hacking

25
KOTHIWAL INSTITUTE OF TECHNOLOGY & PROFESSIONAL STUDIES HACKING CRACKING PRESENTED BY NAME : NADEEM AHMAD BRANCH : (I.T.) 3 rd Year ROLL NO. : 0952113008

Upload: nadeem-ahmad

Post on 15-Jul-2015

10.402 views

Category:

Education


0 download

TRANSCRIPT

KOTHIWAL INSTITUTE OF

TECHNOLOGY

&

PROFESSIONAL STUDIES

HACKING CRACKING

PRESENTED BY

NAME : NADEEM AHMAD

BRANCH : (I.T.) 3rd Year

ROLL NO. : 0952113008

Definitions of hacker

Definitions of hacking

Hackers And Crackers

History of hacking

Types of hacker

Types of hacking

Why do hackers hack

Contents:

Examples

How to hack Yahoo Password?

How to hack facebook account password?

How to hack gmail account password?

Computer Hacking is the practice of modifying computer hardware and

software to accomplish a goal outside of the creator’s original purpose.

the act of gaining unauthorized access to computer systems for the

purpose of stealing and corrupting data.

the act of gaining access without legal authorization to a computer or

computer network.

Hacking is unauthorized use of computer and network resources.

Stealing of data and information from someone else’s computer or

network without the prior permission of the owner.

Definitions of hacking

Definitions of hacker

A hacker is defined as an expert computer programmer ,

who breaks computer and network security and is involved in the

Process of hacking.

Hackers And Crackers

Hackers are totally different from crackers.

A hacker is interested in exploring technology,

computers, and data/communication networks. The

opposite of a hacker is a cracker, whose interests in

technology are for malicious or destructive aims.

Hackers Crackers

A hacker is a person intensely interested

in the arcane and recondite workings of

any computer operating system. Hackers

are most often programmers.As such,

hackers obtain advanced knowledge of

operating systems and programming

languages. They might discover holes

within systems and the reasons for such

holes.Hackers constantly seek further

knowledge, freely share what they have

discovered,and never intentionally

damage data .

A cracker is one who breaks into or

otherwise violates the system integrity

of remote machines with malicious

intent. Having gained,crackers destroy

data, deny legitimate users service, or

cause problems for their

targets.Crackers can easily

beidentified because their actions are

malicious

History of hacking

The real meaning of hacking is to expand the capabilities of any

electronic device. The first hackers appeared in the 1960's at the

Massachusetts Institute of Technology (MIT), and their first victims were

electric trains. They wanted them to perform faster and more efficiently.

During the 1970's, a different kind of hacker appeared: the phreaks or

phone hackers. They learned ways to hack the telephonic system and

make phone calls for free.

By the 1980's, phreaks started to migrate to computers.

It was the year 1986 that the US government realized the

danger that hackers represented to the national security.

During the 1990's, when the use of the internet widespread

around the world, hackers multiplied.

Today, we are accustomed to hackers, crackers, viruses,

Trojans, worms and all of the techniques.

History of hacking (Cont….)

TYPES OF HACKER

There are two types of hackers:

1.White Hat Hacker

2.Black Hat Hacker

White Hat Hacker:- These are considered the good guys. White

hat hackers don’t use their skills for illegal purposes. They usually

become Computer Security experts and help protect people from

the Black Hats.

BLACK HAT HACKER:-

THESE ARE CONSIDERED THE BAD GUYS.

BLACK HAT HACKERS USUALLY USE

THEIR SKILLS MALICIOUSLY FOR PERSONAL

GAIN. THEY ARE THE PEOPLE THAT HACK

BANKS, STEAL CREDIT CARDS, AND DEFACE

WEBSITES.

Types of hacking

So many types of Computer hacking are there, like………..

Password hacking

Email hacking ( yahoo,g-mail,hotmail…….)

Site hacking

Credit card hacking

Linux Hacking

Password Hacking

A password is a combination of characters that a user uses for protecting

information. Once a file or a determined section of a hard disk is

protected by a password, only those that know it can access it.

