21
PREPARED BY : PREPARED BY : Harsh patel dhruv patel sreejit sundar

PREPARED BY : Harsh patel dhruv patel sreejit sundaram

Embed Size (px)

DESCRIPTION

HACKER  HACKER are intelligent computer professionals who are Interested in learning advanced techniques about operating system programming languages and application software.  HACKER try to gain in depth knowledge of a system and use that information to find out the possible security gaps in a system HACKER share their knowledge with other people and this increase security awarness.

Citation preview

Page 1: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

PREPARED BY :PREPARED BY :

Harsh patel dhruv patel sreejit sundaram

Page 2: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

INTRODUCTION TO HACKINGINTRODUCTION TO HACKING

HACKING means going to into system and HACKING means going to into system and exploring the hosts system and getting whateverexploring the hosts system and getting whatever information you need and getting yourself out information you need and getting yourself out

and and clearing your trails without getting yourself clearing your trails without getting yourself

busted.busted.

Page 3: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

HACKERHACKER

HACKER are intelligent computer professionals HACKER are intelligent computer professionals who are Interested in learning advanced who are Interested in learning advanced techniques about operating system techniques about operating system programming languages and application programming languages and application software.software.

HACKER try to gain in depth knowledge of a HACKER try to gain in depth knowledge of a system and use that information to find out the system and use that information to find out the possible security gaps in a system HACKER share possible security gaps in a system HACKER share their knowledge with other people and this their knowledge with other people and this increase security awarness. increase security awarness.

Page 4: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

CRACKERCRACKER

CRACKER are individual who break into CRACKER are individual who break into computer with malicious intent .computer with malicious intent .

CRACKER try to get unauthorized access CRACKER try to get unauthorized access into a system and cause damage or destroy into a system and cause damage or destroy confidential information.confidential information.

They break into or otherwise violate the They break into or otherwise violate the system integrity of remote machines, with system integrity of remote machines, with evil intent. evil intent.

Page 5: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

ETHICS OF HACKINGETHICS OF HACKING

Essentially, hackers are intelligent computer programmerEssentially, hackers are intelligent computer programmer Who follow an ethic:Who follow an ethic: Hackers should never harm the system they break into.Hackers should never harm the system they break into. Hackers believe that:Hackers believe that: Access to computer should be unlimited and total.Access to computer should be unlimited and total. All information should be free.All information should be free. Authorities should be mistrusted and decentralizationAuthorities should be mistrusted and decentralization Promoted.Promoted. Hackers should create the beauty of a computer.Hackers should create the beauty of a computer. Hackers should be judged by their hacking skills.Hackers should be judged by their hacking skills.

Page 6: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

TYPES OF SECURITYTYPES OF SECURITY

Network security violations can be broadly divided Network security violations can be broadly divided into into

five distinct area:five distinct area: AUTHENFICATION:AUTHENFICATION: ACCESS CONTROL:ACCESS CONTROL: DATA INTEGRITY:DATA INTEGRITY: DATA CONFIDENTIALITY:DATA CONFIDENTIALITY: DENIAL OF SERVICE ATTACKS:DENIAL OF SERVICE ATTACKS:

Page 7: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

FIREWALLFIREWALL

A FIREWALL is a network security system A FIREWALL is a network security system designed to prevent unauthorized access to a designed to prevent unauthorized access to a private network from any other network.private network from any other network.

Typically, it works closely with a router program Typically, it works closely with a router program to determine if a packet should be forwarded to to determine if a packet should be forwarded to its destination. its destination.

It also provides a proxy service that makes It also provides a proxy service that makes network requests on behalf of the users on a network requests on behalf of the users on a network.network.

Page 8: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

TYPES OF FIREWALLTYPES OF FIREWALL

ROUTER-BASED FIREWALL:ROUTER-BASED FIREWALL:

Page 9: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

PROXY-BASED FIREWALL:PROXY-BASED FIREWALL:

Page 10: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

What does a firewall do?

A firewall can analyze all the traffic between a network and the

Internet. It is examines all the traffic between two networks. it is routed between the networks, otherwise it is stopped. It checks the protocol which the packet being delivered and also check port number to which it is being sent. The main function of firewall is to provide centralized access control on how users use the network.

Page 11: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

What can’t a firewall do?

A firewall cannot prevent individual users with modems from dialing into or out of the network, bypassing the firewall altogether. If employee can do some mistakes so it can’t be controlled by firewall. the planning of any security policy but that cannot be solved with firewalls alone.

