SlideShare a Scribd company logo
1 of 28
HACKING

Presented by: Harendra Singh
MCA
INTRODUCTION
 THE PROCESS OF ATTEMPTING TO GAIN OR
SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO
COMPUTER RESOURCES FOR THE PURPOSE OF HELP
OR SECURE SYSTEM IS CALLED HACKING
 HACKING IS TECHNIQUE IN WHICH ANY ONE CAN
ACESS ANY ONE’S COMPUTER WITHOUT HIS
PERMISSION
 THE PERSON WHO IS DOING THIS TYPE OF WORK IS
CALLED HACKER
HISTORY OF HACKING
 1966 – ROBERT MORRIS INTRODUCES THE
CONCEPT OF SAFE HACKING.
 1969 – DEVELOPMENT IN THE FIELD OF
HACKING.
 1990 – ELECTRONIC FRONTIER FOUNDATION
WAS FOUNDED.
 1995 – MARK ANDREESSON & ERIC RELEASE
MOSAIC.
WHO IS HACKER?
 HACKER IS NOT CYBER CRIMINAL BUT HE IS THE
VERY INTELLIGENT PERSON WHO IS USE HIS
KNOWLEDGE IN CONSTRUCTIVE MANNER TO
SECURE SYSTEM & NEVER DAMAGE DATA
 HE KNOW ALL ABOUT THE OPERATING SYSTEM &
DIFFERENT HOLES IN THE SYSTEM
WHO IS CRACKER?
 PERSON WHO ENTER INTO OTHER’S SYSTEM AND
VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE
HAVOC IS CALLED CRACKER
 CRACKER IS CYBER CRIMINAL
 THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR
ACTIONS ARE MALICIOUS
WHY DO CRACKERS EXIST?
 CRACKERS ARE EXIST BECAUSE HUMAN NATURE IS
JUST SO,FREQUENTLY DRIVEN BY TO DESTROY
INSTEAD OF CREAT
 THEY ARE USE FOR DIFFERENT PURPOSE LIKE FOR
PROFIT,SOME COMPANY USE THEM FOR DISABLE
THE COMPITITOR COMPANY,FOR CRACKS CREDIT
CARD NUMBER
DIFFERENCE BETWEEN HACKER &
CRACKER
HACKER

CRACKER

 HACKER’S PROGRAMS TO
CHECK INTIGRITY OF
OTHER PROGRAMS.THUS
WHEN HACKER CREATE
PROGRAM IT
AUTOMATICALLY CHECK
REMOTE MACHINE
SECURITY STRUCTURE

 CRACKERS RARELY MAKE
THEIR OWN PROGRAM
.INSTEAD ,THEY STEAL
TOOL,PROGRAMS FROM
OTHERS

 THEY ALWAYS DO
CONTRUCTIVE WORK

 CRACKERS CREATES
NOTHING & DESTROY
MUCH
WHICH OPERATING SYSTEM HACKER
USE ?
 SUN
 UNIX
 MICROSOFT
SUN
 HACKERS USING EITHER SOLARIC X86 OR SCO
AS A PLATFORM.
 THIS IS BECAUSE THESE PRODUCTS ARE
LICENSE WARE & THEY CAN EASILY BE
OBTAINED.
UNIX
 POPULAR PLATFORM BECAUSE THEY
REQUIRED A LOW OVERHEAD.
 WE CAN RUN LINUX ON A PALTRAY 386 AND
GAIN GOOD PERFORMANCE.
 THIS IS REASONABLE.
MICROSOFT
 THIS SUPPORTS MANY SECURITY TOOLS THAT
CAN BE USED TO ATTACK REMOTE MACHINE.
 IT HAS ADVANCED TOOLS FOR NETWORKING
AS WELL.
WHY DO PEOPLE HACK ?
 JUST FOR FUN.
 SHOW OF THEIR KNOWLEDGE.
 HACK OTHER SYSTEM SECRETLY.
 DESTROY ENEMY’S COMPUTER NETWORK
DURING THE WAR.
 FOR PROFIT PEOPLE PAYS A CRACKER.
 CRACK FOR SAKE OF CURIOCITY.
THE PSYCOLOGY OF HACKERS
 ALL INFORMATION SHOULD BE FREE.
 ACCESS TO COMPUTER SHOULD BE
UNLIMITED AND FREE.
 IT CAN CHANGE LIFR FOR BETTER.
 IT CAN CREATE BEAUTY ON COMPUTER.
TYPES OF HACKING
 THERE ARE MANY TYPES OF HACKING
LIKE
• PASSWORD HACKING
• SOFTWARE HACKING
• NET HACKING
PASSWORD HACKING
 TWO TYPES
1. BRUTE FORCE
• IN THAT CASE HACKERS TRY OUT ALL THE
COMBINATION OF ALL KEYBOARD LETTERS .IT HAS
GRATER SUCCESS BUT IT TAKES LONG TIME
2. DICTIONARY BASED
• IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS
UNSUCCESSFUL METHOD
SOFTWARE HACKING
 IN THAT HACKERS CHANGES THE LOOK &
EXCUTION WAY OF THAT SOFTWARE
 CHANG THE DEMO VERSION INTO FULL
VERSION BY DECODE THE SOURCE CODE
IP ADDRESS
 IP ADDRESS IS THE ADDRESS OF YOUR
COMPUTER IN THE INTERNET
 IT IS UNIQ
 LIKE 192.168.23.45
PORT
 IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR
COMPUTER
 IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER
CAN ENTER
 THERE ARE THOUSANDS OF PORTS INTO COMPUTER
 THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT
 LIKE
PORT 21 : FTP
PORT 23 : TELNET
PORT 80 : HTTP
PORT 25 : MAIL
HACKING TOOLS
THERE ARE MANY TOOLS ARE AVILABLE:
•
•
•
•

