SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
What is hacking?
BY
WWW.TIMECOMPUTERS.IN
Contents (1)
 Who is hacker?
 History of hacking
 Types of hacking
 Hacking accidents
 Why do hackers hack?
 What hackers do after hacking?
 What do hackers know?
Contents (2)
 How can kid hack?
 Why can’t Korean kid hack?
 How can be a real hacker?
 Why can’t defend against hackers?
 How can protect the system?
 What should do after hacked?
Contents (3)
 How to translate the hackers’ language
Who is hacker? (1)
 Hack
 Cut with repeated irregular blows
 Examine something very minutely
 Hacker
 The person who hacks
 Cracker
 System intruder/destroyer
Who is hacker? (2)
 Hacker means cracker nowadays
 Meaning has been changed
History of hacking
 Telephone hacking
 Use telephone freely
 It’s called phreaking
 Computer virus
 Destroy many computers
 Network hacking
 Hack the important server remotely and
destroy/modify/disclose the information
Types of hacking
Normal
data transfer
Interruption Interception
Modification Fabrication
Hacking accidents (1)
 Internet Worm
 Robert T. Morris made an internet worm. It spread
through the internet and crashed about 6000 systems.
 Cuckoo’s Egg
 Clifford Stoll caught the hackers who are the German
hackers applied by KGB
Hacking accidents (2)
 IP Spoof
 Kevin Mitnick was caught by Tsutomu Shimomura who
was security expert. Kevin Mitnick uses the IP Spoof
attack in this accident
Why do hackers hack?
 Just for fun
 Show off
 Hack other systems secretly
 Notify many people their thought
 Steal important information
 Destroy enemy’s computer network during the war
What do hackers do after
hacking? (1)
 Patch security hole
 The other hackers can’t intrude
 Clear logs and hide themselves
 Install rootkit ( backdoor )
 The hacker who hacked the system can use the system
later
 It contains trojan ls, ps, and so on
What do hackers do after
hacking? (2)
 Install irc related program
 identd, irc, bitchx, eggdrop, bnc
 Install scanner program
 mscan, sscan, nmap
 Install exploit program
 Install denial of service program
 Use all of installed programs silently
What do hackers know?
 Don’t know how to use vi
 Don’t know what unix is
 Don’t know what they do
 Know how to intrude the system
 Know how to crash the system
 Know where the hacking programs are
How can kid hack?
 Kid has much of time
 Kid can search for longer time than other people
 All hacking program is easy to use
 Kid doesn’t have to know how the hacking program
works
 These kids are called script kiddies
Why can’t Korean kid hack?
 Almost all Korean kids don’t know English well
 Almost all hacking program manuals are written in
English
 However, many hacking program manuals are being
translated
How can be a real hacker?
 Study C/C++/assembly language
 Study computer architecture
 Study operating system
 Study computer network
 Examine the hacking tools for a month
 Think the problem of the computer
Why can’t defend against
hackers?
 There are many unknown security hole
 Hackers need to know only one security hole to
hack the system
 Admin need to know all security holes to defend the
system
How can protect the system?
(1)
 Patch security hole often
 Encrypt important data
 Ex) pgp, ssh
 Do not run unused daemon
 Remove unused setuid/setgid program
 Setup loghost
How can protect the system?
(2)
 Use switch hub
 Setup firewall
 Ex) ipchains
 Setup IDS
 Ex) snort
 Check unintentional changes
 Ex) tripwire
How can protect the system?
(3)
 Backup the system often
What should do after hacked?
 Shutdown the system
 Or turn off the system
 Separate the system from network
 Restore the system with the backup
 Or reinstall all programs
 Connect the system to the network
 It can be good to call the police
How to translate the hackers’
language (1)
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
How to translate the hackers’
language (2)
 Ex)
 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1
h4ck3d 1n
 I did not hack this page, it was like this when I hacked
in

Contenu connexe

Tendances

Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printingleminhvuong
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting Sina Manavi
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pagesleoimpact
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attackmarada0033
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.Coder Tech
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingankit sarode
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 

Tendances (20)

Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Hacking
HackingHacking
Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
H A C K I N Gjk,K
H A C K I N Gjk,KH A C K I N Gjk,K
H A C K I N Gjk,K
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Hacking
HackingHacking
Hacking
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

