villain or bad guy, who crash into victims security to steal information and destroy the victims security network. Also known as cracker.
SMVITM,BANTAKAL
16
5/24/2013
grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.
SMVITM,BANTAKAL
17
5/24/2013
Learn how to program. This, of course, is the fundamental hacking skill. If you don't know any computer languages, you cant do hacking. Get one of the open-source Unix's and learn to use and run it
Learn how to use the World Wide Web and write HTML. To be worthwhile, your page must have content -- it must be interesting and/or useful to other hackers.
SMVITM,BANTAKAL
18
5/24/2013
Just
Show
Of Their Knowledge. Hack Other System Secretly. Destroy Enemys Computer Network During The War. For Profit People Pays A Cracker. Crack For Sake Of Curiosity.
SMVITM,BANTAKAL
19
5/24/2013
Language of hackers
1
|\|
20
5/24/2013
Example:
1
d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|\| 1 h4ck3d 1n
did not hack this page, it was like this when I hacked in.
SMVITM,BANTAKAL
21
5/24/2013
SMVITM,BANTAKAL
22
5/24/2013
involving private pictures of celebrities. Links showing pictures of famous personalities like Gaddafis dead body or videos of Osama Bin Ladens killing. Facebook lottery scam.
SMVITM,BANTAKAL
23
5/24/2013
SMVITM,BANTAKAL
24
5/24/2013
Identify the target system. Gathering Information on the target system. Finding a possible loophole in the target system. Exploiting this loophole using exploit code. Removing all traces from the log files and escaping without a trace.
SMVITM,BANTAKAL
25
5/24/2013
TYPES OF HACKING
THERE
IP Addresses Port
SMVITM,BANTAKAL
26
5/24/2013
IP ADDRESS:
Ip Address Is The Address Of Your Computer In The Internet. It Is Unique. An Ip Address Is A 32-bit Address Which Is Divided Into Four Fields Of 8-bits Each. For Example, 203.94.35.12. All Data Sent Or Received By A System Will Be Addressed From Or To The System. An Attackers First Step Is To Find Out The Ip Address Of The Target System.
SMVITM,BANTAKAL
27
5/24/2013
A remote IP Address can easily be found out by any of the following methods: Through Instant Messaging Software Through Internet Relay Chat Through Your website Through Email Headers
SMVITM,BANTAKAL
28
5/24/2013
Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friends system: Your System------Chat Server---Friends System Your System
Thus in this case, you first have to establish a direct connection with your friends computer by either sending him a file or by using the call feature. Then, go to MSDOS or the command line and type: C:\>netstat -n This command will give you the IP Address of your friends computer.
SMVITM,BANTAKAL
29
5/24/2013
PORT
It Is Not Physical Port But It Is Logical Port In Your Computer It Is Just Like Hole Onto The System. Through Hacker Can Enter There Are Thousands Of Ports Into Computer The Particular Service Is Running On Particular Port Like Port 21 : Ftp Port 23 : Telnet Port 80 : Http Port 25 : Mail
SMVITM,BANTAKAL
30
5/24/2013
HACKING TOOLS
THERE
ARE MANY TOOLS ARE AVILABLE SCANNERS TELNET FTP LAN WATCH
SMVITM,BANTAKAL
31
5/24/2013
SOME EXELLENT SOFTWARE CAN PROVIDE YOU BEST SECURITY LIKE TROJAN WINDOWS TROJANS ARE SMALL ASPECT OF WINDOWS SECURUTY FIREWALL FIREWALL IS ANY DEVICE USED TO PREVENT OUTSIDERS FROM GAINING ACCESS TO YOUR NETWORK
SMVITM,BANTAKAL
32
5/24/2013
networking sites like FACEBOOK,GMAIL,YAHOO comprised of 60% of direct or indirect hacking incidents.
SMVITM,BANTAKAL
33
5/24/2013
Conclusions
Computer
As computer security gets tighter hackers are getting smarter. VIDEO How Hacking Passwords Works YouTube.mp4
SMVITM,BANTAKAL
34
5/24/2013
SMVITM,BANTAKAL