SlideShare ist ein Scribd-Unternehmen logo
1 von 28
HACKING

Presented by: Harendra Singh
MCA
INTRODUCTION
 THE PROCESS OF ATTEMPTING TO GAIN OR
SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO
COMPUTER RESOURCES FOR THE PURPOSE OF HELP
OR SECURE SYSTEM IS CALLED HACKING
 HACKING IS TECHNIQUE IN WHICH ANY ONE CAN
ACESS ANY ONE’S COMPUTER WITHOUT HIS
PERMISSION
 THE PERSON WHO IS DOING THIS TYPE OF WORK IS
CALLED HACKER
HISTORY OF HACKING
 1966 – ROBERT MORRIS INTRODUCES THE
CONCEPT OF SAFE HACKING.
 1969 – DEVELOPMENT IN THE FIELD OF
HACKING.
 1990 – ELECTRONIC FRONTIER FOUNDATION
WAS FOUNDED.
 1995 – MARK ANDREESSON & ERIC RELEASE
MOSAIC.
WHO IS HACKER?
 HACKER IS NOT CYBER CRIMINAL BUT HE IS THE
VERY INTELLIGENT PERSON WHO IS USE HIS
KNOWLEDGE IN CONSTRUCTIVE MANNER TO
SECURE SYSTEM & NEVER DAMAGE DATA
 HE KNOW ALL ABOUT THE OPERATING SYSTEM &
DIFFERENT HOLES IN THE SYSTEM
WHO IS CRACKER?
 PERSON WHO ENTER INTO OTHER’S SYSTEM AND
VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE
HAVOC IS CALLED CRACKER
 CRACKER IS CYBER CRIMINAL
 THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR
ACTIONS ARE MALICIOUS
WHY DO CRACKERS EXIST?
 CRACKERS ARE EXIST BECAUSE HUMAN NATURE IS
JUST SO,FREQUENTLY DRIVEN BY TO DESTROY
INSTEAD OF CREAT
 THEY ARE USE FOR DIFFERENT PURPOSE LIKE FOR
PROFIT,SOME COMPANY USE THEM FOR DISABLE
THE COMPITITOR COMPANY,FOR CRACKS CREDIT
CARD NUMBER
DIFFERENCE BETWEEN HACKER &
CRACKER
HACKER

CRACKER

 HACKER’S PROGRAMS TO
CHECK INTIGRITY OF
OTHER PROGRAMS.THUS
WHEN HACKER CREATE
PROGRAM IT
AUTOMATICALLY CHECK
REMOTE MACHINE
SECURITY STRUCTURE

 CRACKERS RARELY MAKE
THEIR OWN PROGRAM
.INSTEAD ,THEY STEAL
TOOL,PROGRAMS FROM
OTHERS

 THEY ALWAYS DO
CONTRUCTIVE WORK

 CRACKERS CREATES
NOTHING & DESTROY
MUCH
WHICH OPERATING SYSTEM HACKER
USE ?
 SUN
 UNIX
 MICROSOFT
SUN
 HACKERS USING EITHER SOLARIC X86 OR SCO
AS A PLATFORM.
 THIS IS BECAUSE THESE PRODUCTS ARE
LICENSE WARE & THEY CAN EASILY BE
OBTAINED.
UNIX
 POPULAR PLATFORM BECAUSE THEY
REQUIRED A LOW OVERHEAD.
 WE CAN RUN LINUX ON A PALTRAY 386 AND
GAIN GOOD PERFORMANCE.
 THIS IS REASONABLE.
MICROSOFT
 THIS SUPPORTS MANY SECURITY TOOLS THAT
CAN BE USED TO ATTACK REMOTE MACHINE.
 IT HAS ADVANCED TOOLS FOR NETWORKING
AS WELL.
WHY DO PEOPLE HACK ?
 JUST FOR FUN.
 SHOW OF THEIR KNOWLEDGE.
 HACK OTHER SYSTEM SECRETLY.
 DESTROY ENEMY’S COMPUTER NETWORK
DURING THE WAR.
 FOR PROFIT PEOPLE PAYS A CRACKER.
 CRACK FOR SAKE OF CURIOCITY.
THE PSYCOLOGY OF HACKERS
 ALL INFORMATION SHOULD BE FREE.
 ACCESS TO COMPUTER SHOULD BE
UNLIMITED AND FREE.
 IT CAN CHANGE LIFR FOR BETTER.
 IT CAN CREATE BEAUTY ON COMPUTER.
TYPES OF HACKING
 THERE ARE MANY TYPES OF HACKING
LIKE
• PASSWORD HACKING
• SOFTWARE HACKING
• NET HACKING
PASSWORD HACKING
 TWO TYPES
1. BRUTE FORCE
• IN THAT CASE HACKERS TRY OUT ALL THE
COMBINATION OF ALL KEYBOARD LETTERS .IT HAS
GRATER SUCCESS BUT IT TAKES LONG TIME
2. DICTIONARY BASED
• IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS
UNSUCCESSFUL METHOD
SOFTWARE HACKING
 IN THAT HACKERS CHANGES THE LOOK &
EXCUTION WAY OF THAT SOFTWARE
 CHANG THE DEMO VERSION INTO FULL
VERSION BY DECODE THE SOURCE CODE
IP ADDRESS
 IP ADDRESS IS THE ADDRESS OF YOUR
COMPUTER IN THE INTERNET
 IT IS UNIQ
 LIKE 192.168.23.45
PORT
 IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR
COMPUTER
 IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER
CAN ENTER
 THERE ARE THOUSANDS OF PORTS INTO COMPUTER
 THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT
 LIKE
PORT 21 : FTP
PORT 23 : TELNET
PORT 80 : HTTP
PORT 25 : MAIL
HACKING TOOLS
THERE ARE MANY TOOLS ARE AVILABLE:
•
•
•
•

