Upload
deepak-dedha
View
670
Download
2
Tags:
Embed Size (px)
Citation preview
HACKING AND
CRACKING
BY:Deepak DedhaVanketesh MishraAayush Yadav
Objectives of Hacking and Cracking
What is Hacking?
Difference between Hacking and
cracking
Types of Hackers
Types of Hacking Techniques
Preventive measures
Some Cracking Examples
HACKING
Authorized or Unauthorized
attempts to bypass the security
mechanisms of an information
systems or network
In simple words Hacking means
finding out weaknesses in a
computer or computer network
Why do people hack ?
Just for fun
Hack other systems secretly
Notify many people their thought
Steal important information
Destroy enemy’s computer network
Literal DefinitionsHacker :
Someone who uses hacks.
Cracker :
some one who destructs
things.
Hacks :
A different approach with
some significant advantage over the
current approach
Types of Hackers
White-hat Hackers
The good guys who identify the
security weakness of the system or
network and inform the owner about
them
Black Hat Hackers
A black hat is the villain or
bad guy, who crash into victim‟s
security to steal information and
destroy the victims security
network.
Grey hat Hackers
A grey hat, in the hacking community,
refers to a skilled hacker who is
somewhere in between white and
black hat hackers
Pretexting
Phishing
Pretexting:
Pretexting is the act of creating and using an
invented scenario to persuade a target to release
information (e.g. date of birth, Social Security Number, last
bill amt.)
Phishing:Phishing is an e-mail fraud method in which the
perpetrator sends out email in an attempt to gather
personal and financial information from recipients.
Phishers attempt to fraudulently acquire
sensitive information, such as usernames, passwords and
credit card details .Ebay and PayPal are two of the most
targeted companies, and online banks are also common
targets
Language of hackers
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|\| -> n
|\/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
Example:
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|\| 1 h4ck3d 1n
I did not hack this page, it was like this when I hacked in.
World famous hackers
Stephen Wozniac
Tsutomu Shimomura
Kevin Mitnick
Kevin Poulsen
Random Fact !!!!
The average age group of
hackers are aged between 14-24
yrs. …
Did you know ?
Social networking sites like
„FACEBOOK‟, ‟GMAIL‟,
‟YAHOO” comprised of 60% of
direct or indirect hacking
incidents.
Most popular virus
Links involving private pictures
of celebrities.
Links showing pictures of
famous personalities like
videos of Osama Bin Laden‟s
killing.
Another popular scam
Facebook lottery scam.
Preventive measures
Install a strong anti-virus
Always run a anti-virus check before you
download a program or a file from the
internet.
Avoid disclosing personal details like
phone number, credit card details to
strangers.
A good firewall (Sygate personal)
A good spy ware / Trojan buster.
Use of genuine software
How to become Hacker
The best approach is to gain as much
knowledge about stuff as you can.
Good command over C / C++ / Perl will
definitely help.
But above all you need a good logical
brain.
Some Examples of Cracking
Windows Cracking
1).BIOS Password
Breaking
2).Windows Logon
Password Breaking
Bios password breaking
We can break BIOS password in any one of the following ways:
Trying default password
Hardware approach
Trying default passwords some default BIOS passwords
Lkwpeter AMI cmos
j262 Award AMI!SW1
AWARD_SW bios AMI? SW1
AWARD_PW BIOS password
Biostar setup hewittrand
„j262‟ opens most version of Award bios; it works about 80 per
cent of the time
Hardware approach
If the default passwords did not work, then try to reset the Bios to its default settings so that it asks for no password at all. Procedure for hardware approach is as follows
First, we have to open the computer and then look for a round lithium battery, it probably looks like a silver coin. So, remove the battery and after 30 seconds or so put it back.
Window log on password
breaking
To hack windows login password, reboot and wait for the message:
When we see the boot menu on the screen, press F2 or F12 before “Starting
Windows 9x…” . The boot menu will come up. Select option to boot into DOS
.
C:\>cd windows
C:\windows>ren *.pwl *.xyz // RENAME
Or delete them by typing
C:\windows>del *.pwl *.xyz //DELETE
Easy and Simple approachOn many computers a series of
keystrokes may crash the password program.
keep pressing ESC 15 to 20 times . This will result in the crashing of the password program and the computer will continue booting .
BY BOOTING
We can break into a computer by using live tools like conboot live cd which are readly available on internet .The live cd can be used to make a bootable pen drive and then we can break into any computer.