hacking by shashwat
TRANSCRIPT
What is Hacking?
Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes.
Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
What is Hacking?
Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes.
FAMOUS HACKERS IN HISTORY
Ian Murphy Kevin Mitnick Johan Helsinguis
Mark AbeneLinus Torvalds Robert Morris
What Basically a Hacker do?
Learn how to program.
Get one of the open-source Unix's and learn to use and run it
Learn how to use the World Wide Web and write HTML.
Basic skills required for Hacking
Ethical Hacking
» It is use of programming skills to determine vulnerabilities in computer
system» It is also known as the intrusion testing or penetration testing.
Types of HackingTypes of Hacking
Phishing Attack Brute Force Attack
Fake Login HackCookie Steal Hack
Web Mail Hack
Finding an IP Address via Instant Messengers
Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friend’s system:
Your System------Chat Server---- Friend’s System
Friend’s System---------Chat Server------- Your System
Thus in this case, you first have to establish a direct connection with your friend’s computer by either sending him a file or by using the call feature.
Then, goto MSDOS or the command line and type:
C:\>netstat -n
This command will give you the IP Address of your friend’s computer.
Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friend’s system:
Your System------Chat Server---- Friend’s System
Friend’s System---------Chat Server------- Your System
Thus in this case, you first have to establish a direct connection with your friend’s computer by either sending him a file or by using the call feature. Then, goto MSDOS or the command line and type:
C:\>netstat -n
This command will give you the IP Address of your friend’s computer.
Finding an IP Address via Instant Messengers
IP Addresses: DangersDangers & Concerns
DOS AttacksDisconnect from the InternetTrojans ExploitationGeographical InformationFile Sharing Exploits
Different Ways to Hack Facebook Account@ Facebook Phishing@ By use of Key logger@ Facebook Account hack with get control on Primary email address
Facebook PhishingPhishing It is the act of attempting to acquire information such as
usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in
an electronic communication
ADVANTAGES & DISADVANTAGES
Advantages Provides security to banking and financial establishments Prevents website defacements An evolving technique To catch a thief you have to think like a thiefDisadvantages All depends upon the trustworthiness of the ethical hacker Hiring professionals is expensive.
How can we protect the system? Patch security hole oftenDo not run unused daemonRemove unused programSetup log host• Backup the system oftenSetup firewallNever entertain those things which ask your username and password
Setup IDSEx) snort
What to do after being hacked?Shutdown the system
Or turn off the system
Separate the system from network
Restore the system with the backup or reinstall all programs
Connect the system to the network
H4cking prone areas
Hacking GROWTH RATE
It is clear from the graph it is increasing day by day.
PLEASE GIVE YOUR SUGGESTIONS AND FEEDBACKS. ANY QUESTION ?