28
HACKING Presented by: Harendra Singh MCA

Hacking

Embed Size (px)

DESCRIPTION

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.

Citation preview

Page 1: Hacking

HACKING

Presented by: Harendra SinghMCA

Page 2: Hacking

INTRODUCTION THE PROCESS OF ATTEMPTING TO GAIN OR

SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO COMPUTER RESOURCES FOR THE PURPOSE OF HELP OR SECURE SYSTEM IS CALLED HACKING

HACKING IS TECHNIQUE IN WHICH ANY ONE CAN ACESS ANY ONE’S COMPUTER WITHOUT HIS PERMISSION

THE PERSON WHO IS DOING THIS TYPE OF WORK IS CALLED HACKER

Page 3: Hacking

HISTORY OF HACKING

1966 – ROBERT MORRIS INTRODUCES THE CONCEPT OF SAFE HACKING.

1969 – DEVELOPMENT IN THE FIELD OF HACKING.

1990 – ELECTRONIC FRONTIER FOUNDATION WAS FOUNDED.

1995 – MARK ANDREESSON & ERIC RELEASE MOSAIC.

Page 4: Hacking

WHO IS HACKER?

HACKER IS NOT CYBER CRIMINAL BUT HE IS THE VERY INTELLIGENT PERSON WHO IS USE HIS KNOWLEDGE IN CONSTRUCTIVE MANNER TO SECURE SYSTEM & NEVER DAMAGE DATA

HE KNOW ALL ABOUT THE OPERATING SYSTEM & DIFFERENT HOLES IN THE SYSTEM

Page 5: Hacking

WHO IS CRACKER?

PERSON WHO ENTER INTO OTHER’S SYSTEM AND VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE HAVOC IS CALLED CRACKER

CRACKER IS CYBER CRIMINAL

THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR ACTIONS ARE MALICIOUS

Page 6: Hacking

WHY DO CRACKERS EXIST? CRACKERS ARE EXIST BECAUSE HUMAN NATURE IS

JUST SO,FREQUENTLY DRIVEN BY TO DESTROY INSTEAD OF CREAT

THEY ARE USE FOR DIFFERENT PURPOSE LIKE FOR PROFIT,SOME COMPANY USE THEM FOR DISABLE THE COMPITITOR COMPANY,FOR CRACKS CREDIT CARD NUMBER

Page 7: Hacking

DIFFERENCE BETWEEN HACKER & CRACKER

HACKER

HACKER’S PROGRAMS TO CHECK INTIGRITY OF OTHER PROGRAMS.THUS WHEN HACKER CREATE PROGRAM IT AUTOMATICALLY CHECK REMOTE MACHINE SECURITY STRUCTURE

THEY ALWAYS DO CONTRUCTIVE WORK

CRACKER

CRACKERS RARELY MAKE THEIR OWN PROGRAM .INSTEAD ,THEY STEAL TOOL,PROGRAMS FROM OTHERS

CRACKERS CREATES NOTHING & DESTROY MUCH

Page 8: Hacking

WHICH OPERATING SYSTEM HACKER USE ?

SUN

UNIX

MICROSOFT

Page 9: Hacking

SUN

HACKERS USING EITHER SOLARIC X86 OR SCO AS A PLATFORM.

THIS IS BECAUSE THESE PRODUCTS ARE LICENSE WARE & THEY CAN EASILY BE OBTAINED.

Page 10: Hacking

UNIX

POPULAR PLATFORM BECAUSE THEY REQUIRED A LOW OVERHEAD.

WE CAN RUN LINUX ON A PALTRAY 386 AND GAIN GOOD PERFORMANCE.

THIS IS REASONABLE.

Page 11: Hacking

MICROSOFT

THIS SUPPORTS MANY SECURITY TOOLS THAT CAN BE USED TO ATTACK REMOTE MACHINE.

IT HAS ADVANCED TOOLS FOR NETWORKING AS WELL.

Page 12: Hacking

WHY DO PEOPLE HACK ?

JUST FOR FUN.SHOW OF THEIR KNOWLEDGE.HACK OTHER SYSTEM SECRETLY.DESTROY ENEMY’S COMPUTER NETWORK

DURING THE WAR.FOR PROFIT PEOPLE PAYS A CRACKER.CRACK FOR SAKE OF CURIOCITY.