SCANNERS
TELNET
FTP
LAN WATCH
SCANNERS
 IT IS NOT A PHOTO SCANNER
 SCANNER IS PROGRAM THAT AUTOMATICALLY
DETECTS SECURITY WEAKNESS IN REMOTE HOST
 PORT SCANNERS ARE USE IN HACKING
 PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN
PORT ON THAT SYSTEM AND WHICH SERVICE IS
RUNNING ON THAT
 IT CAN USE ALMOST ALL OPERATING SYSTEM
 EX. SATAN,NMAP
TELNET
 TELNET IS ALTIMATE HACKING TOOL
 IT IS TERMINAL EMULATION PROGRAM THAT
ALLOW US TO CONNECT TO REMOTE SYSTEM
 YOU HAVE TO FOLLOW THIS STEP TO USE
TELNET
C:WINDOWSTELNET [IP ADDRESS] PORT
FTP
 FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT
IS USE AS HACKING TOOL
 PORT 21 FOR THE FTP
 FOR CONNECTING FTP WE NEED SOME FTP S/W
KNOWN AS FTP CLIENT
 FOR CONNECTING FTP SERVER YOU HAVE TO
HAMMERING THAT SERVER
 COMMAND:
C:WINDOWSFTP [IP ADDRESS]:PORT
LAN WATCH
 LAN WATCH IS A SOFTWARE WHICH NOT
ATTACK AND NOT DAMAGE REMOTE
NETWORK
 BUT IT KEEP WATCH ON THE REMOTE
NETWORK & GIVE ALL THE INFORMATION
WHAT IS GOING ON THAT NETWORK
ATTACKS
THERE ARE MANY TYPES OF ATTACKS:
•
•
•
•
•
•

SPOOFING ATTACK
TELNET BASED ATTACK
DOS (Daniel of service) ATTACK
PING OF DEATH
DISTRIBUTED DOS ATTACK
MAILBOMBS
NEED FOR SECURITY
SOME EXELLENT SOFTWARE CAN PROVIDE YOU
BEST SECURITY
LIKE:
• TROJAN
• FIREWALL
TROJAN
 WINDOWS TROJANS ARE SMALL ASPECT OF
WINDOWS SECURUTY
 TROJAN IS UNOTHORIZED PROGRAM
CONTAINED WITHIN A LEGIMATE PROGRAM
 THIS PROGRAM PERFORMS FUNCTION
UNKNOWN BY USER
FIREWALL
FIREWALL IS ANY DEVICE USED TO PREVENT
OUTSIDERS FROM GAINING ACCESS TO YOUR
NETWORK
TYPES OF FIREWALLS:
• PACKET FILTER
• APPLICATION PROXY
• PACKET INSPECTION
CONCLUSION

Weitere ähnliche Inhalte

Was ist angesagt?

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingdjkhatri
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityPanda Security
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1rayborg
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoorsjibinmanjooran
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoorsmridulahuja
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Mahmoud Saeed
 

Was ist angesagt? (18)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Presentation
PresentationPresentation
Presentation
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1
 
Hacking
HackingHacking
Hacking
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Backdoor
BackdoorBackdoor
Backdoor
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Hacker !
Hacker !Hacker !
Hacker !
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
 

Andere mochten auch

Andere mochten auch (15)

Hackers
HackersHackers
Hackers
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
About hackers
About hackersAbout hackers
About hackers
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
EVALUACIÓN
EVALUACIÓNEVALUACIÓN
EVALUACIÓN
 
