Anda di halaman 1dari 28

HACKING

INTRODUCTION
THE PROCESS OF ATTEMPTING TO GAIN OR SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO COMPUTER RESOURCES FOR THE PURPOSE OF HELP OR SECURE SYSTEM IS CALLED HACKING

HISTORY OF HACKING
1966 ROBERT MORRIS INTRODUCES THE CONCEPT OF SAFE HACKING. 1969 DEVELOPMENT IN THE FIELD OF HACKING. 1990 ELECTRONIC FRONTIER FOUNDATION WAS FOUNDED. 1995 MARK ANDREESSON & ERIC RELEASE MOSAIC.

WHO IS HACKER?

HACKER IS NOT CYBER CRIMINAL BUT HE IS THE VERY INTELLIGENT PERSON WHO IS USE HIS KNOWLEDGE IN CONSTRUCTIVE TO SECURE SYSTEM & COMPUTER NEVER WITHOUT H CHNIQUEMANNER IN WHICH ANY ONE CAN ACESS ANY ONES THE PERSON WHO IS DOING THIS TYPE OF WORK IS CALLED HACKER DAMAGE DATA HE KNOW ALL ABOUT THE OPERATING SYSTEM & DIFFERENT HOLES IN THE SYSTEM

WHO IS CRACKER?
PERSON WHO ENTER INTO OTHERS SYSTEM AND VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE HAVOC IS CALLED CRACKER CRACKER IS CYBER CRIMINAL

THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR ACTIONS ARE MALICIOUS

WHY DO CRACKERS EXIST?


CRACKERS ARE EXIST BECAUSE HUMAN NATURE IS JUST SO,FREQUENTLY DRIVEN BY TO DESTROY INSTEAD OF CREAT THEY ARE USE FOR DIFFERENT PURPOSE LIKE FOR PROFIT,SOME COMPANY USE THEM FOR DISABLE THE COMPITITOR COMPANY,FOR CRACKS CREDIT CARD NUMBER

DIFFERENCE BETWEEN HACKER & CRACKER


HACKERS PROGRAMS TO CHECK INTIGRITY OF OTHER PROGRAMS.THUS WHEN HACKER CREATE PROGRAM IT AUTOMATICALLY CHECK REMOTE MACHINE SECURITY STRUCTURE CRACKERS RARELY MAKE THEIR OWN PROGRAM .INSTEAD ,THEY STEAL TOOL,PROGRAMS FROM OTHERS

THEY ALWAYS DO CONTRUCTIVE WORK

CRACKERS CREATES NOTHING & DESTROY MUCH

WHICH OPERATING SYSTEM HACKER USE ?


SUN UNIX MICROSOFT

SUN
HACKERS USING EITHER SOLARIC X86 OR SCO AS A PLATFORM. THIS IS BECAUSE THESE PRODUCTS ARE LICENSE WARE & THEY CAN EASILY BE OBTAINED.

UNIX
POPULAR PLATFORM BECAUSE THEY REQUIRED A LOW OVERHEAD. WE CAN RUN LINUX ON A PALTRAY 386 AND GAIN GOOD PERFORMANCE. THIS IS REASONABLE.

MICROSOFT
THIS SUPPORTS MANY SECURITY TOOLS THAT CAN BE USED TO ATTACK REMOTE MACHINE. IT HAS ADVANCED TOOLS FOR NETWORKING AS WELL.

WHY DO PEOPLE HACK ?


JUST FOR FUN. SHOW OF THEIR KNOWLEDGE. HACK OTHER SYSTEM SECRETLY. DESTROY ENEMYS COMPUTER NETWORK DURING THE WAR. FOR PROFIT PEOPLE PAYS A CRACKER. CRACK FOR SAKE OF CURIOCITY.

THE PSYCOLOGY OF HACKERS


ALL INFORMATION SHOULD BE FREE. ACCESS TO COMPUTER SHOULD BE UNLIMITED AND FREE. IT CAN CHANGE LIFR FOR BETTER. IT CAN CREATE BEAUTY ON COMPUTER.

