SlideShare a Scribd company logo
HACKING
Computer Security
Presented By:
Animesh Behera
Guided By:
Mr. Ashish Kumar Rath(HOD)
 What is Hacking?
 Who are Hacker ?
 Types of Hacker
 IP Address
 Hacking Procedure
 Hacking Techniques
 Advantages and Disadvantages
Contents
What is Hacking?
Hacking refers to an array of activities which are done to
intrude some one else’s personal information space so as
to use it for malicious, unwanted purposes.
Hacking is a term used to refer to activities aimed at
exploiting security flaws to obtain critical information for
gaining access to secured networks.
A Brief History of Hacking
Who are Hacker
 The term hacker is used in popular media to describe some one who attempts
to break into computer systems.
 Typically this kind of hacker would be a proficient programmer or engineer with
sufficient technical knowledge to understand the weak points in a security
system.
Famous Hackers in History
Ian Murphy Kevin Mitnick Johan Helsinguis
Pranav MistryRahul Tyagi Trisneet Arora
The Hacker Attitude
 The world is full of fascinating problems waiting to be solved.
 Nobody should ever have to solve a problem twice.
 Boredom and drudgery are evil.
 Freedom is good.
 Becoming a hacker will take intelligence, practice, dedication, and hard
work.
Basic Hacking Skills
 Learn how to program.
This, of course, is the fundamental hacking skill. If you don't know any
computer languages, you cant do hacking.
 Get one of the open-source Unix's and learn to use and run it
The single most important step any newbie can take towards acquiring
hacker skills is to get a copy of Linux or one of the BSD-Unix’s, install it
on a personal machine, and run it.
 Learn how to use the World Wide Web and write HTML.
To be worthwhile, your page must have content -- it must be interesting
and/or useful to other hackers.
Hacking Premeasured
 When you start hacking the first thing you need to do is: to make sure the
victim will not find out your real identity.
 So hide your IP by masking it or using a anonymous proxy server. This is
only effective when the victim has no knowledge about computers and
internet. Organizations like the F.B.I, C.I.A and such will find you in no
time, so beware !
 The best thing to do is using a dialup connection that has a variable IP
address. Be smart, when you signup for a internet dialup connection use
a fake name and address.
 When hacking never leave traces of your hacking attempts, clear log files
and make sure you are not monitored. So use a good firewall that keeps
out retaliation hacking attempts of your victim.
Types of Hacker
White Hat Hacker
 Also known as ethical hackers, White Hat hackers are the good guys of the
hacker world.
 They’ll help you remove a virus or Pen Test a company.
 Most White Hat hackers hold a college degree in IT security or computer
science and must be certified to pursue a career in hacking.
 The most popular certification is the CEH (Certified Ethical Hacker) from the
EC-Council.
Black Hat Hacker
 Also known as crackers, these are the men and women you hear about in the
news.
 They find banks or other companies with weak security and steal money or
credit card information.
 The surprising truth about their methods of attack is that they often use
common hacking practices they learned early on.
Gray Hat Hacker
 Nothing is ever just black or white; the same is true in the world of hacking.
 Gray Hat hackers don’t steal money or information (although, sometimes they
deface a website or two), yet they don’t help people for good (but, they could if
they wanted to).
 These hackers comprise most of the hacking world, even though Black Hat
hackers garner most (if not all) of the media’s attention.
IP Addresses
 Every system connected to a network has a unique Internet Protocol (IP)
Address which acts as its identity on that network.
 An IP Address is a 32-bit address which is divided into four fields of 8-bits
each. For Example, 203.94.35.12
 All data sent or received by a system will be addressed from or to the
system.
 An attacker’s first step is to find out the IP Address of the target system.
IP Addresses: Finding out an IP Address
 A remote IP Address can easily be found out by any of the following
methods:
Through Instant Messaging Software
Through Internet Relay Chat
Through Your website
Through Email Headers
NETWORK HACKING
General Hacking Methods
 A typical attacker works in the following manner:
1. Identify the target system.
2. Gathering Information on the target system.
3. Finding a possible loophole in the target system.
4. Exploiting this loophole using exploit code.
5. Removing all traces from the log files and escaping without
a trace.
Footprinting
 Footprinting is a part of reconnaissance process which is used for gathering
possible information about a target computer system or network. Footprinting
could be both passive and active.
