hacking by shashwat

20

Upload: shashwat-shivam

Post on 26-Jun-2015

538 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Hacking by shashwat
Page 2: Hacking by shashwat

What is Hacking?

Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes.

Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.

What is Hacking?

Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes.

Page 3: Hacking by shashwat

FAMOUS HACKERS IN HISTORY

Ian Murphy Kevin Mitnick Johan Helsinguis

Mark AbeneLinus Torvalds Robert Morris

Page 4: Hacking by shashwat

What Basically a Hacker do?

Page 5: Hacking by shashwat

Learn how to program.

Get one of the open-source Unix's and learn to use and run it

Learn how to use the World Wide Web and write HTML.

Basic skills required for Hacking

Page 6: Hacking by shashwat

Ethical Hacking

» It is use of programming skills to determine vulnerabilities in computer

system» It is also known as the intrusion testing or penetration testing.

Page 7: Hacking by shashwat
Page 8: Hacking by shashwat

Types of HackingTypes of Hacking

Phishing Attack Brute Force Attack

Fake Login HackCookie Steal Hack

Web Mail Hack

Page 9: Hacking by shashwat

Finding an IP Address via Instant Messengers

Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friend’s system:

Your System------Chat Server---- Friend’s System

Friend’s System---------Chat Server------- Your System

Thus in this case, you first have to establish a direct connection with your friend’s computer by either sending him a file or by using the call feature.

Then, goto MSDOS or the command line and type:

C:\>netstat -n

This command will give you the IP Address of your friend’s computer.

Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friend’s system:

Your System------Chat Server---- Friend’s System

Friend’s System---------Chat Server------- Your System

Thus in this case, you first have to establish a direct connection with your friend’s computer by either sending him a file or by using the call feature. Then, goto MSDOS or the command line and type:

C:\>netstat -n

This command will give you the IP Address of your friend’s computer.

Finding an IP Address via Instant Messengers

Page 10: Hacking by shashwat

IP Addresses: DangersDangers & Concerns

DOS AttacksDisconnect from the InternetTrojans ExploitationGeographical InformationFile Sharing Exploits

Page 11: Hacking by shashwat
Page 12: Hacking by shashwat

Different Ways to Hack Facebook Account@ Facebook Phishing@ By use of Key logger@ Facebook Account hack with get control on Primary email address

Page 13: Hacking by shashwat

Facebook PhishingPhishing  It is the act of attempting to acquire information such as

usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in

an electronic communication

Page 14: Hacking by shashwat

ADVANTAGES & DISADVANTAGES

Advantages Provides security to banking and financial establishments Prevents website defacements An evolving technique To catch a thief you have to think like a thiefDisadvantages All depends upon the trustworthiness of the ethical hacker Hiring professionals is expensive.

Page 15: Hacking by shashwat

How can we protect the system? Patch security hole oftenDo not run unused daemonRemove unused programSetup log host• Backup the system oftenSetup firewallNever entertain those things which ask your username and password

Setup IDSEx) snort

Page 16: Hacking by shashwat

What to do after being hacked?Shutdown the system

Or turn off the system

Separate the system from network

Restore the system with the backup or reinstall all programs

Connect the system to the network

Page 17: Hacking by shashwat

H4cking prone areas

Page 18: Hacking by shashwat

Hacking GROWTH RATE

It is clear from the graph it is increasing day by day.

Page 19: Hacking by shashwat

PLEASE GIVE YOUR SUGGESTIONS AND FEEDBACKS. ANY QUESTION ?

Page 20: Hacking by shashwat