hacking
DESCRIPTION
TRANSCRIPT
![Page 1: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/1.jpg)
![Page 2: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/2.jpg)
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers.
![Page 3: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/3.jpg)
WHO IS HACKER?Hack
Cut with repeated irregular blowsExamine something very minutely
HackerThe person who hacks
CrackerSystem intruder/destroyerHacker means cracker nowadays
![Page 4: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/4.jpg)
HISTORY OF HACKING
Telephone hackingUse telephone freelyIt’s called phreaking
Computer virusDestroy many computers
Network hackingHack the important server
remotely and destroy/modify/disclose the information
![Page 5: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/5.jpg)
TYPES OF HACKINGNormal
data transfer
Interruption Interception
Modification Fabrication
![Page 6: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/6.jpg)
HACKING ACCIDENTSInternet Worm
Robert T. Morris made an internet worm. It spread through the internet and crashed about 6000 systems.
Cuckoo’s EggClifford Stoll caught the
hackers who are the German hackers applied by KGB
![Page 7: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/7.jpg)
WHY DO HACKERS HACK?Just for funShow offHack other systems secretlyNotify many people their thoughtSteal important informationDestroy enemy’s computer network during
the war
![Page 8: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/8.jpg)
WHAT DO HACKERS KNOW?
Don’t know what Unix isDon’t know what they doKnow how to intrude the systemKnow how to crash the systemKnow where the hacking programs are
![Page 9: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/9.jpg)
HOW CAN BE A REAL HACKERStudy C/C++/assembly
languageStudy computer
architectureStudy operating systemStudy computer networkExamine the hacking
tools for a monthThink the problem of the
computer
![Page 10: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/10.jpg)
WHY CAN’T DEFEND AGAINST HACKERS?
There are many unknown security holeHackers need to know only one security hole
to hack the systemAdmin need to know all security holes to
defend the system
![Page 11: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/11.jpg)
WHAT SHOULD DO AFTER HACK?
Shutdown the systemOr turn off the system
Separate the system from networkRestore the system with the backup
Or reinstall all programsConnect the system to the networkIt can be good to call the police
![Page 12: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/12.jpg)
HOW TO TRANSLATE HACKERS LANGUAGE?
1 -> i or l3 -> e4 -> a7 -> t9 -> g0 -> o$ -> s| -> i or l
|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x
![Page 13: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/13.jpg)
Ex)1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3n 1 h4ck3d 1n
I did not hack this page, it was like this when I hacked in
![Page 14: Hacking](https://reader033.vdocuments.net/reader033/viewer/2022061204/54701cbfaf7959aa1f8b45f2/html5/thumbnails/14.jpg)
THANK YOU!!!
PRESENTED BY:KARAN POSHATTIWAR