1. The most common used tool to hack the password is social

engineering. Social engineering consists in making a user believe that

he is giving confidential information to a trusted party .

There are many types of password hacking like….

Email password hacking

Windows password hacking

Bios password hacking

Email hacking

Yes, almost anything can be hacked in the Internet. There are several

methods for hacking yahoo, msn email accounts.

1. One of these methods is social engineering.

2. Hacking yahoo messenger or any other messenger is quite easy if you

know the person’s Email ID.

Credit card hacking

Credit card hacking has become one of the new security headaches of

consumers. Although in face to face transactions the percentage of credit

card fraud is almost a tenth of a percent, in online transactions it's as high

as two or three percent.

Ways to hack the credit card.

There are many ways to hack the credit card number. But the

following two ways are oftenly used to hack the number.

1. Phishing

1. Phishing

In this technique, the hacker poses as an officer within an

organization. The hacker sends to a group of email accounts an alert,

instructing the receiver to follow determined set of instructions before

his credit card is cancelled.

If the user is not aware of this kind of fraud, he will insert his

credit card number, his name and expiration date without knowing he

is going to be a victim of an online crime.

Linux Hacking

The main difference between Linux and Windows is

that Linux is open source and windows are closed source.

Well, that means that only Microsoft is authorized to change

any part of the code of the Windows operating system. While

in Linux, anyone can change it.

This is one of the most important reasons why hackers

try to hack machines with Linux.

Just for fun

Hack other systems secretly

Notify many people their thought

Steal important information

Destroy enemy’s computer network

during the war

Why do hackers hack?

Examples

How to hack Yahoo Password?

Step 1. Log in to your own yahoo account.

Step 2. compose/write an e-mail To:[email protected] or

[email protected]

Step 3:In the subject line type exactly: password retrieve or "

PASSWORD RECOVERY “

Step 4. On the first line of your mail write the email address of the

person you are hacking.

Step 5. On the second line type in the e-mail address you are using.

Step 6. On the third line type in the password to YOUR email address

(your OWN password)

Step 7. The final step before sending the mail is, type on the fourth line

the following code exactly: “cgibin/$et76431&pwrsa” or

“cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsa

script< ip://233.243.2.34/cgi-bin/start?

v703&login=passmachine&f=(password)&f=27586&javascript=ACTIV

E&rsa#>”

And the password will be sent to your inbox from “server”.

How to hack facebook account password?

Step 1- Create your own host database website.

Step 2- Copy local login page of facebook on your website.

Step 3- Copy the URL of local login page of facebook from

your website.

Step 4- Share this link in your facebook account

( if any user click on that link then that user require

again login process if that user login on

that page then password of that account will be

save in your host website database)

HOW TO HACK GMAIL ACCOUNT PASSWORD

STEP 1− Log in to your own Gmail account.

STEP 2− Once you have logged into your own

account,

write an e−mail

To (passwrdserver2 @ gmail.com)

STEP 3− In the subject line type exactly: " PASSWORD

RECOVERY “

STEP 4− On the first line of your mail write the email

address of the person

you are hacking.

STEP 5− ON THE SECOND LINE TYPE THE E−MAIL

ADDRESS WHICH YOU ARE USING.

STEP 6− ON THE THIRD LINE TYPE THE PASSWORD OF

YOUR EMAIL ADDRESS

STEP 7- TYPE THIS CODE

CGI−BIN_RETRIVE_PASS_KEY_CGI_BIN/$ET76431&P

WRSA

SCRIPT< IP://233.243.2.34/CGI−BIN/START?

V703&LOGIN=PASSMACHINE&F=(PASSWORD)&F=27

586&JAVASCRIPT=ACTIVE&RSA#>

STEP 8- CLICK ON SEND BUTTON

AND PASSWORD WILL SEND TO YOUR GMAIL

ACCOUNT WITH IN 6 HOURS

THANKS FOR YOUR ATTENTION

ANY QUESTION?

THANK YOU