hacking

17
BY- Shubham Agrawal 3 rd semester IGEC HACKING

Upload: shubham-agrawal

Post on 09-Aug-2015

71 views

Category:

Presentations & Public Speaking


1 download

TRANSCRIPT

BY-Shubham Agrawal

3rd semesterIGEC

HACKING

Contents :Meaning of Hacking.Why do people Hack??Types of Hacking.Types of Hackers.Conclusion.

HACKING??

The Process of attempting to gain or successfully gaining, unauthorized access to computer

resources for the purpose of help or secure system is

called Hacking.

Hacking is technique in which, any one can access

any one’s computer without his permission.

A Brief History of Hacking 1980s

- Cyberspace coined-414 arrested-Two hacker groups formed-2600 published

1990s-National Crackdown on hackers-Kevin Mitnick arrested-Microsoft’s NT operating

system pierced

A Brief History of Hacking

2001 In one of the biggest denial-of-service

attack, hackers launched attacks against eBay, Yahoo!, CNN.com., Amazon and others.

2007 Bank hit by “biggest ever” hack.

Swedish Bank, Nordea recorded nearly $1 Million has been stolen in three months from 250 customer account

Why do people hack ?

To make security stronger ( Ethical Hacking ).

Just for fun.Show off.Hack other systems secretly.Notify many people their thought.Steal important information.Destroy enemy’s computer network.

Types of Hackers White Hat Hackers:

A White Hat who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.

Black Hat Hackers: A Black Hat is the villain or bad guy, especially

in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat.

Gray Hat Hackers: A Grey Hat, in the hacking community, refers

to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra

Types Of Hacking :

Website Hacking.Email Hacking.Network Hacking.Password Hacking.Computer Hacking.

Website Hacking: Hacking a website means taking control

from the website owner to a person who hacks the website.

The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information database.

Email Hacking : Email hacking is illicit access to an email account

or email correspondence. Ways of Email Hacking: Personal Information. Social Hacking. Phishing/ Hacking Software. Trojan Virus etc.

Email may be protected by methods such as a strong password, encryption of the contents or a digital signature. An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective.

Network Hacking: Network Hacking is generally means

gathering information about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network.

It also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools.

These are the three most common methods of hacking a wireless network:

• Sniffing• Spoofing• Encryption Cracking

Password Hacking:

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.

Most passwords can be cracked by using following techniques:• Hashing

• Guessing

• Default Passwords

• Brute Force

• Phishing

Computer Hacking:

Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.

People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them.

Remote desktop connection technique.

Why Vulnerable?Poor Web Application codingInsecure deployment of web application

Insufficient input validationNo web traffic filteringWeb application attributes are not guarded well. For example Query String.

ConclusionProper Ethical Hacker Should Be Employed

Do Not Exposed Your Passwords to Untrusted Sites

Close Your Internet While Not in Use

Having Basic Knowledge of Internet

Any Questions?

??

Thank You