8/2/2019 My Hacking
1/19
Hacking
Prepared by:
Divyesh Patel(10ec45)
4thEC
8/2/2019 My Hacking
2/19
222 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
INDEX
Introduction
History
Hacker & Cracker
Difference between hacker & cracker
Which operating system hacker use?
Why do people hack?
Psycology of hackers
Types of hacking
Need for security
8/2/2019 My Hacking
3/19
8/2/2019 My Hacking
4/19
444 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
History
1966 Robert Morric introduces theconcept of safe hacking.
1969 Development in the field of hacking.
1990 Electronic Frontier Foundation wasfounded.
8/2/2019 My Hacking
5/19
555 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
Who is Hacker?
A hacker is someone who gainsunauthorized access to a computer system.Many hackers just like the challenge ofbreaking through a computer security
system but not all hackers are harmless. Itmust also be said that not all hackers arebad. Government and huge companies usehackers to maintain their security systems.
Hacker is not cyber criminal.
8/2/2019 My Hacking
6/19
666 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
Who is Cracker?
Person who enter into others system andviolet the data is called Cracker.
Cracker is cyber criminal.
They can be easily identified because theiractions are malicious.
8/2/2019 My Hacking
7/19777 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
Why do Crackers exist?Crackers are exist because human nature is
just so, frequently driven by to destroyinstead of create.
They are use for different purpose like forprofit, some company use them for disablethe competitor company, for cracks creditcard number.
8/2/2019 My Hacking
8/19888 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
Difference between hacker & crackerHackers programs to
check integrity ofother programsThuswhen hacker createprogram it
automatically checkremote machinesecurity structure
They always doconstructive work
crackers rarely maketheir own programinstead ,they stealtools,programmsfrom others
crackers createsnothing & destroymuch
8/2/2019 My Hacking
9/19999 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
Which operating system hacker use?
SUN
UNIX
MICROSOFT
Conti
8/2/2019 My Hacking
10/19101010 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
. SUN:
This is because these products are license ware &they can easily be obtained.
UNIX:
Popular platform because they required a low
overhead.
We gain good performance.
This is reasonable.
MICROSOFT:
This supports many security tools that can be usedto attack remote machine.
It has advanced tools for networking as well.
8/2/2019 My Hacking
11/19111111 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
Why do people hack?Just for fun.
Show of their knowledge.
Hack other system secretly.Destroy enemys computer network during
the war.
For profit people pays a cracker.Crack for sake of curiocity.
8/2/2019 My Hacking
12/19121212 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
The pshycology of hackersAll information should be free.
Access to computer should be unlimitedand free.
It can change life for better.
It can create beauty on computer.
8/2/2019 My Hacking
13/19131313 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
Types of hackingThere are many types of hacking
Like
Password hacking Software hacking
Net hacking
8/2/2019 My Hacking
14/19141414 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
Password hackingTwo types:
1.) Brute force
In that case hackers try out all thecombination of all keyboard letters .It hasgrater success but it takes long time.
2.) Dictionary based
In that they are use predefine password Itis unsuccessful method.
8/2/2019 My Hacking
15/19151515 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
Software hackingIn that hackers changes the look &
execution way of that software
Chang the demo version into full versionby decode the source code
8/2/2019 My Hacking
16/19161616 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
Need for security Some excellent software can provide you
best security
Like
Trojan
Firewall
8/2/2019 My Hacking
17/19171717 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
Trojan Windows Trojans are small aspect of
windows security
Trojan is unauthorized program contained
within a program
This program performs function unknownby user
8/2/2019 My Hacking
18/19181818 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID
Firewall Firewall is any device used to prevent
outsiders from gaining access to yournetwork
Types of firewalls
Packet filter
Application proxy
Packet inspection
8/2/2019 My Hacking
19/19191919 Ci S I All i h dPresentation ID
.
Thank You