TYPES OF HACKING
THERE ARE MANY TYPES OF HACKING LIKE PASSWORD HACKING SOFTWARE HACKING NET HACKING

PASSWORD HACKING
TWO TYPES 1. BRUTE FORCE IN THAT CASE HACKERS TRY OUT ALL THE COMBINATION OF ALL KEYBOARD LETTERS .IT HAS GRATER SUCCESS BUT IT TAKES LONG TIME 2. DICTIONARY BASED IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS UNSUCCESSFUL METHOD

SOFTWARE HACKING
IN THAT HACKERS CHANGES THE LOOK & EXCUTION WAY OF THAT SOFTWARE CHANG THE DEMO VERSION INTO FULL VERSION BY DECODE THE SOURCE CODE

IP ADDRESS
IP ADDRESS IS THE ADDRESS OF YOUR COMPUTER IN THE INTERNET IT IS UNIQ LIKE 192.168.23.45

PORT
IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR COMPUTER IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER CAN ENTER THERE ARE THOUSANDS OF PORTS INTO COMPUTER THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT LIKE PORT 21 : FTP PORT 23 : TELNET PORT 80 : HTTP PORT 25 : MAIL

HACKING TOOLS
THERE ARE MANY TOOLS ARE AVILABLE SCANNERS TELNET FTP LAN WATCH

SCANNERS
IT IS NOT A PHOTO SCANNER SCANNER IS PROGRAM THAT AUTOMATICALLY DETECTS SECURITY WEAKNESS IN REMOTE HOST PORT SCANNERS ARE USE IN HACKING PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN PORT ON THAT SYSTEM AND WHICH SERVICE IS RUNNING ON THAT IT CAN USE ALMOST ALL OPERATING SYSTEM EX. SATAN,NMAP

TELNET
TELNET IS ALTIMATE HACKING TOOL IT IS TERMINAL EMULATION PROGRAM THAT ALLOW US TO CONNECT TO REMOTE SYSTEM YOU HAVE TO FOLLOW THIS STEP TO USE TELNET C:\WINDOWS\TELNET [IP ADDRESS] PORT

FTP
FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS USE AS HACKING TOOL PORT 21 FOR THE FTP FOR CONNECTING FTP WE NEED SOME FTP S/W KNOWN AS FTP CLIENT FOR CONNECTING FTP SERVER YOU HAVE TO HAMMERING THAT SERVER COMMAND: C:\WINDOWS\FTP [IP ADDRESS]:PORT

LAN WATCH
LAN WATCH IS A SOFTWARE WHICH NOT ATTACK AND NOT DAMAGE REMOTE NETWORK BUT IT KEEP WATCH ON THE REMOTE NETWORK & GIVE ALL THE INFORMATION WHAT IS GOING ON THAT NETWORK

ATTACKS
THERE ARE MANY TYPES OF ATTACKS SPOOFING ATTACK TELNET BASED ATTACK DOS (Daniel of service) ATTACK PING OF DEATH DISTRIBUTED DOS ATTACK MAILBOMBS

NEED FOR SECURITY


SOME EXELLENT SOFTWARE CAN PROVIDE YOU BEST SECURITY LIKE TROJAN FIREWALL

TROJAN
WINDOWS TROJANS ARE SMALL ASPECT OF WINDOWS SECURUTY TROJAN IS UNOTHORIZED PROGRAM CONTAINED WITHIN A LEGIMATE PROGRAM THIS PROGRAM PERFORMS FUNCTION UNKNOWN BY USER

FIREWALL
FIREWALL IS ANY DEVICE USED TO PREVENT OUTSIDERS FROM GAINING ACCESS TO YOUR NETWORK TYPES OF FIREWALLS PACKET FILTER APPLICATION PROXY PACKET INSPECTION

CONCLUSION

Anda mungkin juga menyukai