SCANNERS
TELNET
FTP
LAN WATCH
SCANNERS
 IT IS NOT A PHOTO SCANNER
 SCANNER IS PROGRAM THAT AUTOMATICALLY
DETECTS SECURITY WEAKNESS IN REMOTE HOST
 PORT SCANNERS ARE USE IN HACKING
 PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN
PORT ON THAT SYSTEM AND WHICH SERVICE IS
RUNNING ON THAT
 IT CAN USE ALMOST ALL OPERATING SYSTEM
 EX. SATAN,NMAP
TELNET
 TELNET IS ALTIMATE HACKING TOOL
 IT IS TERMINAL EMULATION PROGRAM THAT
ALLOW US TO CONNECT TO REMOTE SYSTEM
 YOU HAVE TO FOLLOW THIS STEP TO USE
TELNET
C:WINDOWSTELNET [IP ADDRESS] PORT
FTP
 FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT
IS USE AS HACKING TOOL
 PORT 21 FOR THE FTP
 FOR CONNECTING FTP WE NEED SOME FTP S/W
KNOWN AS FTP CLIENT
 FOR CONNECTING FTP SERVER YOU HAVE TO
HAMMERING THAT SERVER
 COMMAND:
C:WINDOWSFTP [IP ADDRESS]:PORT
LAN WATCH
 LAN WATCH IS A SOFTWARE WHICH NOT
ATTACK AND NOT DAMAGE REMOTE
NETWORK
 BUT IT KEEP WATCH ON THE REMOTE
NETWORK & GIVE ALL THE INFORMATION
WHAT IS GOING ON THAT NETWORK
ATTACKS
THERE ARE MANY TYPES OF ATTACKS:
•
•
•
•
•
•

SPOOFING ATTACK
TELNET BASED ATTACK
DOS (Daniel of service) ATTACK
PING OF DEATH
DISTRIBUTED DOS ATTACK
MAILBOMBS
NEED FOR SECURITY
SOME EXELLENT SOFTWARE CAN PROVIDE YOU
BEST SECURITY
LIKE:
• TROJAN
• FIREWALL
TROJAN
 WINDOWS TROJANS ARE SMALL ASPECT OF
WINDOWS SECURUTY
 TROJAN IS UNOTHORIZED PROGRAM
CONTAINED WITHIN A LEGIMATE PROGRAM
 THIS PROGRAM PERFORMS FUNCTION
UNKNOWN BY USER
FIREWALL
FIREWALL IS ANY DEVICE USED TO PREVENT
OUTSIDERS FROM GAINING ACCESS TO YOUR
NETWORK
TYPES OF FIREWALLS:
• PACKET FILTER
• APPLICATION PROXY
• PACKET INSPECTION
CONCLUSION

More Related Content

What's hot

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingdjkhatri
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityPanda Security
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1rayborg
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoorsjibinmanjooran
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoorsmridulahuja
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Mahmoud Saeed
 

What's hot (18)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Presentation
PresentationPresentation
Presentation
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1
 
Hacking
HackingHacking
Hacking
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Backdoor
BackdoorBackdoor
Backdoor
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Hacker !
Hacker !Hacker !
Hacker !
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
 

Viewers also liked

Viewers also liked (15)

Hackers
HackersHackers
Hackers
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
About hackers
About hackersAbout hackers
About hackers
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
EVALUACIÓN
EVALUACIÓNEVALUACIÓN
EVALUACIÓN
 