 a hacker can collect the following information using Footprinting-
 Domain name
 IP Addresses
 Namespaces
 Employee information
 Phone numbers
 E-mails
 Job Information
Port Scanning: An Introduction
Port Scanning means to scan the target system in order to get a list of
open ports (i.e. ports listening for connections) and services running on
these open ports.
Port Scanning is normally the first step that an attacker undertakes.
Is used to get a list of open ports, services and the Operating System
running on the target system.
Can be performed easily by using different methods.
Manual Port Scanning can be performed using the famous ‘Telnet’
program.
Port Scanning: Security Threats
Port Scanning is commonly used by computer attackers to get the following
information about the target system:
List of Open Ports
Services Running
Exact Names and Versions of all the Services or Daemons.
Operating System name and version
All this information can collectively prove to be invaluable when the attacker
is actually trying to infiltrate into the target system.
Port Scanning : Major Tools Available
Some of the best and the most commonly used Port Scanners are:
 Nmap
 Superscan
 Hping
Common Features of all above Port Scanners:
 Very Easy to Use
 Display Detailed Results
The easy usability and the detailed information reports generated by
popular port scanners has led to an alarming increase in the number of
script kiddies.
Port Scanning: Counter-Attacks Strategies
Although, it is impossible to stop clients from Port Scanning your network,
however, it is advisable to take all possible measures against possible
attackers. Some useful Anti-Port Scanning software available are:
 Scanlogd (A Unix based Port Scan Detector & Logger)
 BlackICE (A Windows based Port Scan Detector & Logger)
 Snort: A packet sniffer cum IDS.
 Abacus Port sentry: Capable of Detecting both normal and stealth
port scanning attempts.
Other than the above tools, it is always advisable to disable as many
services as possible. In other words, one should try to close as many ports
as possible, without compromising on the services offered by that system.
ICMP Scanning: An Introduction
 The Internet Control Message Protocol (ICMP) is the protocol used for
reporting errors that might have occurred while transferring data
packets over networks
 Extremely Useful in Information Gathering.
 Originally, designed for network diagnosis and to find out as to what
went wrong in the data communication.
 Can be used to find out the following:
 Host Detection
 Operating System Information
 Network Topography Information
 Firewall Detection
Threats from Key Loggers
 Key loggers: Record all keystrokes made on that system and store
them in a log file, which can later automatically be emailed to the
attacker.
 Countermeasures
 Periodic Detection practices should be made mandatory.
A Typical Key Logger automatically loads itself into the memory,
each time the computer boots.
 Thus, the start up script of the Key Logger should be removed.
Trojan Attacks
 Trojans: act as a RAT or Remote Administration Tool, which allow
remote control and remote access to the attacker.
Working:
1. The Server Part of the Trojan is installed on the target system
through trickery or disguise.
2. This server part listens on a predefined port for connections.
3. The attacker connects to this Server Part using the Client part of
the Trojan on the predefined port number.
4. Once this is done, the attacker has complete control over the
target system.
Trojan Attacks: Detection and
Countermeasures
 Detection & Countermeasures
 Port Scan your own system regularly.
 If you find a irregular port open, on which you usually do not have
a service running, then your system might have a Trojan installed.
 One can remove a Trojan using any normal Anti-Virus Software.
Attack Techniques
(Hacking Techniques)
 Brute Force
A Brute Force attack is an automated process of trial and error used to guess a
person's username, password, credit-card number or cryptographic key
• Cross-site Scripting
Cross-site Scripting (XSS) is an attack technique that forces a web site to echo
attacker-supplied executable code, which loads in a user's browser.
• SQL Injection
SQL Injection is an attack technique used to exploit web sites that construct SQL
statements from user-supplied input.
Advantages
 To recover lost information, especially in case one lost his password.
 To perform penetration testing to strengthen computer and network security.
 To put adequate preventative measures in place to prevent security breaches.
 To have a computer system that prevents malicious hackers from gaining
access.
Disadvantages
 Massive security breach.
 Unauthorized system access on private information.
 Hampering system operation.
 Denial of service attacks.
 Malicious attack on the system.
Hacking Presentation