Cookies and Session
Cookies and SessionCookies and Session
Cookies and Session
 
Chap ii.BCD code,Gray code
Chap ii.BCD code,Gray codeChap ii.BCD code,Gray code
Chap ii.BCD code,Gray code
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Hackers ESP
Hackers ESPHackers ESP
Hackers ESP
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 

Ähnlich wie Hacking

Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linuxmariuszantal
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.Coder Tech
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosOuthai SAIOUDOM
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.JasminJaman1
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 

Ähnlich wie Hacking (20)

PPIT Lecture 18
PPIT Lecture 18PPIT Lecture 18
PPIT Lecture 18
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
PPIT Lecture 17
PPIT Lecture 17PPIT Lecture 17
PPIT Lecture 17
 
Network Security
Network SecurityNetwork Security
Network Security
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linux
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Hacking
HackingHacking
Hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 

Mehr von Harendra Singh

Mehr von Harendra Singh (6)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Google glass
Google glassGoogle glass
Google glass
 
Chromebook
ChromebookChromebook
Chromebook
 
User defined functions in C
User defined functions in CUser defined functions in C
User defined functions in C
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
E-learning vs Classroom learning
E-learning vs Classroom learningE-learning vs Classroom learning
E-learning vs Classroom learning
 

Kürzlich hochgeladen

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Kürzlich hochgeladen (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Hacking