Cookies and Session
Cookies and SessionCookies and Session
Cookies and Session
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Hackers ESP
Hackers ESPHackers ESP
Hackers ESP
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 

Similar to Hacking

Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linuxmariuszantal
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.Coder Tech
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosOuthai SAIOUDOM
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 

Similar to Hacking (20)

PPIT Lecture 18
PPIT Lecture 18PPIT Lecture 18
PPIT Lecture 18
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
PPIT Lecture 17
PPIT Lecture 17PPIT Lecture 17
PPIT Lecture 17
 
Network Security
Network SecurityNetwork Security
Network Security
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linux
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Hacking
HackingHacking
Hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 

More from Harendra Singh

More from Harendra Singh (6)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Google glass
Google glassGoogle glass
Google glass
 
Chromebook
ChromebookChromebook
Chromebook
 
User defined functions in C
User defined functions in CUser defined functions in C
User defined functions in C
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
E-learning vs Classroom learning
E-learning vs Classroom learningE-learning vs Classroom learning
E-learning vs Classroom learning
 

Recently uploaded

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Recently uploaded (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

Hacking

  • 2. INTRODUCTION  THE PROCESS OF ATTEMPTING TO GAIN OR SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO COMPUTER RESOURCES FOR THE PURPOSE OF HELP OR SECURE SYSTEM IS CALLED HACKING  HACKING IS TECHNIQUE IN WHICH ANY ONE CAN ACESS ANY ONE’S COMPUTER WITHOUT HIS PERMISSION  THE PERSON WHO IS DOING THIS TYPE OF WORK IS CALLED HACKER
  • 3. HISTORY OF HACKING  1966 – ROBERT MORRIS INTRODUCES THE CONCEPT OF SAFE HACKING.  1969 – DEVELOPMENT IN THE FIELD OF HACKING.  1990 – ELECTRONIC FRONTIER FOUNDATION WAS FOUNDED.  1995 – MARK ANDREESSON & ERIC RELEASE MOSAIC.
  • 4. WHO IS HACKER?  HACKER IS NOT CYBER CRIMINAL BUT HE IS THE VERY INTELLIGENT PERSON WHO IS USE HIS KNOWLEDGE IN CONSTRUCTIVE MANNER TO SECURE SYSTEM & NEVER DAMAGE DATA  HE KNOW ALL ABOUT THE OPERATING SYSTEM & DIFFERENT HOLES IN THE SYSTEM
  • 5. WHO IS CRACKER?  PERSON WHO ENTER INTO OTHER’S SYSTEM AND VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE HAVOC IS CALLED CRACKER  CRACKER IS CYBER CRIMINAL  THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR ACTIONS ARE MALICIOUS
  • 6. WHY DO CRACKERS EXIST?  CRACKERS ARE EXIST BECAUSE HUMAN NATURE IS JUST SO,FREQUENTLY DRIVEN BY TO DESTROY INSTEAD OF CREAT  THEY ARE USE FOR DIFFERENT PURPOSE LIKE FOR PROFIT,SOME COMPANY USE THEM FOR DISABLE THE COMPITITOR COMPANY,FOR CRACKS CREDIT CARD NUMBER
  • 7. DIFFERENCE BETWEEN HACKER & CRACKER HACKER CRACKER  HACKER’S PROGRAMS TO CHECK INTIGRITY OF OTHER PROGRAMS.THUS WHEN HACKER CREATE PROGRAM IT AUTOMATICALLY CHECK REMOTE MACHINE SECURITY STRUCTURE  CRACKERS RARELY MAKE THEIR OWN PROGRAM .INSTEAD ,THEY STEAL TOOL,PROGRAMS FROM OTHERS  THEY ALWAYS DO CONTRUCTIVE WORK  CRACKERS CREATES NOTHING & DESTROY MUCH
  • 8. WHICH OPERATING SYSTEM HACKER USE ?  SUN  UNIX  MICROSOFT