More Related Content

What's hot (20)

Ce hv8 module 03 scanning networks
Ce hv8 module 03 scanning networksCe hv8 module 03 scanning networks
Ce hv8 module 03 scanning networks
Mehrdad Jingoism
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
Vi Tính Hoàng Nam
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
Vi Tính Hoàng Nam
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
Vi Tính Hoàng Nam
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4
dodontn
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
padmeshagrekar
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
Ave Nawsh
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
Vi Tính Hoàng Nam
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
NAWAZ KHAN
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
Wail Hassan
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
Khappiyo
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
Kalpesh Doru
 
Module 3 (scanning)
Module 3 (scanning)Module 3 (scanning)
Module 3 (scanning)
Wail Hassan
 
Access control attacks by Yaakub bin Idris
Access control attacks by Yaakub bin IdrisAccess control attacks by Yaakub bin Idris
Access control attacks by Yaakub bin Idris
Hafiza Abas
 
The top 10 security issues in web applications
The top 10 security issues in web applicationsThe top 10 security issues in web applications
The top 10 security issues in web applications
Devnology
 
Presentation1
Presentation1Presentation1
Presentation1
Abhishek Malhotra
 
Hacking
HackingHacking
Hacking
parthTrambadiya
 
Ce hv8 module 03 scanning networks
Ce hv8 module 03 scanning networksCe hv8 module 03 scanning networks
Ce hv8 module 03 scanning networks
Mehrdad Jingoism
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
Vi Tính Hoàng Nam
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
Vi Tính Hoàng Nam
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4
dodontn
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
padmeshagrekar
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
Ave Nawsh
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
Vi Tính Hoàng Nam
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
NAWAZ KHAN
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
Wail Hassan
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
Khappiyo
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
Kalpesh Doru
 
Module 3 (scanning)
Module 3 (scanning)Module 3 (scanning)
Module 3 (scanning)
Wail Hassan
 
Access control attacks by Yaakub bin Idris
Access control attacks by Yaakub bin IdrisAccess control attacks by Yaakub bin Idris
Access control attacks by Yaakub bin Idris
Hafiza Abas
 
The top 10 security issues in web applications
The top 10 security issues in web applicationsThe top 10 security issues in web applications
The top 10 security issues in web applications
Devnology
 

Similar to Hacking Presentation (20)

Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
aashish2cool4u
 
Introduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptxIntroduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptx
SahilSwe
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
DHRUV562167
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
Unit-2 ICS.ppt
Unit-2 ICS.pptUnit-2 ICS.ppt
Unit-2 ICS.ppt
20ME1A4607YANAMADALA
 
presentation of professionalism harwares.ppt
presentation of professionalism harwares.pptpresentation of professionalism harwares.ppt
presentation of professionalism harwares.ppt
JayPatil820512
 
31.ppt
31.ppt31.ppt
31.ppt
KarmanChandi
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 
Hack the hack
Hack the hackHack the hack
Hack the hack
Shakti Ranjan
 
hacking
hackinghacking
hacking
ADAIKKAPPANS1
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf
722820106121SARANS
 
Cyber security and detailed informat.ppt
Cyber security and detailed informat.pptCyber security and detailed informat.ppt
Cyber security and detailed informat.ppt
raga04269
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
Hacking intro
Hacking introHacking intro
Hacking intro
Milind Mishra
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
HassanAhmedShaikh1
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Syed Irshad Ali
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 
Introduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptxIntroduction to the Ethical hacking.pptx
Introduction to the Ethical hacking.pptx
SahilSwe
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
DHRUV562167
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
presentation of professionalism harwares.ppt
presentation of professionalism harwares.pptpresentation of professionalism harwares.ppt
presentation of professionalism harwares.ppt
JayPatil820512
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf
722820106121SARANS
 
