You are on page 1of 29

Presenting by M.

VISHAL BHARADWAJ (08F01A056 5)

Abstract Introduction Hackers Why Hackers Hack Types of Hacking And Cracking Ethical Hacking General Awareness Conclusion References
2

The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail ,online banking etc; As with most technological advances, there is also a Dark side: criminal hackers.

Hackers
Access computer system or network

without authorization.
Breaks the law; may go to prison.

Crackers
Break into systems to steal or

destroy data.
U.S. Department of Justice calls

both hackers.

Ethical hacker
Performs most of the same activities

but with owners permission.


4

Computer Hackers have been around for so many years.


Since the Internet became widely used in the World, We have started to hear more and more about hacking.

Only a few Hackers, such as Kevin Mitnick, are well known.


5

Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring and Learning how Computer systems operate. Recently, Hacker has taken on a new meaning someone who maliciously breaks into systems for personal gain. Crackers break into malicious intentions. systems with
6

Black Hat Hacker: These are the

Criminal Hackers or Crackers who use their skills and knowledge for illegal or malicious purposes. White Hat Hacker: A White Hat Hacker is computer guy who perform Ethical Hacking. These are usually security professionals with knowledge of hacking and the Hacker toolset and who use this knowledge to locate security weaknesses and implement countermeasures in the resources.

The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers they just hack to see what they can hack and what they cant hack, usually by testing their own systems. Many Hackers are the guys who get kicked out of corporate and government IT and security organizations. They try to bring down the status of the organization by attacking or stealing information. 8

Phishing Trojans Ip Spoofing Cyber Terrorist Windows Hacking & Security Software Cracking & Patching

Phishing is typically carried by emailspoofing or instant messaging

out

Phishing is a way of attempting to acquire information such as usernames , passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.

10

Read all the Email Carefully and Check if the Sender is Original Watch the Link Carefully before Clicking. Always check the URL in the Browser before Signing IN to your Account

11

The term is derived from the TrojanHorse story in Greek mythology. Trojan may allow a hacker remote access to a target computer system. Once a Trojan has been installed on a target computer system, a hacker may have access to the computer remotely and perform various operations, limited by user privileges on the target computer system and the design of the Trojan.
12

NEVER download blindly from people or sites which you aren't 100% sure about. Even if the file comes from a friend, you still must be sure what the file is before opening it. NEVER use features in your programs that automatically get or preview files. Anti-Virus Software
13

Spoofing is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. Ex:Sites www.hidemyass.com
14

There are Hackers called Cyber Terrorists, who attack Government computers or public utility infrastructures, such as power stations and air-traffic-control towers . They crash critical systems or steal classified government information. While in a conflict with enemy countries some government start Cyber war via Internet.

15

Registry Editing Steganography Creating Backdoors in Windows

16

17

A reverse engineer requires a deep understanding of both the hardware and the software, and how it all works together. A Debugger is a software program that attaches to and controls other software programs. A debugger allows single stepping of code, debug tracing, setting breakpoints, and viewing variables and memory state in the target program as it executes in a stepwise fashion. Debuggers are invaluable in determining logical program flow. Olly Debugger, Soft Ice, IDA Pro are some of the very famous Software Debuggers. 18

19

20

Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems. Ethical hackers typically have very strong programming and computer networking skills. Ethical Hacking is testing the resources for a good cause and for the betterment of technology.

21

Ethical hackers
Employed by companies to perform penetration tests

Penetration test
Legal attempt to break into a companys network to find

it weakest link
Tester only reports findings, does not harm the company

22

OphCrack Backtrack

Key logger's
Some tricks

23

24

25

Ethical Hacking is just a security system or tool for security to safe your data it is not an ultimate solution of problem. To test the security and the other functionalities of product is not new. But in the early stages of Internet no one know about Ethical Hacking even about hacking, but with the passage of time people are more concern about the security of their data, especially due to hackers. Time to time assessment, prepared interference recognition, good system administration performance and computer safety knowledge are all very vital part of a firms or companys security system. 26

Web Resources:
http://www.netsecurity.org/

Hacker Motives:

Hacking Techniques: http://kyrionhackingtutorials.com/

Technology: http://en.wikipedia.org/wiki/Ethical_Hacker

27

Queries
28

THANK YOU
29

You might also like