  • 9. SUN  HACKERS USING EITHER SOLARIC X86 OR SCO AS A PLATFORM.  THIS IS BECAUSE THESE PRODUCTS ARE LICENSE WARE & THEY CAN EASILY BE OBTAINED.
  • 10. UNIX  POPULAR PLATFORM BECAUSE THEY REQUIRED A LOW OVERHEAD.  WE CAN RUN LINUX ON A PALTRAY 386 AND GAIN GOOD PERFORMANCE.  THIS IS REASONABLE.
  • 11. MICROSOFT  THIS SUPPORTS MANY SECURITY TOOLS THAT CAN BE USED TO ATTACK REMOTE MACHINE.  IT HAS ADVANCED TOOLS FOR NETWORKING AS WELL.
  • 12. WHY DO PEOPLE HACK ?  JUST FOR FUN.  SHOW OF THEIR KNOWLEDGE.  HACK OTHER SYSTEM SECRETLY.  DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.  FOR PROFIT PEOPLE PAYS A CRACKER.  CRACK FOR SAKE OF CURIOCITY.
  • 13. THE PSYCOLOGY OF HACKERS  ALL INFORMATION SHOULD BE FREE.  ACCESS TO COMPUTER SHOULD BE UNLIMITED AND FREE.  IT CAN CHANGE LIFR FOR BETTER.  IT CAN CREATE BEAUTY ON COMPUTER.
  • 14. TYPES OF HACKING  THERE ARE MANY TYPES OF HACKING LIKE • PASSWORD HACKING • SOFTWARE HACKING • NET HACKING
  • 15. PASSWORD HACKING  TWO TYPES 1. BRUTE FORCE • IN THAT CASE HACKERS TRY OUT ALL THE COMBINATION OF ALL KEYBOARD LETTERS .IT HAS GRATER SUCCESS BUT IT TAKES LONG TIME 2. DICTIONARY BASED • IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS UNSUCCESSFUL METHOD
  • 16. SOFTWARE HACKING  IN THAT HACKERS CHANGES THE LOOK & EXCUTION WAY OF THAT SOFTWARE  CHANG THE DEMO VERSION INTO FULL VERSION BY DECODE THE SOURCE CODE
  • 17. IP ADDRESS  IP ADDRESS IS THE ADDRESS OF YOUR COMPUTER IN THE INTERNET  IT IS UNIQ  LIKE 192.168.23.45
  • 18. PORT  IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR COMPUTER  IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER CAN ENTER  THERE ARE THOUSANDS OF PORTS INTO COMPUTER  THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT  LIKE PORT 21 : FTP PORT 23 : TELNET PORT 80 : HTTP PORT 25 : MAIL
  • 19. HACKING TOOLS THERE ARE MANY TOOLS ARE AVILABLE: • • • • SCANNERS TELNET FTP LAN WATCH
  • 20. SCANNERS  IT IS NOT A PHOTO SCANNER  SCANNER IS PROGRAM THAT AUTOMATICALLY DETECTS SECURITY WEAKNESS IN REMOTE HOST  PORT SCANNERS ARE USE IN HACKING  PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN PORT ON THAT SYSTEM AND WHICH SERVICE IS RUNNING ON THAT  IT CAN USE ALMOST ALL OPERATING SYSTEM  EX. SATAN,NMAP
  • 21. TELNET  TELNET IS ALTIMATE HACKING TOOL  IT IS TERMINAL EMULATION PROGRAM THAT ALLOW US TO CONNECT TO REMOTE SYSTEM  YOU HAVE TO FOLLOW THIS STEP TO USE TELNET C:WINDOWSTELNET [IP ADDRESS] PORT
  • 22. FTP  FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS USE AS HACKING TOOL  PORT 21 FOR THE FTP  FOR CONNECTING FTP WE NEED SOME FTP S/W KNOWN AS FTP CLIENT  FOR CONNECTING FTP SERVER YOU HAVE TO HAMMERING THAT SERVER  COMMAND: C:WINDOWSFTP [IP ADDRESS]:PORT
  • 23. LAN WATCH  LAN WATCH IS A SOFTWARE WHICH NOT ATTACK AND NOT DAMAGE REMOTE NETWORK  BUT IT KEEP WATCH ON THE REMOTE NETWORK & GIVE ALL THE INFORMATION WHAT IS GOING ON THAT NETWORK
  • 24. ATTACKS THERE ARE MANY TYPES OF ATTACKS: • • • • • • SPOOFING ATTACK TELNET BASED ATTACK DOS (Daniel of service) ATTACK PING OF DEATH DISTRIBUTED DOS ATTACK MAILBOMBS
  • 25. NEED FOR SECURITY SOME EXELLENT SOFTWARE CAN PROVIDE YOU BEST SECURITY LIKE: • TROJAN • FIREWALL
  • 26. TROJAN  WINDOWS TROJANS ARE SMALL ASPECT OF WINDOWS SECURUTY  TROJAN IS UNOTHORIZED PROGRAM CONTAINED WITHIN A LEGIMATE PROGRAM  THIS PROGRAM PERFORMS FUNCTION UNKNOWN BY USER
  • 27. FIREWALL FIREWALL IS ANY DEVICE USED TO PREVENT OUTSIDERS FROM GAINING ACCESS TO YOUR NETWORK TYPES OF FIREWALLS: • PACKET FILTER • APPLICATION PROXY • PACKET INSPECTION