Page 12: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

Who needs a firewall? Any person who is responsible for a private network and connect with a public network. For more a person who connect so much as single computer with internet via modem needed personal firewall. Many dial-up users believe that other types of protection will protect them.They are feel that no one can break their security in the computer. Some dial-up users have victims of major attacks and they lost their files and also a lots of work.

Page 13: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

IP-ADDRESSIP-ADDRESS

Every system connected to a particular Every system connected to a particular network has a unique identification said IP network has a unique identification said IP address or internet protocol address Which is address or internet protocol address Which is just as in real world every person has his own just as in real world every person has his own contact address.contact address.

Getting the internet protocol or the IP address Getting the internet protocol or the IP address of a remote system is said to the most of a remote system is said to the most important step in hacking of a system.important step in hacking of a system.

Page 14: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

STRUCTURE OF IP ADDRESSSTRUCTURE OF IP ADDRESS

IP address divided into a number of classes which IP address divided into a number of classes which have different ranges.have different ranges.

Class A: 8 bits for Netid & 24 bits for Hostid.Class A: 8 bits for Netid & 24 bits for Hostid.Class B: 16 bits for Netid & 16 bits for Hostid.Class B: 16 bits for Netid & 16 bits for Hostid.Class C: 24 bits for Netid & 8 bits for Hostid.Class C: 24 bits for Netid & 8 bits for Hostid.Class D: 32-bit multicast Groupid.Class D: 32-bit multicast Groupid.Class E: Currently not in use.Class E: Currently not in use.

Page 15: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

ABOUT THE PORTSABOUT THE PORTS

Ports are virtual pipes that allow internet Ports are virtual pipes that allow internet services such as file transfer protocol and e-services such as file transfer protocol and e-mail exchange to share a single physical mail exchange to share a single physical connection.connection.

Usually hackers run a port scanning program Usually hackers run a port scanning program to list the ports available and then find out to list the ports available and then find out websites that lists weakness & try to get a websites that lists weakness & try to get a match for target system. match for target system.

Page 16: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

TYPES OF PORTSTYPES OF PORTS

There are mainly five types of ports available.There are mainly five types of ports available.

Port NoPort No ServicesServicesNo –21No –21 FTPFTPNo –23No –23 TelenetTelenetNo –25No –25 SMPTSMPTNo –80No –80 HTTP-appacheHTTP-appacheNo –125No –125 POP3POP3

Page 17: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

HOW TO HACKHOW TO HACK

There are four steps to hacking.There are four steps to hacking. Step-1Step-1: Getting access to site : Getting access to site Using ports through internet hacker Using ports through internet hacker

gets an access to target system.gets an access to target system.

Step-2Step-2: Gaining control of the system: Gaining control of the system Now hacker take the overall control Now hacker take the overall control

of the target system. of the target system.

Page 18: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

HOW TO HACKHOW TO HACK

Step3Step3: : Covering TracesCovering Traces Hacker finds the path to hack Hacker finds the path to hack

anything in the target system.anything in the target system.

Step4Step4: : Keeping that AccountKeeping that Account Hacker never use his personal Hacker never use his personal

account to hack anything.account to hack anything.

Page 19: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

ATTITUDE OF HACKERATTITUDE OF HACKER

A true hacker has a purpose and a reason for A true hacker has a purpose and a reason for breaking into any box.A true hacker why is doing whatbreaking into any box.A true hacker why is doing what

he does and is doing it for reason like knowledge freehe does and is doing it for reason like knowledge free information and access.information and access. so if you want to be Hacker,repeat the following so if you want to be Hacker,repeat the following

things until you believe them.things until you believe them.

The world is full of fascinating problems waiting to be The world is full of fascinating problems waiting to be solved .solved .

Page 20: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

Nobody should ever have to solve a problem Nobody should ever have to solve a problem twice.twice.

Boredom and drudgery are evil.Boredom and drudgery are evil.

Freedom is good.Freedom is good.

Attitude is no substitute for competence. Attitude is no substitute for competence.

Page 21: PREPARED BY : Harsh patel dhruv patel sreejit sundaram

BIBLIOGRAPHYBIBLIOGRAPHY

Hacking tools & techniques by NIIT.Hacking tools & techniques by NIIT.

Basics of network security, firewalls by NIIT.Basics of network security, firewalls by NIIT.

Internet. Internet. www.vicomsoft.com www.darwinmag.com www.5starsupport.com www.pwcrack.com