En vedette

Practical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialPractical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialYam Peleg
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricksSudhanshu Mishra
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Quotes on education in telugu
Quotes on education in teluguQuotes on education in telugu
Quotes on education in teluguK.SURYA SAGAR
 
తెలుగు సూక్తులు
తెలుగు సూక్తులుతెలుగు సూక్తులు
తెలుగు సూక్తులుK.SURYA SAGAR
 
My mother tongue - Telugu
My mother tongue - TeluguMy mother tongue - Telugu
My mother tongue - TeluguLalitha G
 
Bharatham quiz telugu book pdf
Bharatham quiz telugu book pdfBharatham quiz telugu book pdf
Bharatham quiz telugu book pdfkishorereddy_btech
 
VMRay intro video
VMRay intro videoVMRay intro video
VMRay intro videoChad Loeven
 
Ajit-Legiment_Techniques
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniquesguest66dc5f
 
The (In)Security of Topology Discovery in Software Defined Networks
The (In)Security of Topology Discovery in Software Defined NetworksThe (In)Security of Topology Discovery in Software Defined Networks
The (In)Security of Topology Discovery in Software Defined NetworksTalal Alharbi
 
Welcome to the United States: An Acculturation Conversation
Welcome to the United States: An Acculturation ConversationWelcome to the United States: An Acculturation Conversation
Welcome to the United States: An Acculturation ConversationSuzanne M. Sullivan
 
Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007Stephan Chenette
 
Code obfuscation, php shells & more
Code obfuscation, php shells & moreCode obfuscation, php shells & more
Code obfuscation, php shells & moreMattias Geniar
 
A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...eSAT Journals
 

En vedette (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Practical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialPractical Cyber Attacking Tutorial
Practical Cyber Attacking Tutorial
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Quotes on education in telugu
Quotes on education in teluguQuotes on education in telugu
Quotes on education in telugu
 
తెలుగు సూక్తులు
తెలుగు సూక్తులుతెలుగు సూక్తులు
తెలుగు సూక్తులు
 
My mother tongue - Telugu
My mother tongue - TeluguMy mother tongue - Telugu
My mother tongue - Telugu
 
Energy from evaporation
Energy  from  evaporationEnergy  from  evaporation
Energy from evaporation
 
Hacking education
Hacking educationHacking education
Hacking education
 
Mookapanchasathi Telugu pdf
Mookapanchasathi Telugu pdfMookapanchasathi Telugu pdf
Mookapanchasathi Telugu pdf
 
Whats ppt
Whats pptWhats ppt
Whats ppt
 
Bharatham quiz telugu book pdf
Bharatham quiz telugu book pdfBharatham quiz telugu book pdf
Bharatham quiz telugu book pdf
 
VMRay intro video
VMRay intro videoVMRay intro video
VMRay intro video
 
Ajit-Legiment_Techniques
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniques
 
The (In)Security of Topology Discovery in Software Defined Networks
The (In)Security of Topology Discovery in Software Defined NetworksThe (In)Security of Topology Discovery in Software Defined Networks
The (In)Security of Topology Discovery in Software Defined Networks
 
Welcome to the United States: An Acculturation Conversation
Welcome to the United States: An Acculturation ConversationWelcome to the United States: An Acculturation Conversation
Welcome to the United States: An Acculturation Conversation
 
Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007
 
Code obfuscation, php shells & more
Code obfuscation, php shells & moreCode obfuscation, php shells & more
Code obfuscation, php shells & more
 
A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...
 

Similaire à Hacking Tutorial in Telugu

Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hackingSainath Volam
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 
Chapter 09
Chapter 09Chapter 09
Chapter 09 Google
 
Op Sy 03 Ch 61
Op Sy 03 Ch 61Op Sy 03 Ch 61
Op Sy 03 Ch 61 Google
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure ! trendy updates
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipurcyber cure
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.pptshreyng
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 

Similaire à Hacking Tutorial in Telugu (20)

Hacker
HackerHacker
Hacker
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Hacking Question and Answer
Hacking Question and Answer Hacking Question and Answer
Hacking Question and Answer
 
Hacking
HackingHacking
Hacking
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Super1
Super1Super1
Super1
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Op Sy 03 Ch 61
Op Sy 03 Ch 61Op Sy 03 Ch 61
Op Sy 03 Ch 61
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure !
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Communication security
Communication securityCommunication security
Communication security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 

Dernier

3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptxraviapr7
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeCeline George
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....Riddhi Kevadiya
 
Vani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational TrustVani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational TrustSavipriya Raghavendra
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdfJayanti Pande
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
Protein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxProtein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxvidhisharma994099
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Dr. Asif Anas
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlDr. Bruce A. Johnson
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...Nguyen Thanh Tu Collection
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxCapitolTechU
 

Dernier (20)

3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using Code
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....
 
