Transcript

HACKING

Presented By.. Amit Kumar Pandey MCA 4TH SEM

Introduction :

Definition Types of Hacker Threats History of Hacking Ethical

Hackers

Harmful behavior, Illegal access to computer, Wicked intention, Kind of electronically rebet robber, Breaker security system

Definition :

“A person who enjoy in learning the details of computer system & how to stretch their compatibility-as opposed to the most user of computer, who prefer to learn only the minimum amount necessary.”

“One who programmers enthusiastically or who enjoys programming rather then just theorizing about programming”

“A person who –

is an expert on enthusiast of creativity overcoming or circumventing limitation.”

-Used as a compliment

Types of HackingWhite Hat- “ Ethical hacker who breaks security

but who does so far altruistic or at least- malicious reason.- Clear defined code of ethics.

Gray Hat- “Ambiguous ethics”

-”Borderline legality”

Black Hat-”Subvert computer security without authorization.

Uses technology for Terrorism, Vandalism, identity theft, intellectual, proper theft……..

Types of Threats

Attack on availability Attack on confidentially Attack on integrity Attack on authentication

Attack on Confidentially

Attacker listens communication

Threats

-Give away private information.

-Spying password

Ex. Spy ware

source Destination

Attacker

Normal information flow

Intercepted information flow

Attack on Availability

Interrupt communication channel

Bring down destination Threats

->System not available

->System not useable

source destination

Attack on Integrity Attacker modifies the

information and send to channel

Threats

Systems are not confidential

sourceDestination

Attacker

Normal information flow

Intercepted information flow

Attack on Authenticity

Attacker fakes identity & insert counterfeit object on system.

Threats

- System not confidential

- No one sure to communicate with right partner

Ex. Forget password

sourceDestination

Attacker

Normal information flow

Forget information

Real threats

Loss of confidential information Viruses & worms Remote administration of system Defected web site & Security system. Cyber war ???

Defected website

Information Gathering

More information about any organization is good for hacker to attack.

Way to gather information.

--port scan

--ping sweep

--social engineering

Social Engineering

Attacker tries to convince some one to give about information, password……

Most innocent question

--what is phone number/ IP address…

--Know abut Administrating person, for N/W

--Network structure

History of Hacking

1970 Attack on American telephone system.---John Draper found a whistle that produces

2600 Hz tone---Tone used for signaling---Together with his friend he develop a “Blue

Box" which simulates a telephone operator's dialing console

---In combination he had the possibility to make free calls

Cond..

1982

---Teenage hacker group 414broke into 60 computer system, including Los Alamos laboratories

1988

---Kevin Mitnick secretly monitor’s the e-mail of the security officials

---sentenced for one year of jail

Cond…

1988 first computer worms in the internet is developed by “Robert morries” .Wanted to know about the size of ARPA net. He is the first person indicted under the computer fraud.--3 years probation.--400 hours community service--fine $10,050 & cost of his supervision Cond..

1988

-- First National Bank of Chicago become victim of $70 million computer theft

1989

--hackers were arrested in western Germany

--broke into US government &corporate computers

--Sold operating system source code to soviet

KGBCond..

2000 &2003

---Hackers broke into Microsoft’s corporate networks & stole Windows & Office source code

---”I LOVE YOU “ virus spread over the internet & infected image and sound files

--18 year old arrested for developing & releasing B variant of the blaster warms

Ethical Hacking

Breaking system into by order of owner

Skills:-(1). Completely trustworthy(2).Strong programming & networking ability(3). Vast Knowledge of Software & Hardware (4). Good understanding of security(5).System management skill.

Cond…

Goals :-

--Finding security holes,

gather information

Analysis of Tools

security administrator tools for network analysis

top related