2. KNOW ABOUT :
WHAT IS HACKING?
HACKERS
TYPES OF HACKING
WHAT IS ETHICAL HACKING?
DIFFERENT LEVELS IN HACKERS
3. What is Hacking?
Hacking is simply
.
It is the act of breaking in to a computer
system and is a criminal offence under the
computer misuse.
.
4. Types Of Hacking :
• :
- It include stealing passwords (which hackers
then use or sell)
- Performing industrial espionage
- causing harm (as disgruntled employees)
- committing simple misuse.
5. • :
- Rogue access points (APs) are unsecured
wireless access points that outsiders can easily
breech. (Local hackers often advertise rogue
APs to each other.)
- Rogue APs are most often connected by well-meaning
but ignorant employees.
6. • :
- Hackers can gain access to a network by
exploiting back doors administrative
shortcuts, configuration errors, easily
deciphered passwords, and unsecured dial-ups.
- With the aid of computerized searchers
(bots), hackers can probably find any
weakness in your network.
7. • :
- Viruses and worms are self-replicating
programs or code fragments that attach
themselves to other programs (viruses) or
machines (worms).
- Both attempt to shut down networks by
flooding them with massive amounts of bogus
traffic, usually through e-mail.
8. • :
-Trojan horses, which are attached to other
programs, are the leading cause of all break-ins.
- When a user downloads and activates a
Trojan horse, the hacked software (SW) kicks
off a virus, password gobbler, or remote-control
SW that gives the hacker control of the
PC.
9. • :
- DoS attacks give hackers a way to bring down
a network without gaining internal access.
- DoS attacks work by flooding the access
routers with bogus traffic (which can be e-mail
or Transmission Control Protocol, TCP,
packets).
- Distributed DoSs are coordinated DoS attacks
from multiple sources. DDoS is more difficult
to block because it uses multiple, changing,
source IP addresses.
10. •
:
are people who just like to break
stuff. They usually exploit any target of
opportunity.
are hobbyists or professionals who
break passwords and develop Trojan horses or
other SW (called warez). They either use the
SW themselves (for bragging rights) or sell it
for profit.
11. are hacker wannabes. They
have no real hacker skills, so they buy or
download warez, which they launch.
Other attackers include disgruntled employees,
terrorists, political operatives, or anyone else
who feels slighted, exploited, ripped off, or
unloved.
12. • :
- Sniffing refers to the act of intercepting TCP
packets. This interception can happen through
simple eavesdropping or something more
sinister.
- Spoofing is the act of sending an illegitimate
packet with an expected acknowledgment
(ACK), which a hacker can guess, predict, or
obtain by snooping.
13. -
. However,
hackers have also developed new skills that
allow them to break into more complex
systems.
- Hacking typically involves compromising the
security of networks, breaking the security of
application software, or creating malicious
programs such as viruses.
14. - Most popular forms of network hacking are
denial of service (DoS) attacks and mail bombs.
- DoS attacks are designed to swamp a
computer network, causing it to crash.
- Mail bombs act in a similar fashion, but attack
the network's mail servers.
-Web server are bombarded with fake requests
for Web pages, which overloads the site and
caused it to crash.
15. - Network hackers also try to break into secure
areas to find sensitive data. Once a network is
hacked, files can be removed, stolen, or erased.
- Application hackers break security on
application software-software including word
processing and graphics programs-in order to
get it for free.
16. - One way they gain access to software that
requires a serial number for installation is by
setting up a serial number generator that will
try millions of different combinations until a
match is found.
- Application hackers also sometimes attack
the program itself in an attempt to remove
certain security features.
17. -Hackers that create viruses, logic bombs,
worms, and Trojan horses are involved in
perhaps the most malicious hacking activities.
-A virus is a program that has the potential to
attack and corrupt computer files by attaching
itself to a file to replicate itself.
- It can also cause a computer to crash by
utilizing all of the computer's resources.
18. What is ethical hacking ?
Ethical hacking is where
.
Ex. : A bank may pay a hacker to hack their
systems to see if it is hackable. If he gets in,
then they know there is potential for other
people to hack in, and usually they will work
with this ethical hacker to patch these holes. If
he doesn't get in, then they pray that nobody is
better at hacking than him.
19. A hacker looks at it this
way. The RFC says to load an instruction into
memory, use 8 bits of data, and two bits of
instruction, then a hacker looks at this and
wonders, and tries to pass more no. of bits .
- As results sooner or later the computer will
not be able to deal with the amount of data
being passed in a manner it understands & the
computer will not know how to interpret the
instructions.
20. When a computer does not know what to do
next, it gives up and passes control to the
SYSTEM, which is all powerful.
This is a very basic description of a buffer
overflow.
Once this happens, the hacker has
administrative control and can now start
passing commands to the computer that it will
follow without question.
21. Different levels in hackers
• There are three levels of hackers.
spend all their time trying to
break the system, to prove it can be broke, so
they can get the manufacturer to address the
problem and fix it.
do same thing, but perhaps will try
to gain from their new way of breaking the
system. They may expect payment for finding a
way to break the system, & they may even try
to get financial gain from their knowledge or
silence.
22. - want to take the knowledge of how
to break a system and use it for financial gain.
They may use it to hack systems or write code
that allows others to hack systems, and sell
that code.