hacking. contents (1) various definitions of hacking. who is hacker? (various definitions). what...

30
HACKING

Upload: silvester-powers

Post on 16-Dec-2015

224 views

Category:

Documents


0 download

TRANSCRIPT

HACKING

Contents (1)

VARIOUS DEFINITIONS OF HACKING .Who is hacker? (various definitions).

What does he do?.Why does he do?Who is a cracker?Cracker v /s Hacker.

Contents (2)

Hactivism. History of hacking. Who can be a real hacker? Forms & types of hacking. Procedure for hacking a password & in general Threats caused by hacking. Why can’t defend against hackers? How to translate hackers language. What should be done after hacked? Preventive measures for hacking

?

VARIOUS DEFINITIONS

Hacking is a technique to get access on other computers without its permission or we can say that without using the ways which are available and developing the own ways of doing it.

Hacking is a way of breaking the code. Hacking is a code or a program often written to

breach the security of other systems. To gain access to a computer illegally.

hacking is a cyberwar.

HACKER

Who is hacker? (1)Is who practices hacking.Or a person who enjoys learning the

details of the computer and how to stretch their capabilities-as opposed to the most users of the computers who prefer to only to the minimum amount necessary.

Or a person who has harmful behaviour and wicked intention.

Or has iilegal access to the computers.

Technically, a hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer.

Why do hackers hack?

Just for fun.Show off.Hack other systems secretly.Steal important information.Destroys the enemy or the target

computers network security.

The ways in which they hack

NetBIOS

ICMP Ping

FTP

HTTP

Who is a cracker?

Crackers are bad guys who break into the system.

They do the hack the information but for a different purpose.Crackers and hackers are different.

They do malpractices such as steal money from banks,atms etc.

Cracker v /s Hacker.

HACKERS: Are good guys who

create elegant solutions to problems.

Expose security flaws.

Build secure systems.

CRACKERS: Are malicious and

cause harmful damage.

Make or steal money. Utilize downloaded

exploitations.

HACTIVISM

That is the use of hacking to promote an agenda.

Politically

(ex:defacing a campaign website). religious

(ex:hacking an abortion info website). Military

(adding misinformation to the enemy sites)

History of hacking. 1960-1970: Good hack especially clever program code. 1970-1990 : “breaking in”to computers became very easy

1990-PRESENT: www developed&internet grow exponentially. Information theft/disabling/hijacking began. Hacking can be writing a program for enjoyment. Hacking can also done to perform reverse

engineering of software where source code is lost.

REAL HACKERS OR SKILLS OF A HACKER:-

Who study c/c++ and the assembly languages.

Study computer architecture perfectly.Study operating systems.Study computer networks.

FORMS OF HACKING

It can be hacking a secure information from a computer illegally.

Hacking an email or a password.Hacking a website.Hacking in otherwords can be a way

getting a password which is lost by using a program.

Types of hacking

Normal

data transfer

Interruption Interception

Modification Fabrication

Procedure for hacking a password & in general

1.Download it from required software. 2. Install its setup to public libraries, cyber cafes, your friend computer or your office computer.

3. Hide it after mentioning your email id into this software.

4. Check your email, you start getting user name and password of everybody who use that computer. And their is very basic thing about user name and password. People often have same password for all the services they used.

In general what a hacker does to escape

Take all safety Measures to hide yourself from target.

There are lots of techniques to hide yourself from target computer. I recommend you to use as much techniques as you can.

Few important tricks :- Use Hide Ip Software :- This software will help you to hide

your IP address. Use Firewall :- Firewall secure your computer as well as

restrict any personal information from going outside. Use Proxy servers :- Whenever you want to surf the computer

of your target use proxy servers. Use others username and password: - Try to avoid using your

own user name and password for internet connection. Learn the technique to get other's user name and password.

Why can’t defend against hackers?

There are many unknown security holeHackers need to know only one security

hole to hack the systemAdmin need to know all security holes to

defend the system

Is hacking always bad?

some (usually young) hackers do it for “fun”

No it is not always bad, hacking sometimes may be the cracking the code of the program where the source code is lost.

Its just mingling away with the hardware to make things work .

How to translate the hackers’ language (1)

1 -> i or l

3 -> e

4 -> a

7 -> t

9 -> g

0 -> o

$ -> s

| -> i or l

|\| -> n

|\/| -> m

s -> z

z -> s

f -> ph

ph -> f

x -> ck

ck -> x

`

Ex)– 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s

wh3n 1 h4ck3d 1n

What should be done after hacked?

Shutdown the system– Or turn off the system

Separate the system from networkRestore the system with the backup

– Or reinstall all programs

Connect the system to the network It can be good to call the police

Why hackers succeed?

Problems are often fixed only after exploited.

Many companies hire hackers.its a big business for many consultants and many believe in “security in secrecy” and hackers & crackers enjoy this challenge.

Role of government/forensics

Search, Seizure, and Analysis of Computers: currently, the government can seize any computer ... if there is “sufficient” evidence of criminal use. equipment can be seized indefinitely. computer forensics are needed to analyze seizures: hard drives (deleted files) cracking encryption keys internal “wear and tear” indicating usage patterns requires significant training/research

Preventive measures for hacking

The most popular method of protection against hacking home systems is to have an antivirus soft ware.

Firewalls act as a deterrent to hacking by protecting private networks from public.

Have the system backup.

FireWallFireWall

References :

www.google.co.in

www.wikipedia.orgwww.howtohack.com

CONCLUSION

Always hacking need not be breaking in to the computers, it can be used for a good purpose and be a hacker instead of cracker.

THANK YOU