2. Hacking
• What is Hack?
• -To Modify or Crack a program , often in
an anauthorise manner, by changing the
code itself.
• Who is hacker?
• -The person who is consistently engaging
in hacking activities, and has accepted
hacking as a lifestyle and philosophy of
their choice is called hacker.
3. What is the meaning of
hacking?
Hacking is the technique of modifying
the features of system. In order to
accomplish a goal outside of the
creator's original purpose.
4. Differnce Between Hacker and Cracker?
Hacker:
The person who
hacks the
system
Cracker:
The person who
destroy the
system or intrude
the system.
5. History Of Hacking.
• The first hacker was
appeared in 1960's at
the Massachusetts
Institute of
Technology (MIT)
• During the 1970's, a
different king of
hacker
appeared:Phone
Phreaker Or Phone
Hacker.
6. •In the 1980's, phreaks started to migrate to
computer, and the first Bulletin Board System
(BBS) appeared.
•During The 1990's, When the use of internet
wide spread around the world, Hackers
multiplied.
7. Diffrence between Hacker and
ethical Hacker.
• Hacker:-
The person who access the computer
system or network without authorization.
• Ethical hacker:-
The person who performs the same
activities but with owenr's permission.
Employed by companies to perform
penetration test.
8. Types of Hackers.
White Hats Black Hats Srcript Kiddies
Spy Hackers
Grey Hats
Suicide Hackers Cyber Terrorist State Sponsored Hacker
9. Hacking Process
1.Footprinting
2.Scanning
4.Attack And Gaining Access
3.Enumeration
5.Escalating Privilages ,
Covering Tracks &
and creating Backdoors
10. Hacking Process Explanation
• Footprinting:
Footprinting is the technique of gathering
information about computer systems and the
entities they belong to.
• Scanning:
Port scanning is a common technique used by a
penetration tester to find out the open doors, In technical
terminology port scanning is used to find out the
vulnerabilities in the services listing on a port.
11. Enumeration:
Enumeration is the first attack on target network, enumeration is the
process to gather the information about a target machine by actively
connecting to it.
Attack And Gaining Access:
In computer and computer networks an attack is any attempt to
destroy, expose, alter, disable, steal or gain unauthorized access to
or make unauthorized use of an asset.
This is the phase where the real hacking takes place. Vulnerabilities
discovered during the reconnaissance and scanning phase are now
exploited to gain access. The method of connection the hacker
uses for an exploit can be a local area network (LAN, either wired or
wireless), local access to a PC, the Internet, or offline. Examples
include stack-based buffer overflows, denial of service (DoS), and
session hijacking. These topics will be discussed in later chapters.
Gaining access is known in the hacker world as owning the system.
12. Escalating Privilages, Covering Tracks & and creating Backdoors:
Once hackers have been able to gain and maintain access, they
cover their tracks to avoid
detection by security personnel, to continue to use the owned
system, to remove evidence of
hacking, or to avoid legal action. Hackers try to remove all traces of
the attack, such as log files
or intrusion detection system (IDS) alarms. Examples of activities
during this phase of the
attack include steganography, the use of tunneling protocols, and
altering log files.
13. Some tips to protect from Hackers!
• Keep Antivirus in PC and Keep it Up-dated.
• Don't Open suspecious email's
• Change Your password after some days.
• Choose Cryprtic Password for accounts (use
special symbols,numbers,words)
• Don't Download mobile apps from third party
websites.
• Download OS updates.
• Keep Anti-spyware in your computer.
• Use Virtual Keyboard when online shoping.