Upload
urvesh-sojitra
View
219
Download
0
Embed Size (px)
Citation preview
8/3/2019 39 42 Hacking
1/27
8/3/2019 39 42 Hacking
2/27
The process of attempting to gain, or
successfully gaining, unauthorized access to
computer resources for the purpose of help or
secure system is called hacking.
8/3/2019 39 42 Hacking
3/27
1966 ROBERT MORRIS Introduces theconcept of safe hacking.
1969 Development in the fild of hacking.
1990 Electronic frontier foundation wasfounded.
1995 Marc Andreesson and Eric Bina of the
National Center for SupercomputingApplications release Mosaic, the first WWWbrowser that can show graphics
8/3/2019 39 42 Hacking
4/27
Hacker is not cyber criminal but he is the very intelligent
person who is use his knowledge in constructive manner to
secure system & never damage data.
Hacking is technique in which any one can access any ones
computer with out his permission. the person who is doing
this type of work is called hacker.
He know all about the operating system & different holes in
the system.
8/3/2019 39 42 Hacking
5/27
Person who enter into others system and violates
the system , damage the data , create havoc is called
cracker.
Cracker is cyber criminal.
They can be easily identified because their action aremalicious .
8/3/2019 39 42 Hacking
6/27
Crackers exist because human nature is just so,frequently driven by a desire to destroy instead of
create.
They are use for different purpose like for profit ,some company use them for disable the competitor
company , for cracks credit card number.
8/3/2019 39 42 Hacking
7/27
They write programs tocheck the integrity ofother programs.
when a hacker creates a
program that canautomatically check thesecurity structure
They always doconstructive work.
Crackers rarely writetheir own programs.Instead, they beg,borrow, or steal tools
from others. They use these tools
not to improve Internetsecurity, but to subvertit.
Cracker creates nothingbut destroy much.
8/3/2019 39 42 Hacking
8/27
SUN
UNIX
MICROSOFT
8/3/2019 39 42 Hacking
9/27
It is fairly common to see crackers using either
SolarisX86 or SCO as a platform.
This is because even though these products are
license ware, they can easily be obtained.
8/3/2019 39 42 Hacking
10/27
UNIX platforms are popular because they
generally require a low overhead.
we can run Linux or FreeBSD on a paltry 386
and gain good performance.
This is reasonable.
8/3/2019 39 42 Hacking
11/27
The Microsoft platform supports many
security tools that can be used to attack
remote machine.
It has advanced tools for networking as well.
8/3/2019 39 42 Hacking
12/27
Just for fun
Show off
Hack other systems secretly Notify many people their thought
Steal important information
Destroy enemys computer network duringthe war
Profit--Someone pays a cracker to bring you
down or to get your proprietary data.
8/3/2019 39 42 Hacking
13/27
Access to computer should be unlimited and
free.
All information should be free.
Hackers should be judged by their hacking,
not bogus criteria such as degrees, age, race,
or position.
You can create art and beauty on a computer.
Computers can change your life for the better.
8/3/2019 39 42 Hacking
14/27
There are many types of hacking like
PASSWORD HACKING SOFTWARE HACKING
NET HACKING
8/3/2019 39 42 Hacking
15/27
TWO TYPES
1. BRUTE FORCE
In that case hacker try out all the combination of
all keyboard letters . It has grater success but ittakes long time.
2. DICTIONARY BASED
In that they are use predefine password .it is
unsuccessful method.
8/3/2019 39 42 Hacking
16/27
In that hacker changes the look & excution
way of that software.
Change the demo version into full version by
decode the source code.
8/3/2019 39 42 Hacking
17/27
IP Address is the address of your computer in
the internet.
It is UNIQ
LIKE 192.168.23.45
8/3/2019 39 42 Hacking
18/27
It is not physical port but it is logical port in your computer.
It is just like hole into the system . Through hacker can enterin to system.
There are thousands of port into computer.
The particular service is running on particular port. LIKE
Port 21: FTP
Port 23: Telnet (Default)
Port 25: MailPort 70: Gopher
Port 80: HTTP
8/3/2019 39 42 Hacking
19/27
THERE ARE MANY TOOLS ARE AVILABLE
SCANNERS
TELNET FTP
LAN WATCH
8/3/2019 39 42 Hacking
20/27
It is not a photo scanner but it is a program thatautomatically detects security weaknesses in aremote or local host.
Port scanner are use in hacking.
It can give the whole list of open port on that systemand which service is running on that.
It can use almost all OS.
EX. SATAN,NMAP
8/3/2019 39 42 Hacking
21/27
TELNET IS ALTIMATE HACKING TOOL
IT IS TERMINAL EMULATION PROGRAM THAT
ALLOW US TO CONNECT TO REMOTE SYSTEM
YOU HAVE TO FOLLOW THIS STEP TO USE
TELNET
COMMAND:
C:\WINDOWS\TELNET [IP ADDRESS] PORT
8/3/2019 39 42 Hacking
22/27
FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS
USE AS HACKING TOOL
PORT 21 FOR THE FTP
FOR CONNECTING FTP WE NEED SOME FTP S/WKNOWN AS FTP CLIENT
FOR CONNECTING FTP SERVER YOU HAVE TO
HAMMERING THAT SERVER COMMAND:
C:\WINDOWS\FTP [IP ADDRESS]:PORT
8/3/2019 39 42 Hacking
23/27
LAN WATCH IS A SOFTWARE WHICH NOT
ATTACK AND NOT DAMAGE REMOTE
NETWORK
BUT IT KEEP WATCH ON THE REMOTE
NETWORK & GIVE ALL THE INFORMATION
WHAT IS GOING ON THAT NETWORK
8/3/2019 39 42 Hacking
24/27
THERE ARE MANY TYPES OF ATTACKS
SPOOFING ATTACK
TELNET BASED ATTACK
DOS (Daniel of service) ATTACK PING OF DEATH
DISTRIBUTED DOS ATTACK
MAILBOMBS
8/3/2019 39 42 Hacking
25/27
SOME EXELLENT SOFTWARE CAN PROVIDE
YOU BEST SECURITY
LIKE
TROJAN
FIREWALL
8/3/2019 39 42 Hacking
26/27
WINDOWS TROJANS ARE SMALL ASPECT OF
WINDOWS SECURUTY
TROJAN IS UNOTHORIZED PROGRAM
CONTAINED WITHIN A LEGIMATE PROGRAM
THIS PROGRAM PERFORMS FUNCTION
UNKNOWN BY USER
8/3/2019 39 42 Hacking
27/27
FIREWALL IS ANY DEVICE USED TO PREVENT
OUTSIDERS FROM GAINING ACCESS TO YOUR
NETWORK
TYPES OF FIREWALLS
PACKET FILTER
APPLICATION PROXY
PACKET INSPECTION