  • 2. INTRODUCTION  THE PROCESS OF ATTEMPTING TO GAIN OR SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO COMPUTER RESOURCES FOR THE PURPOSE OF HELP OR SECURE SYSTEM IS CALLED HACKING  HACKING IS TECHNIQUE IN WHICH ANY ONE CAN ACESS ANY ONE’S COMPUTER WITHOUT HIS PERMISSION  THE PERSON WHO IS DOING THIS TYPE OF WORK IS CALLED HACKER
  • 3. HISTORY OF HACKING  1966 – ROBERT MORRIS INTRODUCES THE CONCEPT OF SAFE HACKING.  1969 – DEVELOPMENT IN THE FIELD OF HACKING.  1990 – ELECTRONIC FRONTIER FOUNDATION WAS FOUNDED.  1995 – MARK ANDREESSON & ERIC RELEASE MOSAIC.
  • 4. WHO IS HACKER?  HACKER IS NOT CYBER CRIMINAL BUT HE IS THE VERY INTELLIGENT PERSON WHO IS USE HIS KNOWLEDGE IN CONSTRUCTIVE MANNER TO SECURE SYSTEM & NEVER DAMAGE DATA  HE KNOW ALL ABOUT THE OPERATING SYSTEM & DIFFERENT HOLES IN THE SYSTEM
  • 5. WHO IS CRACKER?  PERSON WHO ENTER INTO OTHER’S SYSTEM AND VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE HAVOC IS CALLED CRACKER  CRACKER IS CYBER CRIMINAL  THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR ACTIONS ARE MALICIOUS
  • 6. WHY DO CRACKERS EXIST?  CRACKERS ARE EXIST BECAUSE HUMAN NATURE IS JUST SO,FREQUENTLY DRIVEN BY TO DESTROY INSTEAD OF CREAT  THEY ARE USE FOR DIFFERENT PURPOSE LIKE FOR PROFIT,SOME COMPANY USE THEM FOR DISABLE THE COMPITITOR COMPANY,FOR CRACKS CREDIT CARD NUMBER
  • 7. DIFFERENCE BETWEEN HACKER & CRACKER HACKER CRACKER  HACKER’S PROGRAMS TO CHECK INTIGRITY OF OTHER PROGRAMS.THUS WHEN HACKER CREATE PROGRAM IT AUTOMATICALLY CHECK REMOTE MACHINE SECURITY STRUCTURE  CRACKERS RARELY MAKE THEIR OWN PROGRAM .INSTEAD ,THEY STEAL TOOL,PROGRAMS FROM OTHERS  THEY ALWAYS DO CONTRUCTIVE WORK  CRACKERS CREATES NOTHING & DESTROY MUCH
  • 8. WHICH OPERATING SYSTEM HACKER USE ?  SUN  UNIX  MICROSOFT
  • 9. SUN  HACKERS USING EITHER SOLARIC X86 OR SCO AS A PLATFORM.  THIS IS BECAUSE THESE PRODUCTS ARE LICENSE WARE & THEY CAN EASILY BE OBTAINED.
  • 10. UNIX  POPULAR PLATFORM BECAUSE THEY REQUIRED A LOW OVERHEAD.  WE CAN RUN LINUX ON A PALTRAY 386 AND GAIN GOOD PERFORMANCE.  THIS IS REASONABLE.
  • 11. MICROSOFT  THIS SUPPORTS MANY SECURITY TOOLS THAT CAN BE USED TO ATTACK REMOTE MACHINE.  IT HAS ADVANCED TOOLS FOR NETWORKING AS WELL.
  • 12. WHY DO PEOPLE HACK ?  JUST FOR FUN.  SHOW OF THEIR KNOWLEDGE.  HACK OTHER SYSTEM SECRETLY.  DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.  FOR PROFIT PEOPLE PAYS A CRACKER.  CRACK FOR SAKE OF CURIOCITY.
  • 13. THE PSYCOLOGY OF HACKERS  ALL INFORMATION SHOULD BE FREE.  ACCESS TO COMPUTER SHOULD BE UNLIMITED AND FREE.  IT CAN CHANGE LIFR FOR BETTER.  IT CAN CREATE BEAUTY ON COMPUTER.
  • 14. TYPES OF HACKING  THERE ARE MANY TYPES OF HACKING LIKE • PASSWORD HACKING • SOFTWARE HACKING • NET HACKING
  • 15. PASSWORD HACKING  TWO TYPES 1. BRUTE FORCE • IN THAT CASE HACKERS TRY OUT ALL THE COMBINATION OF ALL KEYBOARD LETTERS .IT HAS GRATER SUCCESS BUT IT TAKES LONG TIME 2. DICTIONARY BASED • IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS UNSUCCESSFUL METHOD
  • 16. SOFTWARE HACKING  IN THAT HACKERS CHANGES THE LOOK & EXCUTION WAY OF THAT SOFTWARE  CHANG THE DEMO VERSION INTO FULL VERSION BY DECODE THE SOURCE CODE
  • 17. IP ADDRESS  IP ADDRESS IS THE ADDRESS OF YOUR COMPUTER IN THE INTERNET  IT IS UNIQ  LIKE 192.168.23.45
  • 18. PORT  IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR COMPUTER  IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER CAN ENTER  THERE ARE THOUSANDS OF PORTS INTO COMPUTER  THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT  LIKE PORT 21 : FTP PORT 23 : TELNET PORT 80 : HTTP PORT 25 : MAIL
  • 19. HACKING TOOLS THERE ARE MANY TOOLS ARE AVILABLE: • • • • SCANNERS TELNET FTP LAN WATCH
  • 20. SCANNERS  IT IS NOT A PHOTO SCANNER  SCANNER IS PROGRAM THAT AUTOMATICALLY DETECTS SECURITY WEAKNESS IN REMOTE HOST  PORT SCANNERS ARE USE IN HACKING  PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN PORT ON THAT SYSTEM AND WHICH SERVICE IS RUNNING ON THAT  IT CAN USE ALMOST ALL OPERATING SYSTEM  EX. SATAN,NMAP
  • 21. TELNET  TELNET IS ALTIMATE HACKING TOOL  IT IS TERMINAL EMULATION PROGRAM THAT ALLOW US TO CONNECT TO REMOTE SYSTEM  YOU HAVE TO FOLLOW THIS STEP TO USE TELNET C:WINDOWSTELNET [IP ADDRESS] PORT
  • 22. FTP  FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS USE AS HACKING TOOL  PORT 21 FOR THE FTP  FOR CONNECTING FTP WE NEED SOME FTP S/W KNOWN AS FTP CLIENT  FOR CONNECTING FTP SERVER YOU HAVE TO HAMMERING THAT SERVER  COMMAND: C:WINDOWSFTP [IP ADDRESS]:PORT
  • 23. LAN WATCH  LAN WATCH IS A SOFTWARE WHICH NOT ATTACK AND NOT DAMAGE REMOTE NETWORK  BUT IT KEEP WATCH ON THE REMOTE NETWORK & GIVE ALL THE INFORMATION WHAT IS GOING ON THAT NETWORK
  • 24. ATTACKS THERE ARE MANY TYPES OF ATTACKS: • • • • • • SPOOFING ATTACK TELNET BASED ATTACK DOS (Daniel of service) ATTACK PING OF DEATH DISTRIBUTED DOS ATTACK MAILBOMBS
  • 25. NEED FOR SECURITY SOME EXELLENT SOFTWARE CAN PROVIDE YOU BEST SECURITY LIKE: • TROJAN • FIREWALL
  • 26. TROJAN  WINDOWS TROJANS ARE SMALL ASPECT OF WINDOWS SECURUTY  TROJAN IS UNOTHORIZED PROGRAM CONTAINED WITHIN A LEGIMATE PROGRAM  THIS PROGRAM PERFORMS FUNCTION UNKNOWN BY USER
  • 27. FIREWALL FIREWALL IS ANY DEVICE USED TO PREVENT OUTSIDERS FROM GAINING ACCESS TO YOUR NETWORK TYPES OF FIREWALLS: • PACKET FILTER • APPLICATION PROXY • PACKET INSPECTION