Top Banner
BY- Shubham Agrawal 3 rd semester IGEC HACKING
17
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: HACKING

BY-Shubham Agrawal

3rd semesterIGEC

HACKING

Page 2: HACKING

Contents :Meaning of Hacking.Why do people Hack??Types of Hacking.Types of Hackers.Conclusion.

Page 3: HACKING

HACKING??

The Process of attempting to gain or successfully gaining, unauthorized access to computer

resources for the purpose of help or secure system is

called Hacking.

Hacking is technique in which, any one can access

any one’s computer without his permission.

Page 4: HACKING

A Brief History of Hacking 1980s

- Cyberspace coined-414 arrested-Two hacker groups formed-2600 published

1990s-National Crackdown on hackers-Kevin Mitnick arrested-Microsoft’s NT operating

system pierced

Page 5: HACKING

A Brief History of Hacking

2001 In one of the biggest denial-of-service

attack, hackers launched attacks against eBay, Yahoo!, CNN.com., Amazon and others.

2007 Bank hit by “biggest ever” hack.

Swedish Bank, Nordea recorded nearly $1 Million has been stolen in three months from 250 customer account

Page 6: HACKING

Why do people hack ?

To make security stronger ( Ethical Hacking ).

Just for fun.Show off.Hack other systems secretly.Notify many people their thought.Steal important information.Destroy enemy’s computer network.

Page 7: HACKING

Types of Hackers White Hat Hackers:

A White Hat who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.

Black Hat Hackers: A Black Hat is the villain or bad guy, especially

in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat.

Gray Hat Hackers: A Grey Hat, in the hacking community, refers

to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra

Page 8: HACKING

Types Of Hacking :

Website Hacking.Email Hacking.Network Hacking.Password Hacking.Computer Hacking.

Page 9: HACKING

Website Hacking: Hacking a website means taking control

from the website owner to a person who hacks the website.

The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information database.

Page 10: HACKING

Email Hacking : Email hacking is illicit access to an email account

or email correspondence. Ways of Email Hacking: Personal Information. Social Hacking. Phishing/ Hacking Software. Trojan Virus etc.

Email may be protected by methods such as a strong password, encryption of the contents or a digital signature. An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective.

Page 11: HACKING

Network Hacking: Network Hacking is generally means

gathering information about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network.

It also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools.

These are the three most common methods of hacking a wireless network:

• Sniffing• Spoofing• Encryption Cracking

Page 12: HACKING

Password Hacking:

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.

Most passwords can be cracked by using following techniques:• Hashing

• Guessing

• Default Passwords

• Brute Force

• Phishing

Page 13: HACKING

Computer Hacking:

Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.

People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them.

Remote desktop connection technique.

Page 14: HACKING

Why Vulnerable?Poor Web Application codingInsecure deployment of web application

Insufficient input validationNo web traffic filteringWeb application attributes are not guarded well. For example Query String.

Page 15: HACKING

ConclusionProper Ethical Hacker Should Be Employed

Do Not Exposed Your Passwords to Untrusted Sites

Close Your Internet While Not in Use

Having Basic Knowledge of Internet

Page 16: HACKING

Any Questions?

??

Page 17: HACKING

Thank You