SlideShare a Scribd company logo
SYSTEM HACKING
MR. RAJASEKAR RAMALINGAM
FACULTY - DEPARTMENT OF IT
COLLEGE OF APPLIED SCIENCES โ€“ SUR
SULTANATE OF OMAN
VRRSEKAR@YAHOO.COM
CONTENT
1. Steps before hacking a System
๏‚— Footprinting
๏‚— Scanning
๏‚— Enumeration
2. System Hacking stage
3. Goals for System Hacking
4. System Hacking Methodology
5. System Hacking Steps
6. Password Cracking
7. Privilege escalation
8. Executing Applications
9. Hiding Files
10. Covering tracks
2
SYSTEMHACKING
1. STEPS BEFORE HACKING A SYSTEM
3
SYSTEM HACKING
1.1 FOOTPRINTING
๏‚ข Process of accumulating data regarding a specific network environment.
๏‚ข Purpose of finding ways to intrude into the network environment.
๏‚ข Can be used to attack a system, and also to protect it.
๏‚ข In the footprinting phase, the attacker creates a profile of the target
organization, with the information such as its IP address range,
namespace, and employee web usage.
๏‚ข Footprinting improves the ease with which the systems can be exploited
by revealing system vulnerabilities.
๏‚ข Determining the objective and location of an intrusion is the primary step
involved in footprinting.
๏‚ข Once the objective and location of an intrusion is known, specific
information about the organization can be gathered.
4
SYSTEM HACKING
1.2 SCANNING
๏‚ข Procedure for identifying active hosts on a network, either for the
purpose of network security assessment or for attacking them.
๏‚ข The attacker finds information about the target assessment
through its IP addresses that can be accessed over the Internet.
๏‚ข Scanning is mainly concerned with the identification of systems
on a network and the identification of services running on each
computer.
๏‚ข Some of the scanning procedures such as port scans and ping
sweeps return information about the services offered by the live
hosts that are active on the Internet and their IP addresses. 5
SYSTEM HACKING
1.3 ENUMERATION
๏‚ข Enumeration is the method of intrusive probing into the target
assessment through which attackers gather information such as
network user lists, routing tables, and Simple Network
Management Protocol (SNMP) data.
๏‚ข The attacker's objective is to identify valid user accounts or groups
where he or she can remain inconspicuous once the system has
been compromised.
๏‚ข Enumeration involves making active connections to the target
system or subjecting it to direct queries.
6
SYSTEM HACKING
2. SYSTEM HACKING STAGE
๏‚ข Every criminal commits a crime to achieve certain goal.
๏‚ข Likewise, an attacker can also have certain goals behind
performing attacks on a system.
๏‚ข The following may be some of the goals of attackers in
committing attacks on a system.
๏‚ข The table shows the goal of an attacker at different hacking
stages and the technique used to achieve that goal.
7
SYSTEM HACKING
3. GOALS FOR SYSTEM HACKING
8
SYSTEM HACKING
4. SYSTEM HACKING METHODOLOGY
๏‚ข Before hacking a system, an attacker uses footprinting, scanning,
and enumeration techniques to detect the target area of the attack
and the vulnerabilities that prove to be doorways for the attacker.
๏‚ข Once the attacker gains all the necessary information, he or she
starts hacking.
๏‚ข The following diagram depicts the hacking methodology followed
by ethical / Unethical hackers:
9
SYSTEM HACKING
System Hacking Methodologyโ€ฆ.
10
SYSTEM HACKING
5. SYSTEM HACKING STEPS
๏‚ข System hacking cannot be accomplished at a single go.
๏‚ข Various steps that include
๏‚ข Cracking passwords
๏‚ข Escalating privileges
๏‚ข Executing applications
๏‚ข Hiding files
๏‚ข Covering tracks
๏‚ข Discuss these steps one by one thoroughly, to determine how the
attacker hacks the system.
11
SYSTEM HACKING
System Hacking Stepsโ€ฆ
12
SYSTEM HACKING
6. PASSWORD CRACKING
13
SYSTEM HACKING
PASSWORD CRACKING โ€ฆ
๏‚ข Process of recovering passwords from the data that has been transmitted
by a computer system or stored in it.
๏‚ข Helps a user to recover a forgotten or lost password, as a preventive
measure by the system administrators.
๏‚ข Can also be used to gain unauthorized access to a system.
๏‚ข Many hacking attempts start with password cracking attempts.
๏‚ข Most attackers use password cracking techniques to gain unauthorized
access to the vulnerable system.
๏‚ข Passwords may be cracked manually or with automated tools.
