Presentation is loading. Please wait.

Presentation is loading. Please wait.

PREPARED BY : Harsh patel dhruv patel sreejit sundaram.

Similar presentations


Presentation on theme: "PREPARED BY : Harsh patel dhruv patel sreejit sundaram."— Presentation transcript:

1 PREPARED BY : Harsh patel dhruv patel sreejit sundaram

2 INTRODUCTION TO HACKING  HACKING means going to into system and exploring the hosts system and getting whatever exploring the hosts system and getting whatever information you need and getting yourself out and information you need and getting yourself out and clearing your trails without getting yourself busted. clearing your trails without getting yourself busted.

3 HACKER  HACKER are intelligent computer professionals who are Interested in learning advanced techniques about operating system programming languages and application software.  HACKER try to gain in depth knowledge of a system and use that information to find out the possible security gaps in a system HACKER share their knowledge with other people and this increase security awarness.

4 CRACKER  CRACKER are individual who break into computer with malicious intent.  CRACKER try to get unauthorized access into a system and cause damage or destroy confidential information.  They break into or otherwise violate the system integrity of remote machines, with evil intent.

5 ETHICS OF HACKING  Essentially, hackers are intelligent computer programmer Who follow an ethic: Who follow an ethic: Hackers should never harm the system they break into. Hackers should never harm the system they break into.  Hackers believe that: Access to computer should be unlimited and total. Access to computer should be unlimited and total. All information should be free. All information should be free. Authorities should be mistrusted and decentralization Authorities should be mistrusted and decentralization Promoted. Promoted. Hackers should create the beauty of a computer. Hackers should create the beauty of a computer. Hackers should be judged by their hacking skills. Hackers should be judged by their hacking skills.

6 TYPES OF SECURITY Network security violations can be broadly divided into Network security violations can be broadly divided into five distinct area: five distinct area:  AUTHENFICATION:  ACCESS CONTROL:  DATA INTEGRITY:  DATA CONFIDENTIALITY:  DENIAL OF SERVICE ATTACKS:

7 FIREWALL  A FIREWALL is a network security system designed to prevent unauthorized access to a private network from any other network.  Typically, it works closely with a router program to determine if a packet should be forwarded to its destination.  It also provides a proxy service that makes network requests on behalf of the users on a network.

8 TYPES OF FIREWALL  ROUTER-BASED FIREWALL:

9  PROXY-BASED FIREWALL:

10 What does a firewall do?  A firewall can analyze all the traffic between a network and the Internet.  It is examines all the traffic between two networks.  it is routed between the networks, otherwise it is stopped.  It checks the protocol which the packet being delivered and also check port number to which it is being sent.  The main function of firewall is to provide centralized access control on how users use the network.

11 What can’t a firewall do?  A firewall cannot prevent individual users with modems from dialing into or out of the network, bypassing the firewall altogether.  If employee can do some mistakes so it can’t be controlled by firewall.  the planning of any security policy but that cannot be solved with firewalls alone.

12 Who needs a firewall?  Any person who is responsible for a private network and connect with a public network.  For more a person who connect so much as single computer with internet via modem needed personal firewall.  Many dial-up users believe that other types of protection will protect them.They are feel that no one can break their security in the computer.  Some dial-up users have victims of major attacks and they lost their files and also a lots of work.

13 IP-ADDRESS  Every system connected to a particular network has a unique identification said IP address or internet protocol address Which is just as in real world every person has his own contact address.  Getting the internet protocol or the IP address of a remote system is said to the most important step in hacking of a system.

14 STRUCTURE OF IP ADDRESS  IP address divided into a number of classes which have different ranges. Class A: 8 bits for Netid & 24 bits for Hostid. Class B: 16 bits for Netid & 16 bits for Hostid. Class C: 24 bits for Netid & 8 bits for Hostid. Class D: 32-bit multicast Groupid. Class E: Currently not in use.

15 ABOUT THE PORTS  Ports are virtual pipes that allow internet services such as file transfer protocol and e-mail exchange to share a single physical connection.  Usually hackers run a port scanning program to list the ports available and then find out websites that lists weakness & try to get a match for target system.

16 TYPES OF PORTS There are mainly five types of ports available. Port NoServices No –21FTP No –23Telenet No –25SMPT No –80HTTP-appache No –125POP3

17 HOW TO HACK There are four steps to hacking.  Step-1: Getting access to site Using ports through internet hacker gets an access to target system. Using ports through internet hacker gets an access to target system.  Step-2: Gaining control of the system Now hacker take the overall control of the target system. Now hacker take the overall control of the target system.

18 HOW TO HACK  Step3: Covering Traces Hacker finds the path to hack anything in the target system. Hacker finds the path to hack anything in the target system.  Step4: Keeping that Account Hacker never use his personal account to hack anything. Hacker never use his personal account to hack anything.

19 ATTITUDE OF HACKER A true hacker has a purpose and a reason for breaking into any box.A true hacker why is doing what A true hacker has a purpose and a reason for breaking into any box.A true hacker why is doing what he does and is doing it for reason like knowledge free he does and is doing it for reason like knowledge free information and access. information and access. so if you want to be Hacker,repeat the following things until you believe them. so if you want to be Hacker,repeat the following things until you believe them.  The world is full of fascinating problems waiting to be solved. solved.

20  Nobody should ever have to solve a problem twice.  Boredom and drudgery are evil.  Freedom is good.  Attitude is no substitute for competence.

21 BIBLIOGRAPHY  Hacking tools & techniques by NIIT.  Basics of network security, firewalls by NIIT.  Internet. www.vicomsoft.com www.vicomsoft.comwww.vicomsoft.com www.darwinmag.com www.darwinmag.comwww.darwinmag.com www.5starsupport.com www.5starsupport.comwww.5starsupport.com www.pwcrack.com www.pwcrack.comwww.pwcrack.com


Download ppt "PREPARED BY : Harsh patel dhruv patel sreejit sundaram."

Similar presentations


Ads by Google