2. INTRODUCTION
THE PROCESS OF ATTEMPTING TO GAIN OR
SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO
COMPUTER RESOURCES FOR THE PURPOSE OF HELP
OR SECURE SYSTEM IS CALLED HACKING
HACKING IS TECHNIQUE IN WHICH ANY ONE CAN
ACESS ANY ONE’S COMPUTER WITHOUT HIS
PERMISSION
THE PERSON WHO IS DOING THIS TYPE OF WORK IS
CALLED HACKER
3. HISTORY OF HACKING
1966 – ROBERT MORRIS INTRODUCES THE
CONCEPT OF SAFE HACKING.
1969 – DEVELOPMENT IN THE FIELD OF
HACKING.
1990 – ELECTRONIC FRONTIER FOUNDATION
WAS FOUNDED.
1995 – MARK ANDREESSON & ERIC RELEASE
MOSAIC.
4. WHO IS HACKER?
HACKER IS NOT CYBER CRIMINAL BUT HE IS THE
VERY INTELLIGENT PERSON WHO IS USE HIS
KNOWLEDGE IN CONSTRUCTIVE MANNER TO
SECURE SYSTEM & NEVER DAMAGE DATA
HE KNOW ALL ABOUT THE OPERATING SYSTEM &
DIFFERENT HOLES IN THE SYSTEM
5. WHO IS CRACKER?
PERSON WHO ENTER INTO OTHER’S SYSTEM AND
VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE
HAVOC IS CALLED CRACKER
CRACKER IS CYBER CRIMINAL
THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR
ACTIONS ARE MALICIOUS
6. WHY DO CRACKERS EXIST?
CRACKERS ARE EXIST BECAUSE HUMAN NATURE IS
JUST SO,FREQUENTLY DRIVEN BY TO DESTROY
INSTEAD OF CREAT
THEY ARE USE FOR DIFFERENT PURPOSE LIKE FOR
PROFIT,SOME COMPANY USE THEM FOR DISABLE
THE COMPITITOR COMPANY,FOR CRACKS CREDIT
CARD NUMBER
7. DIFFERENCE BETWEEN HACKER &
CRACKER
HACKER
CRACKER
HACKER’S PROGRAMS TO
CHECK INTIGRITY OF
OTHER PROGRAMS.THUS
WHEN HACKER CREATE
PROGRAM IT
AUTOMATICALLY CHECK
REMOTE MACHINE
SECURITY STRUCTURE
CRACKERS RARELY MAKE
THEIR OWN PROGRAM
.INSTEAD ,THEY STEAL
TOOL,PROGRAMS FROM
OTHERS
THEY ALWAYS DO
CONTRUCTIVE WORK
CRACKERS CREATES
NOTHING & DESTROY
MUCH
9. SUN
HACKERS USING EITHER SOLARIC X86 OR SCO
AS A PLATFORM.
THIS IS BECAUSE THESE PRODUCTS ARE
LICENSE WARE & THEY CAN EASILY BE
OBTAINED.
10. UNIX
POPULAR PLATFORM BECAUSE THEY
REQUIRED A LOW OVERHEAD.
WE CAN RUN LINUX ON A PALTRAY 386 AND
GAIN GOOD PERFORMANCE.
THIS IS REASONABLE.
11. MICROSOFT
THIS SUPPORTS MANY SECURITY TOOLS THAT
CAN BE USED TO ATTACK REMOTE MACHINE.
IT HAS ADVANCED TOOLS FOR NETWORKING
AS WELL.
12. WHY DO PEOPLE HACK ?
JUST FOR FUN.
SHOW OF THEIR KNOWLEDGE.
HACK OTHER SYSTEM SECRETLY.
DESTROY ENEMY’S COMPUTER NETWORK
DURING THE WAR.
FOR PROFIT PEOPLE PAYS A CRACKER.
CRACK FOR SAKE OF CURIOCITY.
13. THE PSYCOLOGY OF HACKERS
ALL INFORMATION SHOULD BE FREE.
ACCESS TO COMPUTER SHOULD BE
UNLIMITED AND FREE.