๏‚ข Programs designed for cracking passwords are the functions of the
number of possible passwords per second that can be checked.
๏‚ข Most of the passwords cracking techniques are successful due to weak or
easily guessable passwords. 14
SYSTEM HACKING
6.1 PASSWORD CRACKING TECHNIQUES
15
SYSTEM HACKING
6.2 TYPES OF PASSWORD ATTACKS
16
SYSTEM HACKING
6.3 PASSWORD CRACKING TOOLS
17
SYSTEM HACKING
7. PRIVILEGE ESCALATION
๏‚ข An attacker can gain access to the network using a non-admin
user account, and the next step would be to gain administrative
privileges.
๏‚ข Attacker performs privilege escalation attack which takes
advantage of design flaw, programming errors, bugs, and
configuration oversights in the OS and software application to
gain administrative access to the network and its associated
applications.
๏‚ข These privileges allows attacker to view private information ,
delete files, or install malicious programs such as viruses,
Trojans, worms, etc.
18
SYSTEM HACKING
PRIVILEGE ESCALATIONโ€ฆ
Types of Privilege escalation:
1. Vertical Privilege escalation
๏‚ข Requires granting higher privileges or higher level of access
than administrator.
๏‚ข This is accomplished by doing kernel-level operations that
permit to run unauthorized code.
2. Horizontal Privilege escalation
๏‚ข Requires using same privileges or higher level of access that
already has been granted but assuming the identity of another
user with similar privileges. 19
SYSTEM HACKING
7.1 PRIVILEGE ESCALATION TOOLS
20
SYSTEM HACKING
8. EXECUTING APPLICATIONS
21
โ€ข Attackers execute malicious applications in this stage.
โ€ข This is called โ€œOwningโ€ the system.
โ€ข Executing applications is done after the attacker gains the
administrative privileges.
โ€ข The attacker may try to execute some of his or her own
malicious programs remotely on the victim's machine to gather
information that leads to exploitation or loss of privacy, gain
unauthorized access to system resources, crack passwords,
capture screenshots, install a backdoor to maintain easy access,
etc.
SYSTEM HACKING
EXECUTING APPLICATIONS โ€ฆ.
22
SYSTEM HACKING
๏‚ข The malicious programs that the attacker executes on victim's machine maybe:
๏‚ข Backdoors: Programming designed to deny or disrupt operation, gather
information that leads to exploitation or loss of privacy, gain unauthorized access
to system resources.
๏‚ข Crackers: Piece of software or program designed for the purpose of cracking the
code or passwords.
๏‚ข Keyloggers: This can be hardware or a software type. In either case the
objective is to record each and every key stroke made on the computer keyboard.
๏‚ข Spyware: Spy software may capture the screen shots and send them to a
specified location defined by the hacker. The attacker has to maintain the access
to the victim's computer until his or her purpose is fulfilled.
๏‚ข After deriving all the requisite information from the victimโ€™s computer, the
attacker installs several back doors to maintain easy access to the victimโ€™s
computer in the future.
23
SYSTEM HACKING
9. HIDING FILES
๏‚ข Many proactive applications are capable of preventing or detecting and
deleting malicious applications.
๏‚ข In order to avoid malicious applications being detected by protective
applications, attackers hide malicious files inside other legitimate files.
๏‚ข Rootkits are programs that hide their presence as well as attacker's
malicious activities, granting them full access to the server or host at
๏‚ข that time and also in future.
๏‚ข Rootkits replace certain operating system calls and utilities with its own
modified versions o f those routines that in turn undermine the security
of the target system causing malicious functions to be executed.
๏‚ข A typical root kit comprises o f backdoor programs, DDOS programs,
packet sniffers, log-wiping utilities, IRC bots, etc.
24
SYSTEM HACKING
HIDING FILESโ€ฆ.
25
SYSTEM HACKING
12.9.1 TYPES OF ROOTKIT
26
SYSTEM HACKING
12.10 COVERING TRACKS
27
โ€ข Once the attacker breaks into the target network or computer successfully,
he tries to hide himself from being detected or traced out.
โ€ข The attacker tries to cover all the tracks or logs that are generated during
his attempts to gain access to the target network.
SYSTEM HACKING
12.10.1WHY COVER TRACKS?
28
SYSTEM HACKING

