hacking -2003

Post on 02-Apr-2015

42 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

04/11/23

Presented By… Rajan.Mrug

6th IT-(Roll No:-6037)

H A C K I N G

Definition Of Hacking. The opposite word of security is known as

hacking, generally breaking of computer security is known as Hacking.

e.g use another’s email id by hacking their password.

Every man made systems have a loop hole so that we can break the security by the technique of hacking.

Hacking requires long time period.

04/11/23

H A C K I N G

Conti..... First step of hacking is to study on the

target. Then understand the security of the

target. Then find out the loop holes on the

security. Then the last step is to break the security. so that hacking is crime.

04/11/23

H A C K I N G

What is Ethical hacking? Ethical hacking is also a opposite word of

Hacking. Work of ethical hacking is also to break

the system but by the taking of permission.

Generally it is a technique which is used by the big organization to find the faults or loop hole on their security system.

so that it is not illegal.

04/11/23

H A C K I N G

Define Hacker..Hackers are those computer experts who

know many different computer languages, software and tools.

A person who can break computer security easily.

Hackers are very powerful in computer programming.

Hacker always trying to work in opposite on technology.

04/11/23

H A C K I N G

Types of Hacker.

Main types of hackers are given hare. White hat Hacker Black hat HackerGrey hat Hacker Script kiddies Carders Phishers Spammers

04/11/23

H A C K I N G

White hat Hacker White hacker is one

type of Ethical hacker.

we always think that hackers are bad but we don’t know the the real mean of hacker

Ethical hacker have a legal permission of hacking.

04/11/23

H A C K I N G

Conti… In 1970’s the group of white hat hacker

are created, and it is known as Tiger team. They give permission to break the

network security. Many big companies invite the ethical

hacker to check their network security

04/11/23

H A C K I N G

Some white hat hacker Tim Berners-Lee Linus Torvalds

04/11/23

H A C K I N G

Black hat Hacker Black hat hackers

are also known as cracker .

Crackers misuses their knowledge.

They do that for money, fun or experiment.

They expands virus by the internet.

04/11/23

H A C K I N G

Some black hat Hacker Jonathan James Kevin Mitnick

04/11/23

H A C K I N G

Gray hat HackerThis works on both

side either legally or illegally.

BHH works for money, fun or political reasons but gray hat hacker works for the purpose of research

04/11/23

H A C K I N G

Script Kiddies Script kiddies uses automatic tools for

hacking. This type of hackers are expanding in

cyber world. Script kiddies work for money and

statues. They hack by the use of tools so that they

have not an exact idea of hacking. they uses the technology in illegal way.

04/11/23

H A C K I N G

Carders Carders are expert in shopping with the

use of illegal credit cards and bank account.

First BHH or Script kiddies hack user detail by the phishing and than they sell to the carders community.

Carders have no idea about hacking but they can buy online anything by hiding their identity.

04/11/23

H A C K I N G

PhishersThe another

community of script kiddies is Phishers.

The main purpose of it is hacking of email and bank accounts.

04/11/23

H A C K I N G

SpammersThe main purpose

of spammer is to send the fake messages.

Spammers buy the dump of email from the hackers.

Then they send fake emails or page on these mails.

04/11/23

H A C K I N G

Knowledge Hacker uses lots of tools, software and

programming language. Knowledge of prog language like C,C++,

PERL, JAVA, ASP.NET, RUBY, PYTHON etc. Ability to use of all operating systems. They must have ability for the use of

readymade hacking tool so that they can make easy their hacking.

04/11/23

H A C K I N G

Hacker attacksSpoofing AttackOnline fraud and phishingBrute force AttackSpamming AttackHoaxes Identity theftDOS Attack

04/11/23

H A C K I N G

Spoofing attack In spoofing attack hacker confused the

target, various types of spoofing available like MAC address, email, call, sms, ip, webcam etc..

In spoofing hackers uses social engineering.

They uses another’s resource for their purpose like mailing anyone as a company owner.

04/11/23

H A C K I N G

Online fraud and phishing In phishing attack

hacker creates any web page’s dummy page.

This page shows like a real website page.

For this hacker uses free hosting web sites.

04/11/23

H A C K I N G

Brute force attack In this method hacker creates their own

programs, in this he loads their text file. In this text file hacker puts as possible

words then with the use of this programme he applies username and password in the website.

Brute forcing technique require lots of time.

Tools Brutus, Obivan

04/11/23

H A C K I N G

Spamming attackSpecially

spamming attack occurs due to spammers.

In spamming attack spammers send lots of emails to the users.

Spam filter.

04/11/23

H A C K I N G

HoaxesHoax is nothing but

a one type of spam.

Hoax have an email with wrong information.

04/11/23

H A C K I N G

Identity theft Identity theft is a

one type of crime.Here hacker uses

chat rooms and puts trojan horse in your computer.

With the use of trojan they install key logger.

04/11/23

H A C K I N G

DOS attack Denial of service

attack It is very powerful

attack.With the use of this

attack hacker sends a lots of traffic on any web server and down the web site.

04/11/23

H A C K I N G

Online safety tipsNever reveal personal information online.Never share your password with other

people.Never arrange meeting with stranger.Don’t believe everything you read or see

online.Don’t respond to inappropriate message or

email.Be leery of personal questions from

strangers.

04/11/23

H A C K I N G

Conti…Turn on windows internet firewall.Use automatic updates to keep software up-

to-date.Install and maintain antivirus software.Install and maintain antispyware software.Use the read “X” to close pop-ups.Think before you click.

04/11/23

H A C K I N G

Study on faults http://www.packetstormsecurity.org http://www.securityfocus.comhttp://www.securitytracker.comhttp://www.securiteam.com

04/11/23

H A C K I N G

04/11/23

H A C K I N G

04/11/23

H A C K I N G

top related