Cyber security and detailed informat.ppt
Cyber security and detailed informat.pptCyber security and detailed informat.ppt
Cyber security and detailed informat.ppt
raga04269
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
HassanAhmedShaikh1
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 

Recently uploaded (20)

AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 

Hacking Presentation

  • 1. HACKING Computer Security Presented By: Animesh Behera Guided By: Mr. Ashish Kumar Rath(HOD)
  • 2.  What is Hacking?  Who are Hacker ?  Types of Hacker  IP Address  Hacking Procedure  Hacking Techniques  Advantages and Disadvantages Contents
  • 3. What is Hacking? Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes. Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
  • 4. A Brief History of Hacking
  • 5. Who are Hacker  The term hacker is used in popular media to describe some one who attempts to break into computer systems.  Typically this kind of hacker would be a proficient programmer or engineer with sufficient technical knowledge to understand the weak points in a security system.
  • 6. Famous Hackers in History Ian Murphy Kevin Mitnick Johan Helsinguis Pranav MistryRahul Tyagi Trisneet Arora
  • 7. The Hacker Attitude  The world is full of fascinating problems waiting to be solved.  Nobody should ever have to solve a problem twice.  Boredom and drudgery are evil.  Freedom is good.  Becoming a hacker will take intelligence, practice, dedication, and hard work.
  • 8. Basic Hacking Skills  Learn how to program. This, of course, is the fundamental hacking skill. If you don't know any computer languages, you cant do hacking.  Get one of the open-source Unix's and learn to use and run it The single most important step any newbie can take towards acquiring hacker skills is to get a copy of Linux or one of the BSD-Unix’s, install it on a personal machine, and run it.  Learn how to use the World Wide Web and write HTML. To be worthwhile, your page must have content -- it must be interesting and/or useful to other hackers.
  • 9. Hacking Premeasured  When you start hacking the first thing you need to do is: to make sure the victim will not find out your real identity.  So hide your IP by masking it or using a anonymous proxy server. This is only effective when the victim has no knowledge about computers and internet. Organizations like the F.B.I, C.I.A and such will find you in no time, so beware !  The best thing to do is using a dialup connection that has a variable IP address. Be smart, when you signup for a internet dialup connection use a fake name and address.  When hacking never leave traces of your hacking attempts, clear log files and make sure you are not monitored. So use a good firewall that keeps out retaliation hacking attempts of your victim.
  • 11. White Hat Hacker  Also known as ethical hackers, White Hat hackers are the good guys of the hacker world.  They’ll help you remove a virus or Pen Test a company.  Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking.  The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.
  • 12. Black Hat Hacker  Also known as crackers, these are the men and women you hear about in the news.  They find banks or other companies with weak security and steal money or credit card information.  The surprising truth about their methods of attack is that they often use common hacking practices they learned early on.
  • 13. Gray Hat Hacker  Nothing is ever just black or white; the same is true in the world of hacking.  Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to).  These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’s attention.
  • 14. IP Addresses  Every system connected to a network has a unique Internet Protocol (IP) Address which acts as its identity on that network.  An IP Address is a 32-bit address which is divided into four fields of 8-bits each. For Example, 203.94.35.12  All data sent or received by a system will be addressed from or to the system.  An attacker’s first step is to find out the IP Address of the target system.
  • 15. IP Addresses: Finding out an IP Address  A remote IP Address can easily be found out by any of the following methods: Through Instant Messaging Software Through Internet Relay Chat Through Your website Through Email Headers
  • 17. General Hacking Methods  A typical attacker works in the following manner: 1. Identify the target system. 2. Gathering Information on the target system. 3. Finding a possible loophole in the target system. 4. Exploiting this loophole using exploit code. 5. Removing all traces from the log files and escaping without a trace.
  • 18. Footprinting  Footprinting is a part of reconnaissance process which is used for gathering possible information about a target computer system or network. Footprinting could be both passive and active.  a hacker can collect the following information using Footprinting-  Domain name  IP Addresses  Namespaces  Employee information  Phone numbers  E-mails  Job Information
