Upload
ankit-sarode
View
276
Download
5
Tags:
Embed Size (px)
DESCRIPTION
Introduction to ethical hacking. what is hacking what types of hackers difference between hackers and crackers history of hacking types of hackers.
Citation preview
Welcome
Hacking
• What is Hack?• -To Modify or Crack a program , often in
an anauthorise manner, by changing the code itself.
• Who is hacker?• -The person who is consistently engaging
in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice is called hacker.
What is the meaning of hacking?
Hacking is the technique of modifying the features of system. In order to accomplish a goal outside of the creator's original purpose.
Differnce Between Hacker and Cracker?
Hacker:The person who hacks the system
Cracker:The person who destroy the system or intrude the system.
History Of Hacking.
• The first hacker was appeared in 1960's at the Massachusetts Institute of Technology (MIT)
• During the 1970's, a different king of hacker appeared:Phone Phreaker Or Phone Hacker.
•In the 1980's, phreaks started to migrate to computer, and the first Bulletin Board System (BBS) appeared.
•During The 1990's, When the use of internet wide spread around the world, Hackers multiplied.
Diffrence between Hacker and ethical Hacker.
• Hacker:-The person who access the computersystem or network without authorization.• Ethical hacker:-The person who performs the sameactivities but with owenr's permission.Employed by companies to performpenetration test.
Types of Hackers.
White Hats Srcript KiddiesBlack Hats
Spy Hackers
Grey Hats
State Sponsored HackerSuicide Hackers Cyber Terrorist
Hacking Process
1.Footprinting
2.Scanning
3.Enumeration
4.Attack And Gaining Access
5.Escalating Privilages ,Covering Tracks &
and creating Backdoors
Hacking Process Explanation
• Footprinting:
Footprinting is the technique of gathering
information about computer systems and the
entities they belong to.• Scanning:
Port scanning is a common technique used by a
penetration tester to find out the open doors, In technical
terminology port scanning is used to find out the
vulnerabilities in the services listing on a port.
Enumeration:Enumeration is the first attack on target network, enumeration is the process to gather the information about a target machine by actively connecting to it.
Attack And Gaining Access:In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset.
This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack-based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.
Escalating Privilages, Covering Tracks & and creating Backdoors:
Once hackers have been able to gain and maintain access, they cover their tracks to avoiddetection by security personnel, to continue to use the owned system, to remove evidence ofhacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log filesor intrusion detection system (IDS) alarms. Examples of activities during this phase of theattack include steganography, the use of tunneling protocols, and altering log files.
Some tips to protect from Hackers!
• Keep Antivirus in PC and Keep it Up-dated.• Don't Open suspecious email's• Change Your password after some days.• Choose Cryprtic Password for accounts (use
special symbols,numbers,words)• Don't Download mobile apps from third party
websites.• Download OS updates.• Keep Anti-spyware in your computer.• Use Virtual Keyboard when online shoping.
Thanks!
Be secure online!!!!!!
For More info: e-hacker.ddns.net