Sie sind auf Seite 1von 37

What is hacking ?

Unauthorized use, or attempts to bypass


the security mechanisms of an information
system or network.

Hacking means illegally accessing other


people's computer systems for destroying,
disrupting or carrying out illegal activities
on the network or computer systems.

FLOW CHART OF HACKING

Who is a Hacker ?

A hacker is someone who focuses on security


mechanisms.
A hacker is someone who illegally breaks into
computer and network systems.
A hacker is involved in computer security/insecurity,
specializing in the discovery of exploits in systems .
A hacker is some one who access someones
Database , Account etc without his/her prior permission.

HACKER

TYPES OF HACKER
White

hat
Grey hat
Blue Hat
Black Hat
Script kiddie
Hacktivist

WHITE HAT HACKER


White Hat Hacker is an ethical hacker who
breaks security but who does for harmless
reasons .

GRAY HAT HACKER


They usually do

not hack for personal gain or


have malicious intentions, but may or may not
occasionally commit crimes during the course
of their technological exploits.

BLUE HAT HACKER


Blue

Hat Hackers are those which are


refers to outside computer security
consulting.
A security professional invited by a
company to find the week points of here
system.

BLACK HAT HACKER


Black

Hat Hackers are


those who subverts
computer security without
authorization .
They uses technology for
terrorism, credit card
fraud, identity theft ,
etc.

SCRIPT KIDDIE
A person

who simply follows directions or


uses a cook-book approach without fully
understanding the meaning of the steps
they are performing are called Script Kiddie.
They uses programs developed by others to
attack computer systems, and deface
websites.

Hacktivist
Hacktivism

is described as hacking for a


political cause .
Hacktivist activities span many political ideals
and issues.
Hacktivism (a fusion of hack and activism) is
often understood as the writing of code, or
otherwise manipulating bit, to promote political
ideology - promoting expressive politics, free
speech, human rights, or information ethics.

HOW THE HACKERS WORK ?


Social

engineering.
Password cracking .
Packet and password
sniffing.
IP spoofing .
Trojan Horses .
Worms & Viruses.
Trap Door or back door.
TCP-SYN flooding.

SCOCIAL ENGINEERING

classic social engineering trick is for a hacker to send email claiming to be


a system administrator. The hacker will claim to need your password for
some important system administration work, and ask you to email it to
him/her.

Password Cracking

In Password Cracking a hacker will try to get a password via a


"dictionary attack" .

PACKET & PASSWORD SNIFFING

In this method hackers scan all the messages which traverse a


network looking for passwords . If someone logs in to a computer
across a network, and some other computer on the network has
been compromised this way, the person may unwittingly give
his/her password to the attacker

IP SPOOFING

IP source routing is an option that can be used to specify a direct


route to a destination and return path back to the origination.

TROZAN HORSES

A Trojan horse is a program which hides itself in another apparently


running program.

WORMS & Viruses


A worm is an autonomous agent capable of propagating itself
without the use of another program or any action by a person

Working Of Viruses

Trap Door & Back Door

A trap door or back door is an entry point into a computer system


that bypasses the normal security measures

TCP-SYN Flooding
When a system (called the client) attempts to establish a TCP
connection to a system providing a service (the server), the
client and server exchange a set sequence of messages .

Ways to secure the unsecured


Internet

Firewalls
Password Protection and generation of
safe passwords
Encryption
IP spoofing and SYN-flooding
IP Restriction
Education and awareness

Internet Firewalls
Firewalls

provide digital protection


associated with the rapid growth of
internetworking and commercialisation of
the Internet.
A firewall sits at the junction point or
gateway between the two networks,
usually a private network and a public
network such as the Internet.

Password Protection and


generation of safe passwords
We have to use safe passwords and mainly
we use these two techniques for this
purpose.

Shadow password
Generation of "secure" passwords

Encryption
Encryption

is the method which permits


users to send messages that can be
understood (decrypted) only by the
intended recipient.
Example: When Sender send a secure
message to Receiver, then he will use
public key to encrypt the message. And
the Receiver will use his private key to
decrypt it.

IP spoofing and SYN-flooding


It

is impossible to eliminate IP-spoofed


packets. But we try to reduce the number
of IP-spoofed packets entering and exiting
the network.
The best method is to install a filtering
router.

IP Restriction
IP Restriction

is a very common thing to


do to limit a user to parts of the server.
We can use some I.P. protection tools to
protect our I.P.
e.g. Millennium I.P. protection

Education and awareness


One

of the major causes of the insecurity


of a system is the lack of awareness.
By "lack of awareness" I mean that
Internet user think that the only way a
hacker can break into their account or the
system is through some secret back door
left open by careless administrators.

more about Firewall


Firewall, in computer security, a device that
blocks unauthorized access to an organization's
local area network (LAN). A firewall can reside on
the administrative computer (the server) that acts
as the local area network's gateway to the
Internet or it can be a dedicated computer placed
between the local area network and the Internet,
so that the network is never in direct contact with
the Internet. The firewall also keeps track of every
file entering or leaving the local area network in
order to detect the sources of viruses and other
problems that might enter the network.

A FIRE WALL MODEL

A FIREWALLS PROTECTION

SOME SECURITY TIPS

Store your backup off-site


Don't stick your password on the front of
your system
Encryption is the best method for
sending the secured data.
Always use the Firewalls protection.
Always use the updated Anti-Virus.
Always use some I.P. Defender tools like
I.P. Protection.

SOME SECURITY TIPS

Do not open the suspicious Mails and Sites.


Do not install any suspicious software.
Always select your passwords in a secure
manner as described above.
Try to use password protection techniques like
shadow password.
Be aware about New Viruses, Protection
Techniques, Firewalls, Anti-Viruses, worms...etc

Conclusion
The only system which is truly secure is one
which is switched off and unplugged, locked in a
titanium lined safe, buried in a concrete bunker,
and is surrounded by nerve gas and very highly
paid armed guards. Even then, I wouldn't stake
my life on it."
It is true that we cant finish hacking but its true
that we can stop Hacking.

THANK YOU!!!

Das könnte Ihnen auch gefallen