Hacking by shashwat
-
Upload
shashwat-shivam -
Category
Technology
-
view
531 -
download
1
Transcript of Hacking by shashwat
![Page 1: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/1.jpg)
![Page 2: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/2.jpg)
What is Hacking?
Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes.
Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
What is Hacking?
Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes.
![Page 3: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/3.jpg)
FAMOUS HACKERS IN HISTORY
Ian Murphy Kevin Mitnick Johan Helsinguis
Mark AbeneLinus Torvalds Robert Morris
![Page 4: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/4.jpg)
What Basically a Hacker do?
![Page 5: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/5.jpg)
Learn how to program.
Get one of the open-source Unix's and learn to use and run it
Learn how to use the World Wide Web and write HTML.
Basic skills required for Hacking
![Page 6: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/6.jpg)
Ethical Hacking
» It is use of programming skills to determine vulnerabilities in computer
system» It is also known as the intrusion testing or penetration testing.
![Page 7: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/7.jpg)
![Page 8: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/8.jpg)
Types of HackingTypes of Hacking
Phishing Attack Brute Force Attack
Fake Login HackCookie Steal Hack
Web Mail Hack
![Page 9: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/9.jpg)
Finding an IP Address via Instant Messengers
Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friend’s system:
Your System------Chat Server---- Friend’s System
Friend’s System---------Chat Server------- Your System
Thus in this case, you first have to establish a direct connection with your friend’s computer by either sending him a file or by using the call feature.
Then, goto MSDOS or the command line and type:
C:\>netstat -n
This command will give you the IP Address of your friend’s computer.
Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friend’s system:
Your System------Chat Server---- Friend’s System
Friend’s System---------Chat Server------- Your System
Thus in this case, you first have to establish a direct connection with your friend’s computer by either sending him a file or by using the call feature. Then, goto MSDOS or the command line and type:
C:\>netstat -n
This command will give you the IP Address of your friend’s computer.
Finding an IP Address via Instant Messengers
![Page 10: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/10.jpg)
IP Addresses: DangersDangers & Concerns
DOS AttacksDisconnect from the InternetTrojans ExploitationGeographical InformationFile Sharing Exploits
![Page 11: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/11.jpg)
![Page 12: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/12.jpg)
Different Ways to Hack Facebook Account@ Facebook Phishing@ By use of Key logger@ Facebook Account hack with get control on Primary email address
![Page 13: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/13.jpg)
Facebook PhishingPhishing It is the act of attempting to acquire information such as
usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in
an electronic communication
![Page 14: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/14.jpg)
ADVANTAGES & DISADVANTAGES
Advantages Provides security to banking and financial establishments Prevents website defacements An evolving technique To catch a thief you have to think like a thiefDisadvantages All depends upon the trustworthiness of the ethical hacker Hiring professionals is expensive.
![Page 15: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/15.jpg)
How can we protect the system? Patch security hole oftenDo not run unused daemonRemove unused programSetup log host• Backup the system oftenSetup firewallNever entertain those things which ask your username and password
Setup IDSEx) snort
![Page 16: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/16.jpg)
What to do after being hacked?Shutdown the system
Or turn off the system
Separate the system from network
Restore the system with the backup or reinstall all programs
Connect the system to the network
![Page 17: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/17.jpg)
H4cking prone areas
![Page 18: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/18.jpg)
Hacking GROWTH RATE
It is clear from the graph it is increasing day by day.
![Page 19: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/19.jpg)
PLEASE GIVE YOUR SUGGESTIONS AND FEEDBACKS. ANY QUESTION ?
![Page 20: Hacking by shashwat](https://reader036.fdocuments.us/reader036/viewer/2022062319/558c7b34d8b42a8c4c8b456a/html5/thumbnails/20.jpg)