39 42 hacking

Upload: urvesh-sojitra

Post on 07-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 39 42 Hacking

    1/27

  • 8/3/2019 39 42 Hacking

    2/27

    The process of attempting to gain, or

    successfully gaining, unauthorized access to

    computer resources for the purpose of help or

    secure system is called hacking.

  • 8/3/2019 39 42 Hacking

    3/27

    1966 ROBERT MORRIS Introduces theconcept of safe hacking.

    1969 Development in the fild of hacking.

    1990 Electronic frontier foundation wasfounded.

    1995 Marc Andreesson and Eric Bina of the

    National Center for SupercomputingApplications release Mosaic, the first WWWbrowser that can show graphics

  • 8/3/2019 39 42 Hacking

    4/27

    Hacker is not cyber criminal but he is the very intelligent

    person who is use his knowledge in constructive manner to

    secure system & never damage data.

    Hacking is technique in which any one can access any ones

    computer with out his permission. the person who is doing

    this type of work is called hacker.

    He know all about the operating system & different holes in

    the system.

  • 8/3/2019 39 42 Hacking

    5/27

    Person who enter into others system and violates

    the system , damage the data , create havoc is called

    cracker.

    Cracker is cyber criminal.

    They can be easily identified because their action aremalicious .

  • 8/3/2019 39 42 Hacking

    6/27

    Crackers exist because human nature is just so,frequently driven by a desire to destroy instead of

    create.

    They are use for different purpose like for profit ,some company use them for disable the competitor

    company , for cracks credit card number.

  • 8/3/2019 39 42 Hacking

    7/27

    They write programs tocheck the integrity ofother programs.

    when a hacker creates a

    program that canautomatically check thesecurity structure

    They always doconstructive work.

    Crackers rarely writetheir own programs.Instead, they beg,borrow, or steal tools

    from others. They use these tools

    not to improve Internetsecurity, but to subvertit.

    Cracker creates nothingbut destroy much.

  • 8/3/2019 39 42 Hacking

    8/27

    SUN

    UNIX

    MICROSOFT

  • 8/3/2019 39 42 Hacking

    9/27

    It is fairly common to see crackers using either

    SolarisX86 or SCO as a platform.

    This is because even though these products are

    license ware, they can easily be obtained.

  • 8/3/2019 39 42 Hacking

    10/27

    UNIX platforms are popular because they

    generally require a low overhead.

    we can run Linux or FreeBSD on a paltry 386

    and gain good performance.

    This is reasonable.

  • 8/3/2019 39 42 Hacking

    11/27

    The Microsoft platform supports many

    security tools that can be used to attack

    remote machine.

    It has advanced tools for networking as well.

  • 8/3/2019 39 42 Hacking

    12/27

    Just for fun

    Show off

    Hack other systems secretly Notify many people their thought

    Steal important information

    Destroy enemys computer network duringthe war

    Profit--Someone pays a cracker to bring you

    down or to get your proprietary data.

  • 8/3/2019 39 42 Hacking

    13/27

    Access to computer should be unlimited and

    free.

    All information should be free.

    Hackers should be judged by their hacking,

    not bogus criteria such as degrees, age, race,

    or position.

    You can create art and beauty on a computer.

    Computers can change your life for the better.

  • 8/3/2019 39 42 Hacking

    14/27

    There are many types of hacking like

    PASSWORD HACKING SOFTWARE HACKING

    NET HACKING

  • 8/3/2019 39 42 Hacking

    15/27

    TWO TYPES

    1. BRUTE FORCE

    In that case hacker try out all the combination of

    all keyboard letters . It has grater success but ittakes long time.

    2. DICTIONARY BASED

    In that they are use predefine password .it is

    unsuccessful method.

  • 8/3/2019 39 42 Hacking

    16/27

    In that hacker changes the look & excution

    way of that software.

    Change the demo version into full version by

    decode the source code.

  • 8/3/2019 39 42 Hacking

    17/27

    IP Address is the address of your computer in

    the internet.

    It is UNIQ

    LIKE 192.168.23.45

  • 8/3/2019 39 42 Hacking

    18/27

    It is not physical port but it is logical port in your computer.

    It is just like hole into the system . Through hacker can enterin to system.

    There are thousands of port into computer.

    The particular service is running on particular port. LIKE

    Port 21: FTP

    Port 23: Telnet (Default)

    Port 25: MailPort 70: Gopher

    Port 80: HTTP

  • 8/3/2019 39 42 Hacking

    19/27

    THERE ARE MANY TOOLS ARE AVILABLE

    SCANNERS

    TELNET FTP

    LAN WATCH

  • 8/3/2019 39 42 Hacking

    20/27

    It is not a photo scanner but it is a program thatautomatically detects security weaknesses in aremote or local host.

    Port scanner are use in hacking.

    It can give the whole list of open port on that systemand which service is running on that.

    It can use almost all OS.

    EX. SATAN,NMAP

  • 8/3/2019 39 42 Hacking

    21/27

    TELNET IS ALTIMATE HACKING TOOL

    IT IS TERMINAL EMULATION PROGRAM THAT

    ALLOW US TO CONNECT TO REMOTE SYSTEM

    YOU HAVE TO FOLLOW THIS STEP TO USE

    TELNET

    COMMAND:

    C:\WINDOWS\TELNET [IP ADDRESS] PORT

  • 8/3/2019 39 42 Hacking

    22/27

    FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS

    USE AS HACKING TOOL

    PORT 21 FOR THE FTP

    FOR CONNECTING FTP WE NEED SOME FTP S/WKNOWN AS FTP CLIENT

    FOR CONNECTING FTP SERVER YOU HAVE TO

    HAMMERING THAT SERVER COMMAND:

    C:\WINDOWS\FTP [IP ADDRESS]:PORT

  • 8/3/2019 39 42 Hacking

    23/27

    LAN WATCH IS A SOFTWARE WHICH NOT

    ATTACK AND NOT DAMAGE REMOTE

    NETWORK

    BUT IT KEEP WATCH ON THE REMOTE

    NETWORK & GIVE ALL THE INFORMATION

    WHAT IS GOING ON THAT NETWORK

  • 8/3/2019 39 42 Hacking

    24/27

    THERE ARE MANY TYPES OF ATTACKS

    SPOOFING ATTACK

    TELNET BASED ATTACK

    DOS (Daniel of service) ATTACK PING OF DEATH

    DISTRIBUTED DOS ATTACK

    MAILBOMBS

  • 8/3/2019 39 42 Hacking

    25/27

    SOME EXELLENT SOFTWARE CAN PROVIDE

    YOU BEST SECURITY

    LIKE

    TROJAN

    FIREWALL

  • 8/3/2019 39 42 Hacking

    26/27

    WINDOWS TROJANS ARE SMALL ASPECT OF

    WINDOWS SECURUTY

    TROJAN IS UNOTHORIZED PROGRAM

    CONTAINED WITHIN A LEGIMATE PROGRAM

    THIS PROGRAM PERFORMS FUNCTION

    UNKNOWN BY USER

  • 8/3/2019 39 42 Hacking

    27/27

    FIREWALL IS ANY DEVICE USED TO PREVENT

    OUTSIDERS FROM GAINING ACCESS TO YOUR

    NETWORK

    TYPES OF FIREWALLS

    PACKET FILTER

    APPLICATION PROXY

    PACKET INSPECTION