hacking -2003

30
06/22/22 Presented By… Rajan.Mrug 6 th IT-(Roll No:-6037) H A C K I N G

Upload: rajmrug214

Post on 02-Apr-2015

42 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hacking -2003

04/11/23

Presented By… Rajan.Mrug

6th IT-(Roll No:-6037)

H A C K I N G

Page 2: Hacking -2003

Definition Of Hacking. The opposite word of security is known as

hacking, generally breaking of computer security is known as Hacking.

e.g use another’s email id by hacking their password.

Every man made systems have a loop hole so that we can break the security by the technique of hacking.

Hacking requires long time period.

04/11/23

H A C K I N G

Page 3: Hacking -2003

Conti..... First step of hacking is to study on the

target. Then understand the security of the

target. Then find out the loop holes on the

security. Then the last step is to break the security. so that hacking is crime.

04/11/23

H A C K I N G

Page 4: Hacking -2003

What is Ethical hacking? Ethical hacking is also a opposite word of

Hacking. Work of ethical hacking is also to break

the system but by the taking of permission.

Generally it is a technique which is used by the big organization to find the faults or loop hole on their security system.

so that it is not illegal.

04/11/23

H A C K I N G

Page 5: Hacking -2003

Define Hacker..Hackers are those computer experts who

know many different computer languages, software and tools.

A person who can break computer security easily.

Hackers are very powerful in computer programming.

Hacker always trying to work in opposite on technology.

04/11/23

H A C K I N G

Page 6: Hacking -2003

Types of Hacker.

Main types of hackers are given hare. White hat Hacker Black hat HackerGrey hat Hacker Script kiddies Carders Phishers Spammers

04/11/23

H A C K I N G

Page 7: Hacking -2003

White hat Hacker White hacker is one

type of Ethical hacker.

we always think that hackers are bad but we don’t know the the real mean of hacker

Ethical hacker have a legal permission of hacking.

04/11/23

H A C K I N G

Page 8: Hacking -2003

Conti… In 1970’s the group of white hat hacker

are created, and it is known as Tiger team. They give permission to break the

network security. Many big companies invite the ethical

hacker to check their network security

04/11/23

H A C K I N G

Page 9: Hacking -2003

Some white hat hacker Tim Berners-Lee Linus Torvalds

04/11/23

H A C K I N G

Page 10: Hacking -2003

Black hat Hacker Black hat hackers

are also known as cracker .

Crackers misuses their knowledge.

They do that for money, fun or experiment.

They expands virus by the internet.

04/11/23

H A C K I N G

Page 11: Hacking -2003

Some black hat Hacker Jonathan James Kevin Mitnick

04/11/23

H A C K I N G

Page 12: Hacking -2003

Gray hat HackerThis works on both

side either legally or illegally.

BHH works for money, fun or political reasons but gray hat hacker works for the purpose of research

04/11/23

H A C K I N G

Page 13: Hacking -2003

Script Kiddies Script kiddies uses automatic tools for

hacking. This type of hackers are expanding in

cyber world. Script kiddies work for money and

statues. They hack by the use of tools so that they

have not an exact idea of hacking. they uses the technology in illegal way.

04/11/23

H A C K I N G

Page 14: Hacking -2003

Carders Carders are expert in shopping with the

use of illegal credit cards and bank account.

First BHH or Script kiddies hack user detail by the phishing and than they sell to the carders community.

Carders have no idea about hacking but they can buy online anything by hiding their identity.

04/11/23

H A C K I N G

Page 15: Hacking -2003

PhishersThe another

community of script kiddies is Phishers.

The main purpose of it is hacking of email and bank accounts.

04/11/23

H A C K I N G

Page 16: Hacking -2003

SpammersThe main purpose

of spammer is to send the fake messages.

Spammers buy the dump of email from the hackers.

Then they send fake emails or page on these mails.

04/11/23

H A C K I N G

Page 17: Hacking -2003

Knowledge Hacker uses lots of tools, software and

programming language. Knowledge of prog language like C,C++,

PERL, JAVA, ASP.NET, RUBY, PYTHON etc. Ability to use of all operating systems. They must have ability for the use of

readymade hacking tool so that they can make easy their hacking.

04/11/23

H A C K I N G

Page 18: Hacking -2003

Hacker attacksSpoofing AttackOnline fraud and phishingBrute force AttackSpamming AttackHoaxes Identity theftDOS Attack

04/11/23

H A C K I N G

Page 19: Hacking -2003

Spoofing attack In spoofing attack hacker confused the

target, various types of spoofing available like MAC address, email, call, sms, ip, webcam etc..

In spoofing hackers uses social engineering.

They uses another’s resource for their purpose like mailing anyone as a company owner.

04/11/23

H A C K I N G

Page 20: Hacking -2003

Online fraud and phishing In phishing attack

hacker creates any web page’s dummy page.

This page shows like a real website page.

For this hacker uses free hosting web sites.

04/11/23

H A C K I N G

Page 21: Hacking -2003

Brute force attack In this method hacker creates their own

programs, in this he loads their text file. In this text file hacker puts as possible

words then with the use of this programme he applies username and password in the website.

Brute forcing technique require lots of time.

Tools Brutus, Obivan

04/11/23

H A C K I N G

Page 22: Hacking -2003

Spamming attackSpecially

spamming attack occurs due to spammers.

In spamming attack spammers send lots of emails to the users.

Spam filter.

04/11/23

H A C K I N G

Page 23: Hacking -2003

HoaxesHoax is nothing but

a one type of spam.

Hoax have an email with wrong information.

04/11/23

H A C K I N G

Page 24: Hacking -2003

Identity theft Identity theft is a

one type of crime.Here hacker uses

chat rooms and puts trojan horse in your computer.

With the use of trojan they install key logger.

04/11/23

H A C K I N G

Page 25: Hacking -2003

DOS attack Denial of service

attack It is very powerful

attack.With the use of this

attack hacker sends a lots of traffic on any web server and down the web site.

04/11/23

H A C K I N G

Page 26: Hacking -2003

Online safety tipsNever reveal personal information online.Never share your password with other

people.Never arrange meeting with stranger.Don’t believe everything you read or see

online.Don’t respond to inappropriate message or

email.Be leery of personal questions from

strangers.

04/11/23

H A C K I N G

Page 27: Hacking -2003

Conti…Turn on windows internet firewall.Use automatic updates to keep software up-

to-date.Install and maintain antivirus software.Install and maintain antispyware software.Use the read “X” to close pop-ups.Think before you click.

04/11/23

H A C K I N G

Page 28: Hacking -2003

Study on faults http://www.packetstormsecurity.org http://www.securityfocus.comhttp://www.securitytracker.comhttp://www.securiteam.com

04/11/23

H A C K I N G

Page 29: Hacking -2003

04/11/23

H A C K I N G

Page 30: Hacking -2003

04/11/23

H A C K I N G