Download - Hacking
![Page 1: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/1.jpg)
HACKING
Presented By.. Amit Kumar Pandey MCA 4TH SEM
![Page 2: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/2.jpg)
Introduction :
Definition Types of Hacker Threats History of Hacking Ethical
![Page 3: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/3.jpg)
Hackers
Harmful behavior, Illegal access to computer, Wicked intention, Kind of electronically rebet robber, Breaker security system
![Page 4: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/4.jpg)
Definition :
“A person who enjoy in learning the details of computer system & how to stretch their compatibility-as opposed to the most user of computer, who prefer to learn only the minimum amount necessary.”
“One who programmers enthusiastically or who enjoys programming rather then just theorizing about programming”
![Page 5: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/5.jpg)
“A person who –
is an expert on enthusiast of creativity overcoming or circumventing limitation.”
-Used as a compliment
![Page 6: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/6.jpg)
Types of HackingWhite Hat- “ Ethical hacker who breaks security
but who does so far altruistic or at least- malicious reason.- Clear defined code of ethics.
Gray Hat- “Ambiguous ethics”
-”Borderline legality”
Black Hat-”Subvert computer security without authorization.
Uses technology for Terrorism, Vandalism, identity theft, intellectual, proper theft……..
![Page 7: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/7.jpg)
Types of Threats
Attack on availability Attack on confidentially Attack on integrity Attack on authentication
![Page 8: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/8.jpg)
Attack on Confidentially
Attacker listens communication
Threats
-Give away private information.
-Spying password
Ex. Spy ware
source Destination
Attacker
Normal information flow
Intercepted information flow
![Page 9: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/9.jpg)
Attack on Availability
Interrupt communication channel
Bring down destination Threats
->System not available
->System not useable
source destination
![Page 10: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/10.jpg)
Attack on Integrity Attacker modifies the
information and send to channel
Threats
Systems are not confidential
sourceDestination
Attacker
Normal information flow
Intercepted information flow
![Page 11: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/11.jpg)
Attack on Authenticity
Attacker fakes identity & insert counterfeit object on system.
Threats
- System not confidential
- No one sure to communicate with right partner
Ex. Forget password
sourceDestination
Attacker
Normal information flow
Forget information
![Page 12: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/12.jpg)
Real threats
Loss of confidential information Viruses & worms Remote administration of system Defected web site & Security system. Cyber war ???
![Page 13: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/13.jpg)
Defected website
![Page 14: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/14.jpg)
Information Gathering
More information about any organization is good for hacker to attack.
Way to gather information.
--port scan
--ping sweep
--social engineering
![Page 15: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/15.jpg)
Social Engineering
Attacker tries to convince some one to give about information, password……
Most innocent question
--what is phone number/ IP address…
--Know abut Administrating person, for N/W
--Network structure
![Page 16: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/16.jpg)
History of Hacking
1970 Attack on American telephone system.---John Draper found a whistle that produces
2600 Hz tone---Tone used for signaling---Together with his friend he develop a “Blue
Box" which simulates a telephone operator's dialing console
---In combination he had the possibility to make free calls
Cond..
![Page 17: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/17.jpg)
1982
---Teenage hacker group 414broke into 60 computer system, including Los Alamos laboratories
1988
---Kevin Mitnick secretly monitor’s the e-mail of the security officials
---sentenced for one year of jail
Cond…
![Page 18: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/18.jpg)
1988 first computer worms in the internet is developed by “Robert morries” .Wanted to know about the size of ARPA net. He is the first person indicted under the computer fraud.--3 years probation.--400 hours community service--fine $10,050 & cost of his supervision Cond..
![Page 19: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/19.jpg)
1988
-- First National Bank of Chicago become victim of $70 million computer theft
1989
--hackers were arrested in western Germany
--broke into US government &corporate computers
--Sold operating system source code to soviet
KGBCond..
![Page 20: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/20.jpg)
2000 &2003
---Hackers broke into Microsoft’s corporate networks & stole Windows & Office source code
---”I LOVE YOU “ virus spread over the internet & infected image and sound files
--18 year old arrested for developing & releasing B variant of the blaster warms
![Page 21: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/21.jpg)
Ethical Hacking
Breaking system into by order of owner
Skills:-(1). Completely trustworthy(2).Strong programming & networking ability(3). Vast Knowledge of Software & Hardware (4). Good understanding of security(5).System management skill.
Cond…
![Page 22: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/22.jpg)
Goals :-
--Finding security holes,
gather information
Analysis of Tools
security administrator tools for network analysis
![Page 23: Hacking](https://reader034.vdocument.in/reader034/viewer/2022050720/54bd71a84a7959d8058b464a/html5/thumbnails/23.jpg)