hacking -2003
TRANSCRIPT
![Page 1: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/1.jpg)
04/11/23
Presented By… Rajan.Mrug
6th IT-(Roll No:-6037)
H A C K I N G
![Page 2: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/2.jpg)
Definition Of Hacking. The opposite word of security is known as
hacking, generally breaking of computer security is known as Hacking.
e.g use another’s email id by hacking their password.
Every man made systems have a loop hole so that we can break the security by the technique of hacking.
Hacking requires long time period.
04/11/23
H A C K I N G
![Page 3: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/3.jpg)
Conti..... First step of hacking is to study on the
target. Then understand the security of the
target. Then find out the loop holes on the
security. Then the last step is to break the security. so that hacking is crime.
04/11/23
H A C K I N G
![Page 4: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/4.jpg)
What is Ethical hacking? Ethical hacking is also a opposite word of
Hacking. Work of ethical hacking is also to break
the system but by the taking of permission.
Generally it is a technique which is used by the big organization to find the faults or loop hole on their security system.
so that it is not illegal.
04/11/23
H A C K I N G
![Page 5: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/5.jpg)
Define Hacker..Hackers are those computer experts who
know many different computer languages, software and tools.
A person who can break computer security easily.
Hackers are very powerful in computer programming.
Hacker always trying to work in opposite on technology.
04/11/23
H A C K I N G
![Page 6: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/6.jpg)
Types of Hacker.
Main types of hackers are given hare. White hat Hacker Black hat HackerGrey hat Hacker Script kiddies Carders Phishers Spammers
04/11/23
H A C K I N G
![Page 7: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/7.jpg)
White hat Hacker White hacker is one
type of Ethical hacker.
we always think that hackers are bad but we don’t know the the real mean of hacker
Ethical hacker have a legal permission of hacking.
04/11/23
H A C K I N G
![Page 8: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/8.jpg)
Conti… In 1970’s the group of white hat hacker
are created, and it is known as Tiger team. They give permission to break the
network security. Many big companies invite the ethical
hacker to check their network security
04/11/23
H A C K I N G
![Page 9: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/9.jpg)
Some white hat hacker Tim Berners-Lee Linus Torvalds
04/11/23
H A C K I N G
![Page 10: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/10.jpg)
Black hat Hacker Black hat hackers
are also known as cracker .
Crackers misuses their knowledge.
They do that for money, fun or experiment.
They expands virus by the internet.
04/11/23
H A C K I N G
![Page 11: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/11.jpg)
Some black hat Hacker Jonathan James Kevin Mitnick
04/11/23
H A C K I N G
![Page 12: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/12.jpg)
Gray hat HackerThis works on both
side either legally or illegally.
BHH works for money, fun or political reasons but gray hat hacker works for the purpose of research
04/11/23
H A C K I N G
![Page 13: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/13.jpg)
Script Kiddies Script kiddies uses automatic tools for
hacking. This type of hackers are expanding in
cyber world. Script kiddies work for money and
statues. They hack by the use of tools so that they
have not an exact idea of hacking. they uses the technology in illegal way.
04/11/23
H A C K I N G
![Page 14: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/14.jpg)
Carders Carders are expert in shopping with the
use of illegal credit cards and bank account.
First BHH or Script kiddies hack user detail by the phishing and than they sell to the carders community.
Carders have no idea about hacking but they can buy online anything by hiding their identity.
04/11/23
H A C K I N G
![Page 15: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/15.jpg)
PhishersThe another
community of script kiddies is Phishers.
The main purpose of it is hacking of email and bank accounts.
04/11/23
H A C K I N G
![Page 16: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/16.jpg)
SpammersThe main purpose
of spammer is to send the fake messages.
Spammers buy the dump of email from the hackers.
Then they send fake emails or page on these mails.
04/11/23
H A C K I N G
![Page 17: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/17.jpg)
Knowledge Hacker uses lots of tools, software and
programming language. Knowledge of prog language like C,C++,
PERL, JAVA, ASP.NET, RUBY, PYTHON etc. Ability to use of all operating systems. They must have ability for the use of
readymade hacking tool so that they can make easy their hacking.
04/11/23
H A C K I N G
![Page 18: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/18.jpg)
Hacker attacksSpoofing AttackOnline fraud and phishingBrute force AttackSpamming AttackHoaxes Identity theftDOS Attack
04/11/23
H A C K I N G
![Page 19: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/19.jpg)
Spoofing attack In spoofing attack hacker confused the
target, various types of spoofing available like MAC address, email, call, sms, ip, webcam etc..
In spoofing hackers uses social engineering.
They uses another’s resource for their purpose like mailing anyone as a company owner.
04/11/23
H A C K I N G
![Page 20: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/20.jpg)
Online fraud and phishing In phishing attack
hacker creates any web page’s dummy page.
This page shows like a real website page.
For this hacker uses free hosting web sites.
04/11/23
H A C K I N G
![Page 21: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/21.jpg)
Brute force attack In this method hacker creates their own
programs, in this he loads their text file. In this text file hacker puts as possible
words then with the use of this programme he applies username and password in the website.
Brute forcing technique require lots of time.
Tools Brutus, Obivan
04/11/23
H A C K I N G
![Page 22: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/22.jpg)
Spamming attackSpecially
spamming attack occurs due to spammers.
In spamming attack spammers send lots of emails to the users.
Spam filter.
04/11/23
H A C K I N G
![Page 23: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/23.jpg)
HoaxesHoax is nothing but
a one type of spam.
Hoax have an email with wrong information.
04/11/23
H A C K I N G
![Page 24: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/24.jpg)
Identity theft Identity theft is a
one type of crime.Here hacker uses
chat rooms and puts trojan horse in your computer.
With the use of trojan they install key logger.
04/11/23
H A C K I N G
![Page 25: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/25.jpg)
DOS attack Denial of service
attack It is very powerful
attack.With the use of this
attack hacker sends a lots of traffic on any web server and down the web site.
04/11/23
H A C K I N G
![Page 26: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/26.jpg)
Online safety tipsNever reveal personal information online.Never share your password with other
people.Never arrange meeting with stranger.Don’t believe everything you read or see
online.Don’t respond to inappropriate message or
email.Be leery of personal questions from
strangers.
04/11/23
H A C K I N G
![Page 27: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/27.jpg)
Conti…Turn on windows internet firewall.Use automatic updates to keep software up-
to-date.Install and maintain antivirus software.Install and maintain antispyware software.Use the read “X” to close pop-ups.Think before you click.
04/11/23
H A C K I N G
![Page 28: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/28.jpg)
Study on faults http://www.packetstormsecurity.org http://www.securityfocus.comhttp://www.securitytracker.comhttp://www.securiteam.com
04/11/23
H A C K I N G
![Page 29: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/29.jpg)
04/11/23
H A C K I N G
![Page 30: Hacking -2003](https://reader035.vdocument.in/reader035/viewer/2022062511/551c76f649795907568b47cc/html5/thumbnails/30.jpg)
04/11/23
H A C K I N G