IT CAN CHANGE LIFR FOR BETTER.
IT CAN CREATE BEAUTY ON COMPUTER.
14. TYPES OF HACKING
THERE ARE MANY TYPES OF HACKING
LIKE
• PASSWORD HACKING
• SOFTWARE HACKING
• NET HACKING
15. PASSWORD HACKING
TWO TYPES
1. BRUTE FORCE
• IN THAT CASE HACKERS TRY OUT ALL THE
COMBINATION OF ALL KEYBOARD LETTERS .IT HAS
GRATER SUCCESS BUT IT TAKES LONG TIME
2. DICTIONARY BASED
• IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS
UNSUCCESSFUL METHOD
16. SOFTWARE HACKING
IN THAT HACKERS CHANGES THE LOOK &
EXCUTION WAY OF THAT SOFTWARE
CHANG THE DEMO VERSION INTO FULL
VERSION BY DECODE THE SOURCE CODE
17. IP ADDRESS
IP ADDRESS IS THE ADDRESS OF YOUR
COMPUTER IN THE INTERNET
IT IS UNIQ
LIKE 192.168.23.45
18. PORT
IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR
COMPUTER
IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER
CAN ENTER
THERE ARE THOUSANDS OF PORTS INTO COMPUTER
THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT
LIKE
PORT 21 : FTP
PORT 23 : TELNET
PORT 80 : HTTP
PORT 25 : MAIL
20. SCANNERS
IT IS NOT A PHOTO SCANNER
SCANNER IS PROGRAM THAT AUTOMATICALLY
DETECTS SECURITY WEAKNESS IN REMOTE HOST
PORT SCANNERS ARE USE IN HACKING
PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN
PORT ON THAT SYSTEM AND WHICH SERVICE IS
RUNNING ON THAT
IT CAN USE ALMOST ALL OPERATING SYSTEM
EX. SATAN,NMAP
21. TELNET
TELNET IS ALTIMATE HACKING TOOL
IT IS TERMINAL EMULATION PROGRAM THAT
ALLOW US TO CONNECT TO REMOTE SYSTEM
YOU HAVE TO FOLLOW THIS STEP TO USE
TELNET
C:WINDOWSTELNET [IP ADDRESS] PORT
22. FTP
FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT
IS USE AS HACKING TOOL
PORT 21 FOR THE FTP
FOR CONNECTING FTP WE NEED SOME FTP S/W
KNOWN AS FTP CLIENT
FOR CONNECTING FTP SERVER YOU HAVE TO
HAMMERING THAT SERVER
COMMAND:
C:WINDOWSFTP [IP ADDRESS]:PORT
23. LAN WATCH
LAN WATCH IS A SOFTWARE WHICH NOT
ATTACK AND NOT DAMAGE REMOTE
NETWORK
BUT IT KEEP WATCH ON THE REMOTE
NETWORK & GIVE ALL THE INFORMATION
WHAT IS GOING ON THAT NETWORK
24. ATTACKS
THERE ARE MANY TYPES OF ATTACKS:
•
•
•
•
•
•
SPOOFING ATTACK
TELNET BASED ATTACK
DOS (Daniel of service) ATTACK
PING OF DEATH
DISTRIBUTED DOS ATTACK
MAILBOMBS
25. NEED FOR SECURITY
SOME EXELLENT SOFTWARE CAN PROVIDE YOU
BEST SECURITY
LIKE:
• TROJAN
• FIREWALL
26. TROJAN
WINDOWS TROJANS ARE SMALL ASPECT OF
WINDOWS SECURUTY
TROJAN IS UNOTHORIZED PROGRAM
CONTAINED WITHIN A LEGIMATE PROGRAM
THIS PROGRAM PERFORMS FUNCTION
UNKNOWN BY USER
27. FIREWALL
FIREWALL IS ANY DEVICE USED TO PREVENT
OUTSIDERS FROM GAINING ACCESS TO YOUR
NETWORK
TYPES OF FIREWALLS:
• PACKET FILTER
• APPLICATION PROXY
• PACKET INSPECTION