Presentation on theme: "HACKING. Contents (1) VARIOUS DEFINITIONS OF HACKING. Who is hacker? (various definitions). What does he do?. Why does he do? Who is a cracker?"— Presentation transcript:
Contents (1) VARIOUS DEFINITIONS OF HACKING. Who is hacker? (various definitions). What does he do?. Why does he do? Who is a cracker? Cracker v /s Hacker.
Contents (2) Hactivism. History of hacking. Who can be a real hacker? Forms & types of hacking. Procedure for hacking a password & in general Threats caused by hacking. Why can ’ t defend against hackers? How to translate hackers language. What should be done after hacked? Preventive measures for hacking ??
VARIOUS DEFINITIONS Hacking is a technique to get access on other computers without its permission or we can say that without using the ways which are available and developing the own ways of doing it. Hacking is a way of breaking the code. Hacking is a code or a program often written to breach the security of other systems. To gain access to a computer illegally. hacking is a cyberwar.
Who is hacker? (1) Is who practices hacking. Or a person who enjoys learning the details of the computer and how to stretch their capabilities-as opposed to the most users of the computers who prefer to only to the minimum amount necessary. Or a person who has harmful behaviour and wicked intention. Or has iilegal access to the computers. Technically, a hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer.
Why do hackers hack? Just for fun. Show off. Hack other systems secretly. Steal important information. Destroys the enemy or the target computers network security.
The ways in which they hack NetBIOS ICMP Ping FTP HTTP
Who is a cracker? Crackers are bad guys who break into the system. They do the hack the information but for a different purpose.Crackers and hackers are different. They do malpractices such as steal money from banks,atms etc.
Cracker v /s Hacker. HACKERS: Are good guys who create elegant solutions to problems. Expose security flaws. Build secure systems. CRACKERS: Are malicious and cause harmful damage. Make or steal money. Utilize downloaded exploitations.
HACTIVISM That is the use of hacking to promote an agenda. Politically (ex:defacing a campaign website). religious (ex:hacking an abortion info website). Military (adding misinformation to the enemy sites)
History of hacking. 1960-1970: Good hack especially clever program code. 1970-1990 : “breaking in”to computers became very easy 1990-PRESENT: www developed&internet grow exponentially. Information theft/disabling/hijacking began. Hacking can be writing a program for enjoyment. Hacking can also done to perform reverse engineering of software where source code is lost.
REAL HACKERS OR SKILLS OF A HACKER:- Who study c/c++ and the assembly languages. Study computer architecture perfectly. Study operating systems. Study computer networks.
FORMS OF HACKING It can be hacking a secure information from a computer illegally. Hacking an email or a password. Hacking a website. Hacking in otherwords can be a way getting a password which is lost by using a program.
Types of hacking Normal data transfer InterruptionInterception ModificationFabrication
Procedure for hacking a password & in general 1.Download it from required software. 2. Install its setup to public libraries, cyber cafes, your friend computer or your office computer. 3. Hide it after mentioning your email id into this software. 4. Check your email, you start getting user name and password of everybody who use that computer. And their is very basic thing about user name and password. People often have same password for all the services they used.
In general what a hacker does to escape Take all safety Measures to hide yourself from target. There are lots of techniques to hide yourself from target computer. I recommend you to use as much techniques as you can. Few important tricks :- Use Hide Ip Software :- This software will help you to hide your IP address.Hide Ip IP address Use Firewall :- Firewall secure your computer as well as restrict any personal information from going outside.Firewall Use Proxy servers :- Whenever you want to surf the computer of your target use proxy servers.Proxy servers Use others username and password: - Try to avoid using your own user name and password for internet connection. Learn the technique to get other's user name and password.Learn the technique
Why can ’ t defend against hackers? There are many unknown security hole Hackers need to know only one security hole to hack the system Admin need to know all security holes to defend the system
Is hacking always bad? some (usually young) hackers do it for “fun” No it is not always bad, hacking sometimes may be the cracking the code of the program where the source code is lost. Its just mingling away with the hardware to make things work.
How to translate the hackers ’ language (1) 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l |\| -> n |\/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x
What should be done after hacked? Shutdown the system –Or turn off the system Separate the system from network Restore the system with the backup –Or reinstall all programs Connect the system to the network It can be good to call the police
Why hackers succeed? Problems are often fixed only after exploited. Many companies hire hackers.its a big business for many consultants and many believe in “security in secrecy” and hackers & crackers enjoy this challenge.
Role of government/forensics Search, Seizure, and Analysis of Computers: currently, the government can seize any computer... if there is “sufficient” evidence of criminal use. equipment can be seized indefinitely. computer forensics are needed to analyze seizures: hard drives (deleted files) cracking encryption keys internal “wear and tear” indicating usage patterns requires significant training/research
Preventive measures for hacking The most popular method of protection against hacking home systems is to have an antivirus soft ware. Firewalls act as a deterrent to hacking by protecting private networks from public. Have the system backup.