17
What is hacking?

Basic Introduction to hacking

Embed Size (px)

DESCRIPTION

How to be a real hacker? hacking is not a child play.

Citation preview

Page 1: Basic Introduction to hacking

What is hacking?

Page 2: Basic Introduction to hacking

Contents (1)

Who is hacker?Types of hackingWhy do hackers hack?Hacking demo on a live websiteSome hacked passwordsWhat hackers do after hacking?What do hackers know?

Page 3: Basic Introduction to hacking

Who is hacker? (1)

Hack Cut with repeated irregular blows Examine something very minutely

Hacker The person who hacks

Cracker System intruder/destroyer

Page 4: Basic Introduction to hacking

Who is hacker? (2)

Hacker means cracker nowadays Meaning has been changed

Page 5: Basic Introduction to hacking

Types of hackers

1)White hat

2)Gray hat

3)Black hat

Page 6: Basic Introduction to hacking

Types of hacking

Normal

data transfer

Interruption Interception

Modification

Page 7: Basic Introduction to hacking

Types of hacking

key loggingSniffingMan in the middleSession hijackingSocial engineeringSystem hackingDos, DdosSession hijackingSql injection and many more.

Page 8: Basic Introduction to hacking

Why do hackers hack?

Just for funShow offTo clarify the doubts in relationshipNotify many people their thoughtSteal important informationDestroy enemy’s computer network during

the warTo earn money

Page 9: Basic Introduction to hacking

What do hackers do after hacking? (1)

Patch security hole The other hackers can’t intrude

Clear logs and hide themselvesInstall rootkit ( backdoor )

The hacker who hacked the system can use the system later

It contains trojans.

Page 10: Basic Introduction to hacking

What do hackers do after hacking? (2)

Install exploit programInstall denial of service programUse all of installed programs silently

Page 11: Basic Introduction to hacking

How can be a real hacker?

Study C/C++/assembly languageStudy computer architectureStudy operating systemStudy computer networkExamine the hacking tools for a monthThink the problem of the computer

Page 12: Basic Introduction to hacking

Why can’t we defend against hackers?

There are many unknown security holeHackers need to know only one security hole

to hack the systemAdmin need to know all security holes to

defend the system

Page 13: Basic Introduction to hacking

How to protect the system? (1)

Patch security hole oftenEncrypt important dataDo not run unused daemonSetup loghostUse firewallsBackup the system often

Page 14: Basic Introduction to hacking

Deep freeze

Download deepfreeze and install it and later restart the system

Page 15: Basic Introduction to hacking

What to do after hacked?

Shutdown the systemRemove the network cableRestore the system with the backup

Or reinstall all programs

Connect the system to the network

Page 16: Basic Introduction to hacking

How to translate the hackers’ language (1)

1 -> i or l3 -> e4 -> a7 -> t9 -> g0 -> o$ -> s| -> i or l

|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x

Page 17: Basic Introduction to hacking

How to translate the hackers’ language (2)

Ex) 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1

h4ck3d 1n

I did not hack this page, it was like this when I hacked in