Top Banner

of 19

My Hacking

Apr 06, 2018

Download

Documents

Vyas Jay
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/2/2019 My Hacking

    1/19

    Hacking

    Prepared by:

    Divyesh Patel(10ec45)

    4thEC

  • 8/2/2019 My Hacking

    2/19

    222 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    INDEX

    Introduction

    History

    Hacker & Cracker

    Difference between hacker & cracker

    Which operating system hacker use?

    Why do people hack?

    Psycology of hackers

    Types of hacking

    Need for security

  • 8/2/2019 My Hacking

    3/19

  • 8/2/2019 My Hacking

    4/19

    444 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    History

    1966 Robert Morric introduces theconcept of safe hacking.

    1969 Development in the field of hacking.

    1990 Electronic Frontier Foundation wasfounded.

  • 8/2/2019 My Hacking

    5/19

    555 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    Who is Hacker?

    A hacker is someone who gainsunauthorized access to a computer system.Many hackers just like the challenge ofbreaking through a computer security

    system but not all hackers are harmless. Itmust also be said that not all hackers arebad. Government and huge companies usehackers to maintain their security systems.

    Hacker is not cyber criminal.

  • 8/2/2019 My Hacking

    6/19

    666 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    Who is Cracker?

    Person who enter into others system andviolet the data is called Cracker.

    Cracker is cyber criminal.

    They can be easily identified because theiractions are malicious.

  • 8/2/2019 My Hacking

    7/19777 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    Why do Crackers exist?Crackers are exist because human nature is

    just so, frequently driven by to destroyinstead of create.

    They are use for different purpose like forprofit, some company use them for disablethe competitor company, for cracks creditcard number.

  • 8/2/2019 My Hacking

    8/19888 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    Difference between hacker & crackerHackers programs to

    check integrity ofother programsThuswhen hacker createprogram it

    automatically checkremote machinesecurity structure

    They always doconstructive work

    crackers rarely maketheir own programinstead ,they stealtools,programmsfrom others

    crackers createsnothing & destroymuch

  • 8/2/2019 My Hacking

    9/19999 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    Which operating system hacker use?

    SUN

    UNIX

    MICROSOFT

    Conti

  • 8/2/2019 My Hacking

    10/19101010 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    . SUN:

    This is because these products are license ware &they can easily be obtained.

    UNIX:

    Popular platform because they required a low

    overhead.

    We gain good performance.

    This is reasonable.

    MICROSOFT:

    This supports many security tools that can be usedto attack remote machine.

    It has advanced tools for networking as well.

  • 8/2/2019 My Hacking

    11/19111111 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    Why do people hack?Just for fun.

    Show of their knowledge.

    Hack other system secretly.Destroy enemys computer network during

    the war.

    For profit people pays a cracker.Crack for sake of curiocity.

  • 8/2/2019 My Hacking

    12/19121212 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    The pshycology of hackersAll information should be free.

    Access to computer should be unlimitedand free.

    It can change life for better.

    It can create beauty on computer.

  • 8/2/2019 My Hacking

    13/19131313 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    Types of hackingThere are many types of hacking

    Like

    Password hacking Software hacking

    Net hacking

  • 8/2/2019 My Hacking

    14/19141414 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    Password hackingTwo types:

    1.) Brute force

    In that case hackers try out all thecombination of all keyboard letters .It hasgrater success but it takes long time.

    2.) Dictionary based

    In that they are use predefine password Itis unsuccessful method.

  • 8/2/2019 My Hacking

    15/19151515 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    Software hackingIn that hackers changes the look &

    execution way of that software

    Chang the demo version into full versionby decode the source code

  • 8/2/2019 My Hacking

    16/19161616 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    Need for security Some excellent software can provide you

    best security

    Like

    Trojan

    Firewall

  • 8/2/2019 My Hacking

    17/19171717 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    Trojan Windows Trojans are small aspect of

    windows security

    Trojan is unauthorized program contained

    within a program

    This program performs function unknownby user

  • 8/2/2019 My Hacking

    18/19181818 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

    Firewall Firewall is any device used to prevent

    outsiders from gaining access to yournetwork

    Types of firewalls

    Packet filter

    Application proxy

    Packet inspection

  • 8/2/2019 My Hacking

    19/19191919 Ci S I All i h dPresentation ID

    .

    Thank You