hacking

27
HACKING AND CRACKING BY: Mohit Agarwal EC 2 year

Upload: mohit-agarwal

Post on 08-May-2015

142 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hacking

HACKING AND

CRACKING

BY:Mohit AgarwalEC 2 year

Page 2: Hacking

Objectives of Hacking and Cracking

What is Hacking?Difference between Hacking and

crackingTypes of HackersTypes of Hacking TechniquesPreventive measuresSome Cracking Examples

Page 3: Hacking

HACKING

Authorized or Unauthorize attempts to bypass the security mechanisms of an information systems or networkIn simple words Hacking means finding out weaknesses in a computer or computer network

Page 4: Hacking

Understand the difference of hacking and cracking

Hacking builds thingsCracking breaks them

Page 5: Hacking

Why do people hack ?

To make security stronger (Ethical hacking)

Just for funSteal important informationDestroy enemy’s computer network For Fame

Page 6: Hacking

Types of Hackers

Page 7: Hacking

White-hat HackersThe good guys who identify the

security weakness of the system or network and inform the owner about them

Page 8: Hacking

Black Hat Hackers

A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.

Page 9: Hacking

Grey hat Hackers

A grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers

Page 10: Hacking

TYPES OF HACKING

TECHNIQUESPretextingPhishing

Page 11: Hacking

Pretexting: Pretexting is the act of been that u r

not to release information (e.g. date of birth, Social

Security Number, last bill amt.) Phishing: Phishing is an e-mail fraud method in which

the perpetrator sends out email in an attempt to gather personal and financial information from recipients.

Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details .Ebay and PayPal are two of the most targeted companies, and online

banks are also common targets

Page 12: Hacking

Language of hackers - Leet

1 -> i or l3 -> e4 -> a7 -> t9 -> g0 -> o$ -> s| -> i or l

|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x

Page 13: Hacking

Example:

1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|\| 1 h4ck3d 1n

I did not hack this page, it was like this when I hacked in.

Page 14: Hacking

World famous hackers

Stephen Wozniac

Tsutomu Shimomura

Page 15: Hacking

Kevin Mitnick

Kevin Poulsen

Page 16: Hacking

Random Fact !!!!The average age group of hackers are aged between 14-24 yrs. …

Page 17: Hacking

Did you know ?Social networking sites like ‘FACEBOOK’, ’GMAIL’, ’YAHOO” comprised of 60% of direct or indirect hacking incidents.

Page 18: Hacking

Most popular virusLinks involving private pictures of celebrities.

Links showing pictures of famous personalities like videos of Osama Bin Laden’s killing.

Page 19: Hacking

Another popular scam

Facebook lottery scam.

Page 20: Hacking
Page 21: Hacking

Preventive measures

Install a strong anti-virus with full security from internet, removal memory etc.

Avoid disclosing personal details like phone number, credit card details to strangers.

A good firewall (Sygate personal) A good spy ware / Trojan buster. Use of genuine software

Page 22: Hacking

How to become Hacker

The best approach is to gain as much knowledge about stuff as you can.

Good command over C / C++ / Perl will definitely help.

But above all you need a good logical brain

Page 23: Hacking

Some Examples of Cracking

Windows Cracking 1) Windows Logon password Breaking

Page 24: Hacking

Window log on password breaking

To hack windows login password, reboot and wait for the message:

When we see the boot menu on the screen, press F2 or F12 before “Starting Windows 9x…” . The boot menu will come up. Select option to boot into DOS .

C:\>cd windowsC:\windows>ren *.pwl *.xyz //

RENAMEOr delete them by typing

C:\windows>del *.pwl *.xyz //DELETE

Page 25: Hacking

Easy and Simple approach On many computers a series of keystrokes may crash the password program.

keep pressing ESC 15 to 20 times . This will result in the crashing of the password program and the computer will continue booting .

BY BOOTING We can break into a computer by using live tools like

conboot live cd which are readly available on internet .The live cd can be used to make a bootable pen drive and then we can break into any computer.

Page 26: Hacking

ANY QUERIES

Page 27: Hacking