BY- Shubham Agrawal 3 rd semester IGEC HACKING
HACKING??
The Process of attempting to gain or successfully gaining, unauthorized access to computer
resources for the purpose of help or secure system is
called Hacking.
Hacking is technique in which, any one can access
any one’s computer without his permission.
A Brief History of Hacking 1980s
- Cyberspace coined-414 arrested-Two hacker groups formed-2600 published
1990s-National Crackdown on hackers-Kevin Mitnick arrested-Microsoft’s NT operating
system pierced
A Brief History of Hacking
2001 In one of the biggest denial-of-service
attack, hackers launched attacks against eBay, Yahoo!, CNN.com., Amazon and others.
2007 Bank hit by “biggest ever” hack.
Swedish Bank, Nordea recorded nearly $1 Million has been stolen in three months from 250 customer account
Why do people hack ?
To make security stronger ( Ethical Hacking ).
Just for fun.Show off.Hack other systems secretly.Notify many people their thought.Steal important information.Destroy enemy’s computer network.
Types of Hackers White Hat Hackers:
A White Hat who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.
Black Hat Hackers: A Black Hat is the villain or bad guy, especially
in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat.
Gray Hat Hackers: A Grey Hat, in the hacking community, refers
to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra
Website Hacking: Hacking a website means taking control
from the website owner to a person who hacks the website.
The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information database.
Email Hacking : Email hacking is illicit access to an email account
or email correspondence. Ways of Email Hacking: Personal Information. Social Hacking. Phishing/ Hacking Software. Trojan Virus etc.
Email may be protected by methods such as a strong password, encryption of the contents or a digital signature. An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective.
Network Hacking: Network Hacking is generally means
gathering information about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network.
It also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools.
These are the three most common methods of hacking a wireless network:
• Sniffing• Spoofing• Encryption Cracking
Password Hacking:
Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques:• Hashing
• Guessing
• Default Passwords
• Brute Force
• Phishing
Computer Hacking:
Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them.
Remote desktop connection technique.
Why Vulnerable?Poor Web Application codingInsecure deployment of web application
Insufficient input validationNo web traffic filteringWeb application attributes are not guarded well. For example Query String.
ConclusionProper Ethical Hacker Should Be Employed
Do Not Exposed Your Passwords to Untrusted Sites
Close Your Internet While Not in Use
Having Basic Knowledge of Internet