  • 19. Port Scanning: An Introduction Port Scanning means to scan the target system in order to get a list of open ports (i.e. ports listening for connections) and services running on these open ports. Port Scanning is normally the first step that an attacker undertakes. Is used to get a list of open ports, services and the Operating System running on the target system. Can be performed easily by using different methods. Manual Port Scanning can be performed using the famous ‘Telnet’ program.
  • 20. Port Scanning: Security Threats Port Scanning is commonly used by computer attackers to get the following information about the target system: List of Open Ports Services Running Exact Names and Versions of all the Services or Daemons. Operating System name and version All this information can collectively prove to be invaluable when the attacker is actually trying to infiltrate into the target system.
  • 21. Port Scanning : Major Tools Available Some of the best and the most commonly used Port Scanners are:  Nmap  Superscan  Hping Common Features of all above Port Scanners:  Very Easy to Use  Display Detailed Results The easy usability and the detailed information reports generated by popular port scanners has led to an alarming increase in the number of script kiddies.
  • 22. Port Scanning: Counter-Attacks Strategies Although, it is impossible to stop clients from Port Scanning your network, however, it is advisable to take all possible measures against possible attackers. Some useful Anti-Port Scanning software available are:  Scanlogd (A Unix based Port Scan Detector & Logger)  BlackICE (A Windows based Port Scan Detector & Logger)  Snort: A packet sniffer cum IDS.  Abacus Port sentry: Capable of Detecting both normal and stealth port scanning attempts. Other than the above tools, it is always advisable to disable as many services as possible. In other words, one should try to close as many ports as possible, without compromising on the services offered by that system.
  • 23. ICMP Scanning: An Introduction  The Internet Control Message Protocol (ICMP) is the protocol used for reporting errors that might have occurred while transferring data packets over networks  Extremely Useful in Information Gathering.  Originally, designed for network diagnosis and to find out as to what went wrong in the data communication.  Can be used to find out the following:  Host Detection  Operating System Information  Network Topography Information  Firewall Detection
  • 24. Threats from Key Loggers  Key loggers: Record all keystrokes made on that system and store them in a log file, which can later automatically be emailed to the attacker.  Countermeasures  Periodic Detection practices should be made mandatory. A Typical Key Logger automatically loads itself into the memory, each time the computer boots.  Thus, the start up script of the Key Logger should be removed.
  • 25. Trojan Attacks  Trojans: act as a RAT or Remote Administration Tool, which allow remote control and remote access to the attacker. Working: 1. The Server Part of the Trojan is installed on the target system through trickery or disguise. 2. This server part listens on a predefined port for connections. 3. The attacker connects to this Server Part using the Client part of the Trojan on the predefined port number. 4. Once this is done, the attacker has complete control over the target system.
  • 26. Trojan Attacks: Detection and Countermeasures  Detection & Countermeasures  Port Scan your own system regularly.  If you find a irregular port open, on which you usually do not have a service running, then your system might have a Trojan installed.  One can remove a Trojan using any normal Anti-Virus Software.
  • 27. Attack Techniques (Hacking Techniques)  Brute Force A Brute Force attack is an automated process of trial and error used to guess a person's username, password, credit-card number or cryptographic key • Cross-site Scripting Cross-site Scripting (XSS) is an attack technique that forces a web site to echo attacker-supplied executable code, which loads in a user's browser. • SQL Injection SQL Injection is an attack technique used to exploit web sites that construct SQL statements from user-supplied input.
  • 28. Advantages  To recover lost information, especially in case one lost his password.  To perform penetration testing to strengthen computer and network security.  To put adequate preventative measures in place to prevent security breaches.  To have a computer system that prevents malicious hackers from gaining access.
  • 29. Disadvantages  Massive security breach.  Unauthorized system access on private information.  Hampering system operation.  Denial of service attacks.  Malicious attack on the system.