More Related Content

What's hot (20)

Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
ย 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong
ย 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
leminhvuong
ย 
Penetration testing
Penetration testingPenetration testing
Penetration testing
Ammar WK
ย 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
ย 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
ย 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
Amit Tyagi
ย 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
ย 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
ย 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
ย 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
n|u - The Open Security Community
ย 
Xss attack
Xss attackXss attack
Xss attack
Manjushree Mashal
ย 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
ย 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
ย 
Destributed denial of service attack ppt
Destributed denial of service attack pptDestributed denial of service attack ppt
Destributed denial of service attack ppt
OECLIB Odisha Electronics Control Library
ย 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
GTU
ย 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
ย 
hacking
hackinghacking
hacking
mayank1293
ย 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
ย 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
ย 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
ย 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong
ย 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
leminhvuong
ย 
Penetration testing
Penetration testingPenetration testing
Penetration testing
Ammar WK
ย 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
ย 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
ย 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
Amit Tyagi
ย 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
ย 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
ย 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
ย 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
ย 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
ย 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
GTU
ย 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
ย 
hacking
hackinghacking
hacking
mayank1293
ย 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
ย 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
ย 

Similar to System hacking (20)

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Raghav Bisht
ย 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
Wail Hassan
ย 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
amiyadutta
ย 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
ShivamSharma909
ย 
CEH Domain 3.pdf
CEH Domain 3.pdfCEH Domain 3.pdf
CEH Domain 3.pdf
infosec train
ย 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
IRJET Journal
ย 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
Ali Asghar Jafari Lari
ย 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
youfanlimboo
ย 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
ย 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis
ย 
Unit 7
Unit 7Unit 7
Unit 7
Vinod Kumar Gorrepati
ย 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
shreyng
ย 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
Nikhil Pandit
ย 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
Umang Gupta
ย 
Hacking
HackingHacking
Hacking
blues_mfi
ย 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aditya Vikram Singhania
ย 
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxDomain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Infosectrain3
ย 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
ย 
Introduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitIntroduction To Exploitation & Metasploit
Introduction To Exploitation & Metasploit
Raghav Bisht
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
ย 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Raghav Bisht
ย 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
Wail Hassan
ย 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
amiyadutta
ย 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
ShivamSharma909
ย 
CEH Domain 3.pdf
CEH Domain 3.pdfCEH Domain 3.pdf
CEH Domain 3.pdf
infosec train
ย 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
IRJET Journal
ย 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
youfanlimboo
ย 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
ย 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis
ย 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
shreyng
ย 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
Nikhil Pandit
ย 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
Umang Gupta
ย 
Hacking
HackingHacking
Hacking
blues_mfi
ย 
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptxDomain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Domain 3 of CEH v11 System Hacking Phases and Attack Techniques.pptx
Infosectrain3
ย 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
ย 
Introduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitIntroduction To Exploitation & Metasploit
Introduction To Exploitation & Metasploit
Raghav Bisht
ย 

More from CAS (20)

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CAS
ย 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
ย 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
CAS
ย 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
CAS
ย 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
CAS
ย 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
CAS
ย 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
ย 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
CAS
ย 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
CAS
ย 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
ย 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
CAS
ย 
Malicious software
Malicious softwareMalicious software
Malicious software
CAS
ย 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
CAS
ย 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
CAS
ย 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
CAS
ย 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
ย 
Human resources security
Human resources securityHuman resources security
Human resources security
CAS
ย 
Database security
Database securityDatabase security
Database security
CAS
ย 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
CAS
ย 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
CAS
ย 
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CAS
ย 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
ย 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
CAS
ย 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
CAS
ย 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
CAS
ย 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
CAS
ย 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
ย 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
CAS
ย 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
CAS
ย 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
ย 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
CAS
ย 
Malicious software
Malicious softwareMalicious software
Malicious software
CAS
ย 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
CAS
ย 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
CAS
ย 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
CAS
ย 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
ย 
Human resources security
Human resources securityHuman resources security
Human resources security
CAS
ย 
Database security
Database securityDatabase security
Database security
CAS
ย 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
CAS
ย 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
CAS
ย 

Recently uploaded (20)

Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
ย 
Drupalcamp Finland โ€“ Measuring Front-end Energy Consumption
Drupalcamp Finland โ€“ Measuring Front-end Energy ConsumptionDrupalcamp Finland โ€“ Measuring Front-end Energy Consumption
Drupalcamp Finland โ€“ Measuring Front-end Energy Consumption
Exove
ย 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
ย 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
ย 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
ย 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
ย 
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
ย 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
ย 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
ย 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
ย 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
ย 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
ย 
HCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
HCL Nomad Web โ€“ Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
HCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
panagenda
ย 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
ย 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
ย 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
ย 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
ย 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
ย 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
ย 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
ย 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
ย 
Drupalcamp Finland โ€“ Measuring Front-end Energy Consumption
Drupalcamp Finland โ€“ Measuring Front-end Energy ConsumptionDrupalcamp Finland โ€“ Measuring Front-end Energy Consumption
Drupalcamp Finland โ€“ Measuring Front-end Energy Consumption
Exove
ย 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
ย 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
ย 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
ย 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
ย 
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
ย 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
ย 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
ย 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
ย 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
ย 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
ย 
HCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
HCL Nomad Web โ€“ Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
HCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
panagenda
ย 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
ย 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
ย 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
ย 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
ย 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
ย 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
ย 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
ย 