Vani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational TrustVani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
Protein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxProtein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptx
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting Bl
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 

Hacking Tutorial in Telugu

  • 2. Contents (1)  Who is hacker?  History of hacking  Types of hacking  Hacking accidents  Why do hackers hack?  What hackers do after hacking?  What do hackers know?
  • 3. Contents (2)  How can kid hack?  Why can’t Korean kid hack?  How can be a real hacker?  Why can’t defend against hackers?  How can protect the system?  What should do after hacked?
  • 4. Contents (3)  How to translate the hackers’ language
  • 5. Who is hacker? (1)  Hack  Cut with repeated irregular blows  Examine something very minutely  Hacker  The person who hacks  Cracker  System intruder/destroyer
  • 6. Who is hacker? (2)  Hacker means cracker nowadays  Meaning has been changed
  • 7. History of hacking  Telephone hacking  Use telephone freely  It’s called phreaking  Computer virus  Destroy many computers  Network hacking  Hack the important server remotely and destroy/modify/disclose the information
  • 8. Types of hacking Normal data transfer Interruption Interception Modification Fabrication
  • 9. Hacking accidents (1)  Internet Worm  Robert T. Morris made an internet worm. It spread through the internet and crashed about 6000 systems.  Cuckoo’s Egg  Clifford Stoll caught the hackers who are the German hackers applied by KGB
  • 10. Hacking accidents (2)  IP Spoof  Kevin Mitnick was caught by Tsutomu Shimomura who was security expert. Kevin Mitnick uses the IP Spoof attack in this accident
  • 11. Why do hackers hack?  Just for fun  Show off  Hack other systems secretly  Notify many people their thought  Steal important information  Destroy enemy’s computer network during the war
  • 12. What do hackers do after hacking? (1)  Patch security hole  The other hackers can’t intrude  Clear logs and hide themselves  Install rootkit ( backdoor )  The hacker who hacked the system can use the system later  It contains trojan ls, ps, and so on
  • 13. What do hackers do after hacking? (2)  Install irc related program  identd, irc, bitchx, eggdrop, bnc  Install scanner program  mscan, sscan, nmap  Install exploit program  Install denial of service program  Use all of installed programs silently
  • 14. What do hackers know?  Don’t know how to use vi  Don’t know what unix is  Don’t know what they do  Know how to intrude the system  Know how to crash the system  Know where the hacking programs are
  • 15. How can kid hack?  Kid has much of time  Kid can search for longer time than other people  All hacking program is easy to use  Kid doesn’t have to know how the hacking program works  These kids are called script kiddies
  • 16. Why can’t Korean kid hack?  Almost all Korean kids don’t know English well  Almost all hacking program manuals are written in English  However, many hacking program manuals are being translated
  • 17. How can be a real hacker?  Study C/C++/assembly language  Study computer architecture  Study operating system  Study computer network  Examine the hacking tools for a month  Think the problem of the computer
  • 18. Why can’t defend against hackers?  There are many unknown security hole  Hackers need to know only one security hole to hack the system  Admin need to know all security holes to defend the system
  • 19. How can protect the system? (1)  Patch security hole often  Encrypt important data  Ex) pgp, ssh  Do not run unused daemon  Remove unused setuid/setgid program  Setup loghost
  • 20. How can protect the system? (2)  Use switch hub  Setup firewall  Ex) ipchains  Setup IDS  Ex) snort  Check unintentional changes  Ex) tripwire
  • 21. How can protect the system? (3)  Backup the system often
  • 22. What should do after hacked?  Shutdown the system  Or turn off the system  Separate the system from network  Restore the system with the backup  Or reinstall all programs  Connect the system to the network  It can be good to call the police
  • 23. How to translate the hackers’ language (1) 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x
  • 24. How to translate the hackers’ language (2)  Ex)  1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1 h4ck3d 1n  I did not hack this page, it was like this when I hacked in