KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant...
-
Upload
arlene-willis -
Category
Documents
-
view
214 -
download
0
Transcript of KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant...
![Page 1: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/1.jpg)
KaaShiv InfoTech
Ethical Hacking
For For Inplant Training / Inplant Training / InternshipInternship, , please download please download
the "Inplant training registration form" the "Inplant training registration form" from our website from our website www.kaashivinfotech.com. Fill the www.kaashivinfotech.com. Fill the form and send it to form and send it to [email protected] [email protected]
![Page 2: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/2.jpg)
What is hacking?
Hacking
Process of breaking into systems for:
Personal or Commercial Gains
Malicious Intent – Causing sever damage to Information & Assets Conforming to accepted professional standards of conduct
![Page 3: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/3.jpg)
Contents
• Who is hacker?
• History of hacking
• Types of hacking
• Hacking accidents
• Why do hackers hack?
• What hackers do after hacking?
• What do hackers know?
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 4: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/4.jpg)
Contents (2)
How can kid hack? Why can’t Korean kid hack? How can be a real hacker? Why can’t defend against hackers? How can protect the system? What should do after hacked?
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 5: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/5.jpg)
Who is hacker?
• Hack
• Cut with repeated irregular blows
• Examine something very minutely
• Hacker
• The person who hacks
• Cracker
• System intruder/destroyer
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 6: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/6.jpg)
History of hacking
Telephone hacking Use telephone freely It’s called phreaking
Computer virus Destroy many computers
Network hacking Hack the important server remotely and
destroy/modify/disclose the information
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 7: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/7.jpg)
Types of hacking
www.kaashivinfotech.com
Normal
data transfer
Interruption Interception
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 8: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/8.jpg)
Hacking accidents
Internet Worm
Robert T. Morris made an internet worm. It spread through the internet and crashed about 6000 systems.
Cuckoo’s Egg
Clifford Stoll caught the hackers who are the German hackers applied by KGB
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 9: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/9.jpg)
Hacking accidents
IP Spoof
Kevin Mitnick was caught by Tsutomu Shimomura who was security expert. Kevin Mitnick uses the IP Spoof attack in this accident
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 10: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/10.jpg)
Why do hackers hack?
• Just for fun
• Show off
• Hack other systems secretly
• Notify many people their thought
• Steal important information
• Destroy enemy’s computer network during the war
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 11: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/11.jpg)
What do hackers do after hacking?
Patch security hole
The other hackers can’t intrude
Clear logs and hide themselves
Install rootkit ( backdoor )
The hacker who hacked the system can use the system later
It contains trojan ls, ps, and so on
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 12: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/12.jpg)
What do hackers do after hacking?
Install irc related program
identd, irc, bitchx, eggdrop, bnc
Install scanner program
mscan, sscan, nmap
Install exploit program
Install denial of service program
Use all of installed programs silently
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 13: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/13.jpg)
What do hackers know?
Don’t know how to use vi
Don’t know what unix is
Don’t know what they do
Know how to intrude the system
Know how to crash the system
Know where the hacking programs are
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 14: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/14.jpg)
How can kid hack?
Kid has much of time
Kid can search for longer time than other people
All hacking program is easy to use
Kid doesn’t have to know how the hacking program works
These kids are called script kiddies
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 15: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/15.jpg)
Why can’t Korean kid hack?
Almost all Korean kids don’t know English well
Almost all hacking program manuals are written in English.
However, many hacking program manuals are being translated.
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 16: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/16.jpg)
How can be a real hacker?
• Study C/C++/assembly language
• Study computer architecture
• Study operating system
• Study computer network
• Examine the hacking tools for a month
• Think the problem of the computer
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 17: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/17.jpg)
Why can’t defend against hackers?
There are many unknown security hole
Hackers need to know only one security hole to hack the system
Admin need to know all security holes to defend the system
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 18: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/18.jpg)
How can protect the system?
Patch security hole often
Encrypt important data
Ex) pgp, ssh
Do not run unused daemon
Remove unused setuid/setgid program
Setup loghost
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 19: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/19.jpg)
How can protect the system?
• Use switch hub
• Setup firewall
• Ex) ipchains
• Setup ID
• Ex) snort
• Check unintentional change
• Ex) tripwire
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 20: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/20.jpg)
What should do after hacked?
• Shutdown the system
• Or turn off the system
• Separate the system from network
• Restore the system with the backu
• Or reinstall all programs
• Connect the system to the network
• It can be good to call the police
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 21: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/21.jpg)
How to translate the hackers’ language 1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|\| -> n
|\/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 22: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/22.jpg)
How to translate the hackers’ language (2) Ex)
1 d1d n0t h4ck th1s p4g3,
1t w4s l1k3 th1s wh3n 1 h4ck3d 1n
I did not hack this page, it was like this when I hacked in
www.kaashivinfotech.com
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
![Page 23: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/23.jpg)
www.kaashivinfotech.com
![Page 24: KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website .](https://reader036.fdocuments.us/reader036/viewer/2022062519/5697bfc51a28abf838ca6926/html5/thumbnails/24.jpg)
Thank you
For Inplant Training / Internship, please download the "Inplant training registration form" from our website www.kaashivinfotech.com. Fill the form and send it to [email protected]
www.kaashivinfotech.com