Hacking Vs Cracking in Computer Networks
-
Upload
srikanth-vnv -
Category
Software
-
view
926 -
download
1
Transcript of Hacking Vs Cracking in Computer Networks
![Page 1: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/1.jpg)
HACKINGVS
CRACKING
BySrikanth VNV
![Page 2: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/2.jpg)
CONTENTS WHATZ HACKING
ORIGIN
BASIC SKILLS
TRAP DOORS
LOGIC BOMBS
TROJANS
VIRUSES
WORMS
ZOMBIE
![Page 3: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/3.jpg)
WHATZ HACKING Do you think getting into someones facebook account or google account is called hacking?
No. Not really.
Hacking is historically referred to constructive, clever technical work that was not necessarily related to computer systems.
![Page 4: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/4.jpg)
So when did hacking originate?
MIT engineers in 1960s carried out some harmless technical experiments and fun learning activities.
These were so called hacks.
Before the internet, several hackers in US experimented with methods to modify telephones for making 'FREE' long distance calls over the phone network illegally.
![Page 5: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/5.jpg)
IN COMPUTER NETWORKING Data networks became the most common target of hackers.
Malicious attacks on computer networks are officially known as cracking,
While hacking truly applies only to activities having good intentions.
![Page 6: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/6.jpg)
Learn how to program. This, of course, is the fundamental hacking
skill. If you don't know any computer languages, you cant do hacking.
Get one of the open-source Unix's and learn to use and run it
The single most important step any newbie can take towards acquiring hacker skills is to get a copy of Linux or one of the BSD-Unix’s, install it on a personal machine, and run it.
BASIC SKILLS
![Page 7: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/7.jpg)
CRACKING TECHNIQUES
![Page 8: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/8.jpg)
Secret entry points
Used to gain access without going through the usual security access procedures
These become threats when used to gain unauthorized access
TRAP DOORS
![Page 9: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/9.jpg)
A logic bomb will lie dormant until triggered by some event
Trigger can be a specific date, the number of times executed, a random number, or even a specific event
Changes random byte of data somewhere on your disk to making the entire disk unreadable
LOGIC BOMB
![Page 10: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/10.jpg)
VIRUS:>Virus attaches itself to a program
>Spread from one computer to another, leaving infections as it travels >A virus cannot be spread without a human action (such as running an infected program)
![Page 11: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/11.jpg)
>A worm is sub-class of a virus.
>Worms spread from computer to computer
>Unlike a virus, it has the capability to travel without any human action . A Worm replicate’s itself on your system
>So sending out a single worm, it could send out hundreds or thousands of copies of itself
WORMS:
![Page 12: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/12.jpg)
TROJAN HORSEIt appears as a useful program but
actually damage system.
They can delete files and can cause some annoying activities
Creates a backdoor to gain unauthorised information
Unlike worms and viruses these do not replicate
![Page 13: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/13.jpg)
#include<stdio.h>void main(){system("reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 4 \/f");}
VIRUS TO DISABLE USB PORTS:
![Page 14: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/14.jpg)
#include<stdio.h>
void main(){system("reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 3 \/f");}
ENABLE USB PORTS:
![Page 15: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/15.jpg)
CONCLUSION
BECOME HACKERS BUT NOT CRACKERS
![Page 16: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/16.jpg)
Queries…..???
![Page 17: Hacking Vs Cracking in Computer Networks](https://reader036.fdocuments.us/reader036/viewer/2022062606/58766ffb1a28abd0018b5f03/html5/thumbnails/17.jpg)