Hacking
-
Upload
amit-pandey -
Category
Documents
-
view
989 -
download
0
description
Transcript of Hacking
HACKING
Presented By.. Amit Kumar Pandey MCA 4TH SEM
Introduction :
Definition Types of Hacker Threats History of Hacking Ethical
Hackers
Harmful behavior, Illegal access to computer, Wicked intention, Kind of electronically rebet robber, Breaker security system
Definition :
“A person who enjoy in learning the details of computer system & how to stretch their compatibility-as opposed to the most user of computer, who prefer to learn only the minimum amount necessary.”
“One who programmers enthusiastically or who enjoys programming rather then just theorizing about programming”
“A person who –
is an expert on enthusiast of creativity overcoming or circumventing limitation.”
-Used as a compliment
Types of HackingWhite Hat- “ Ethical hacker who breaks security
but who does so far altruistic or at least- malicious reason.- Clear defined code of ethics.
Gray Hat- “Ambiguous ethics”
-”Borderline legality”
Black Hat-”Subvert computer security without authorization.
Uses technology for Terrorism, Vandalism, identity theft, intellectual, proper theft……..
Types of Threats
Attack on availability Attack on confidentially Attack on integrity Attack on authentication
Attack on Confidentially
Attacker listens communication
Threats
-Give away private information.
-Spying password
Ex. Spy ware
source Destination
Attacker
Normal information flow
Intercepted information flow
Attack on Availability
Interrupt communication channel
Bring down destination Threats
->System not available
->System not useable
source destination
Attack on Integrity Attacker modifies the
information and send to channel
Threats
Systems are not confidential
sourceDestination
Attacker
Normal information flow
Intercepted information flow
Attack on Authenticity
Attacker fakes identity & insert counterfeit object on system.
Threats
- System not confidential
- No one sure to communicate with right partner
Ex. Forget password
sourceDestination
Attacker
Normal information flow
Forget information
Real threats
Loss of confidential information Viruses & worms Remote administration of system Defected web site & Security system. Cyber war ???
Defected website
Information Gathering
More information about any organization is good for hacker to attack.
Way to gather information.
--port scan
--ping sweep
--social engineering
Social Engineering
Attacker tries to convince some one to give about information, password……
Most innocent question
--what is phone number/ IP address…
--Know abut Administrating person, for N/W
--Network structure
History of Hacking
1970 Attack on American telephone system.---John Draper found a whistle that produces
2600 Hz tone---Tone used for signaling---Together with his friend he develop a “Blue
Box" which simulates a telephone operator's dialing console
---In combination he had the possibility to make free calls
Cond..
1982
---Teenage hacker group 414broke into 60 computer system, including Los Alamos laboratories
1988
---Kevin Mitnick secretly monitor’s the e-mail of the security officials
---sentenced for one year of jail
Cond…
1988 first computer worms in the internet is developed by “Robert morries” .Wanted to know about the size of ARPA net. He is the first person indicted under the computer fraud.--3 years probation.--400 hours community service--fine $10,050 & cost of his supervision Cond..
1988
-- First National Bank of Chicago become victim of $70 million computer theft
1989
--hackers were arrested in western Germany
--broke into US government &corporate computers
--Sold operating system source code to soviet
KGBCond..
2000 &2003
---Hackers broke into Microsoft’s corporate networks & stole Windows & Office source code
---”I LOVE YOU “ virus spread over the internet & infected image and sound files
--18 year old arrested for developing & releasing B variant of the blaster warms
Ethical Hacking
Breaking system into by order of owner
Skills:-(1). Completely trustworthy(2).Strong programming & networking ability(3). Vast Knowledge of Software & Hardware (4). Good understanding of security(5).System management skill.
Cond…
Goals :-
--Finding security holes,
gather information
Analysis of Tools
security administrator tools for network analysis