Page 13: Hacking

THE PSYCOLOGY OF HACKERS

ALL INFORMATION SHOULD BE FREE.ACCESS TO COMPUTER SHOULD BE

UNLIMITED AND FREE.IT CAN CHANGE LIFR FOR BETTER.IT CAN CREATE BEAUTY ON COMPUTER.

Page 14: Hacking

TYPES OF HACKING

THERE ARE MANY TYPES OF HACKING LIKE• PASSWORD HACKING• SOFTWARE HACKING• NET HACKING

Page 15: Hacking

PASSWORD HACKING TWO TYPES1. BRUTE FORCE• IN THAT CASE HACKERS TRY OUT ALL THE

COMBINATION OF ALL KEYBOARD LETTERS .IT HAS GRATER SUCCESS BUT IT TAKES LONG TIME

2. DICTIONARY BASED• IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS

UNSUCCESSFUL METHOD

Page 16: Hacking

SOFTWARE HACKING

IN THAT HACKERS CHANGES THE LOOK & EXCUTION WAY OF THAT SOFTWARE

CHANG THE DEMO VERSION INTO FULL VERSION BY DECODE THE SOURCE CODE

Page 17: Hacking

IP ADDRESS

IP ADDRESS IS THE ADDRESS OF YOUR COMPUTER IN THE INTERNET

IT IS UNIQ

LIKE 192.168.23.45

Page 18: Hacking

PORT IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR

COMPUTER IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER

CAN ENTER THERE ARE THOUSANDS OF PORTS INTO COMPUTER THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT LIKE PORT 21 : FTP

PORT 23 : TELNET PORT 80 : HTTP PORT 25 : MAIL

Page 19: Hacking

HACKING TOOLS

THERE ARE MANY TOOLS ARE AVILABLE:

• SCANNERS• TELNET• FTP• LAN WATCH

Page 20: Hacking

SCANNERS IT IS NOT A PHOTO SCANNER SCANNER IS PROGRAM THAT AUTOMATICALLY

DETECTS SECURITY WEAKNESS IN REMOTE HOST PORT SCANNERS ARE USE IN HACKING PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN

PORT ON THAT SYSTEM AND WHICH SERVICE IS RUNNING ON THAT

IT CAN USE ALMOST ALL OPERATING SYSTEM EX. SATAN,NMAP

Page 21: Hacking

TELNET

TELNET IS ALTIMATE HACKING TOOL IT IS TERMINAL EMULATION PROGRAM THAT

ALLOW US TO CONNECT TO REMOTE SYSTEM YOU HAVE TO FOLLOW THIS STEP TO USE

TELNET C:\WINDOWS\TELNET [IP ADDRESS] PORT

Page 22: Hacking

FTP

FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS USE AS HACKING TOOL

PORT 21 FOR THE FTP FOR CONNECTING FTP WE NEED SOME FTP S/W

KNOWN AS FTP CLIENT FOR CONNECTING FTP SERVER YOU HAVE TO

HAMMERING THAT SERVER COMMAND: C:\WINDOWS\FTP [IP ADDRESS]:PORT

Page 23: Hacking

LAN WATCH

LAN WATCH IS A SOFTWARE WHICH NOT ATTACK AND NOT DAMAGE REMOTE NETWORK

BUT IT KEEP WATCH ON THE REMOTE NETWORK & GIVE ALL THE INFORMATION WHAT IS GOING ON THAT NETWORK

Page 24: Hacking

ATTACKS

THERE ARE MANY TYPES OF ATTACKS:

• SPOOFING ATTACK• TELNET BASED ATTACK• DOS (Daniel of service) ATTACK• PING OF DEATH• DISTRIBUTED DOS ATTACK• MAILBOMBS

Page 25: Hacking

NEED FOR SECURITY

SOME EXELLENT SOFTWARE CAN PROVIDE YOUBEST SECURITY

LIKE:• TROJAN• FIREWALL

Page 26: Hacking

TROJAN

WINDOWS TROJANS ARE SMALL ASPECT OF WINDOWS SECURUTY

TROJAN IS UNOTHORIZED PROGRAM CONTAINED WITHIN A LEGIMATE PROGRAM

THIS PROGRAM PERFORMS FUNCTION UNKNOWN BY USER

Page 27: Hacking

FIREWALL

FIREWALL IS ANY DEVICE USED TO PREVENT OUTSIDERS FROM GAINING ACCESS TO YOUR NETWORK

TYPES OF FIREWALLS:• PACKET FILTER • APPLICATION PROXY• PACKET INSPECTION

Page 28: Hacking

CONCLUSION