System hacking

  • 1. SYSTEM HACKING MR. RAJASEKAR RAMALINGAM FACULTY - DEPARTMENT OF IT COLLEGE OF APPLIED SCIENCES โ€“ SUR SULTANATE OF OMAN [email protected]
  • 2. CONTENT 1. Steps before hacking a System ๏‚— Footprinting ๏‚— Scanning ๏‚— Enumeration 2. System Hacking stage 3. Goals for System Hacking 4. System Hacking Methodology 5. System Hacking Steps 6. Password Cracking 7. Privilege escalation 8. Executing Applications 9. Hiding Files 10. Covering tracks 2 SYSTEMHACKING
  • 3. 1. STEPS BEFORE HACKING A SYSTEM 3 SYSTEM HACKING
  • 4. 1.1 FOOTPRINTING ๏‚ข Process of accumulating data regarding a specific network environment. ๏‚ข Purpose of finding ways to intrude into the network environment. ๏‚ข Can be used to attack a system, and also to protect it. ๏‚ข In the footprinting phase, the attacker creates a profile of the target organization, with the information such as its IP address range, namespace, and employee web usage. ๏‚ข Footprinting improves the ease with which the systems can be exploited by revealing system vulnerabilities. ๏‚ข Determining the objective and location of an intrusion is the primary step involved in footprinting. ๏‚ข Once the objective and location of an intrusion is known, specific information about the organization can be gathered. 4 SYSTEM HACKING
  • 5. 1.2 SCANNING ๏‚ข Procedure for identifying active hosts on a network, either for the purpose of network security assessment or for attacking them. ๏‚ข The attacker finds information about the target assessment through its IP addresses that can be accessed over the Internet. ๏‚ข Scanning is mainly concerned with the identification of systems on a network and the identification of services running on each computer. ๏‚ข Some of the scanning procedures such as port scans and ping sweeps return information about the services offered by the live hosts that are active on the Internet and their IP addresses. 5 SYSTEM HACKING
  • 6. 1.3 ENUMERATION ๏‚ข Enumeration is the method of intrusive probing into the target assessment through which attackers gather information such as network user lists, routing tables, and Simple Network Management Protocol (SNMP) data. ๏‚ข The attacker's objective is to identify valid user accounts or groups where he or she can remain inconspicuous once the system has been compromised. ๏‚ข Enumeration involves making active connections to the target system or subjecting it to direct queries. 6 SYSTEM HACKING
  • 7. 2. SYSTEM HACKING STAGE ๏‚ข Every criminal commits a crime to achieve certain goal. ๏‚ข Likewise, an attacker can also have certain goals behind performing attacks on a system. ๏‚ข The following may be some of the goals of attackers in committing attacks on a system. ๏‚ข The table shows the goal of an attacker at different hacking stages and the technique used to achieve that goal. 7 SYSTEM HACKING
  • 8. 3. GOALS FOR SYSTEM HACKING 8 SYSTEM HACKING
  • 9. 4. SYSTEM HACKING METHODOLOGY ๏‚ข Before hacking a system, an attacker uses footprinting, scanning, and enumeration techniques to detect the target area of the attack and the vulnerabilities that prove to be doorways for the attacker. ๏‚ข Once the attacker gains all the necessary information, he or she starts hacking. ๏‚ข The following diagram depicts the hacking methodology followed by ethical / Unethical hackers: 9 SYSTEM HACKING
  • 11. 5. SYSTEM HACKING STEPS ๏‚ข System hacking cannot be accomplished at a single go. ๏‚ข Various steps that include ๏‚ข Cracking passwords ๏‚ข Escalating privileges ๏‚ข Executing applications ๏‚ข Hiding files ๏‚ข Covering tracks ๏‚ข Discuss these steps one by one thoroughly, to determine how the attacker hacks the system. 11 SYSTEM HACKING
  • 14. PASSWORD CRACKING โ€ฆ ๏‚ข Process of recovering passwords from the data that has been transmitted by a computer system or stored in it. ๏‚ข Helps a user to recover a forgotten or lost password, as a preventive measure by the system administrators. ๏‚ข Can also be used to gain unauthorized access to a system. ๏‚ข Many hacking attempts start with password cracking attempts. ๏‚ข Most attackers use password cracking techniques to gain unauthorized access to the vulnerable system. ๏‚ข Passwords may be cracked manually or with automated tools. ๏‚ข Programs designed for cracking passwords are the functions of the number of possible passwords per second that can be checked. ๏‚ข Most of the passwords cracking techniques are successful due to weak or easily guessable passwords. 14 SYSTEM HACKING
  • 15. 6.1 PASSWORD CRACKING TECHNIQUES 15 SYSTEM HACKING
  • 16. 6.2 TYPES OF PASSWORD ATTACKS 16 SYSTEM HACKING
  • 17. 6.3 PASSWORD CRACKING TOOLS 17 SYSTEM HACKING
  • 18. 7. PRIVILEGE ESCALATION ๏‚ข An attacker can gain access to the network using a non-admin user account, and the next step would be to gain administrative privileges. ๏‚ข Attacker performs privilege escalation attack which takes advantage of design flaw, programming errors, bugs, and configuration oversights in the OS and software application to gain administrative access to the network and its associated applications. ๏‚ข These privileges allows attacker to view private information , delete files, or install malicious programs such as viruses, Trojans, worms, etc. 18 SYSTEM HACKING
  • 19. PRIVILEGE ESCALATIONโ€ฆ Types of Privilege escalation: 1. Vertical Privilege escalation ๏‚ข Requires granting higher privileges or higher level of access than administrator. ๏‚ข This is accomplished by doing kernel-level operations that permit to run unauthorized code. 2. Horizontal Privilege escalation ๏‚ข Requires using same privileges or higher level of access that already has been granted but assuming the identity of another user with similar privileges. 19 SYSTEM HACKING
  • 20. 7.1 PRIVILEGE ESCALATION TOOLS 20 SYSTEM HACKING
  • 21. 8. EXECUTING APPLICATIONS 21 โ€ข Attackers execute malicious applications in this stage. โ€ข This is called โ€œOwningโ€ the system. โ€ข Executing applications is done after the attacker gains the administrative privileges. โ€ข The attacker may try to execute some of his or her own malicious programs remotely on the victim's machine to gather information that leads to exploitation or loss of privacy, gain unauthorized access to system resources, crack passwords, capture screenshots, install a backdoor to maintain easy access, etc. SYSTEM HACKING
  • 23. ๏‚ข The malicious programs that the attacker executes on victim's machine maybe: ๏‚ข Backdoors: Programming designed to deny or disrupt operation, gather information that leads to exploitation or loss of privacy, gain unauthorized access to system resources. ๏‚ข Crackers: Piece of software or program designed for the purpose of cracking the code or passwords. ๏‚ข Keyloggers: This can be hardware or a software type. In either case the objective is to record each and every key stroke made on the computer keyboard. ๏‚ข Spyware: Spy software may capture the screen shots and send them to a specified location defined by the hacker. The attacker has to maintain the access to the victim's computer until his or her purpose is fulfilled. ๏‚ข After deriving all the requisite information from the victimโ€™s computer, the attacker installs several back doors to maintain easy access to the victimโ€™s computer in the future. 23 SYSTEM HACKING
  • 24. 9. HIDING FILES ๏‚ข Many proactive applications are capable of preventing or detecting and deleting malicious applications. ๏‚ข In order to avoid malicious applications being detected by protective applications, attackers hide malicious files inside other legitimate files. ๏‚ข Rootkits are programs that hide their presence as well as attacker's malicious activities, granting them full access to the server or host at ๏‚ข that time and also in future. ๏‚ข Rootkits replace certain operating system calls and utilities with its own modified versions o f those routines that in turn undermine the security of the target system causing malicious functions to be executed. ๏‚ข A typical root kit comprises o f backdoor programs, DDOS programs, packet sniffers, log-wiping utilities, IRC bots, etc. 24 SYSTEM HACKING
  • 26. 12.9.1 TYPES OF ROOTKIT 26 SYSTEM HACKING
  • 27. 12.10 COVERING TRACKS 27 โ€ข Once the attacker breaks into the target network or computer successfully, he tries to hide himself from being detected or traced out. โ€ข The attacker tries to cover all the tracks or logs that are generated during his attempts to gain access to the target network. SYSTEM HACKING