23
HACKING Presented By.. Amit Kumar Pandey MCA 4 TH SEM

Hacking

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Hacking

HACKING

Presented By.. Amit Kumar Pandey MCA 4TH SEM

Page 2: Hacking

Introduction :

Definition Types of Hacker Threats History of Hacking Ethical

Page 3: Hacking

Hackers

Harmful behavior, Illegal access to computer, Wicked intention, Kind of electronically rebet robber, Breaker security system

Page 4: Hacking

Definition :

“A person who enjoy in learning the details of computer system & how to stretch their compatibility-as opposed to the most user of computer, who prefer to learn only the minimum amount necessary.”

“One who programmers enthusiastically or who enjoys programming rather then just theorizing about programming”

Page 5: Hacking

“A person who –

is an expert on enthusiast of creativity overcoming or circumventing limitation.”

-Used as a compliment

Page 6: Hacking

Types of HackingWhite Hat- “ Ethical hacker who breaks security

but who does so far altruistic or at least- malicious reason.- Clear defined code of ethics.

Gray Hat- “Ambiguous ethics”

-”Borderline legality”

Black Hat-”Subvert computer security without authorization.

Uses technology for Terrorism, Vandalism, identity theft, intellectual, proper theft……..

Page 7: Hacking

Types of Threats

Attack on availability Attack on confidentially Attack on integrity Attack on authentication

Page 8: Hacking

Attack on Confidentially

Attacker listens communication

Threats

-Give away private information.

-Spying password

Ex. Spy ware

source Destination

Attacker

Normal information flow

Intercepted information flow

Page 9: Hacking

Attack on Availability

Interrupt communication channel

Bring down destination Threats

->System not available

->System not useable

source destination

Page 10: Hacking

Attack on Integrity Attacker modifies the

information and send to channel

Threats

Systems are not confidential

sourceDestination

Attacker

Normal information flow

Intercepted information flow

Page 11: Hacking

Attack on Authenticity

Attacker fakes identity & insert counterfeit object on system.

Threats

- System not confidential

- No one sure to communicate with right partner

Ex. Forget password

sourceDestination

Attacker

Normal information flow

Forget information

Page 12: Hacking

Real threats

Loss of confidential information Viruses & worms Remote administration of system Defected web site & Security system. Cyber war ???

Page 13: Hacking

Defected website

Page 14: Hacking

Information Gathering

More information about any organization is good for hacker to attack.

Way to gather information.

--port scan

--ping sweep

--social engineering

Page 15: Hacking

Social Engineering

Attacker tries to convince some one to give about information, password……

Most innocent question

--what is phone number/ IP address…

--Know abut Administrating person, for N/W

--Network structure

Page 16: Hacking

History of Hacking

1970 Attack on American telephone system.---John Draper found a whistle that produces

2600 Hz tone---Tone used for signaling---Together with his friend he develop a “Blue

Box" which simulates a telephone operator's dialing console

---In combination he had the possibility to make free calls

Cond..

Page 17: Hacking

1982

---Teenage hacker group 414broke into 60 computer system, including Los Alamos laboratories

1988

---Kevin Mitnick secretly monitor’s the e-mail of the security officials

---sentenced for one year of jail

Cond…

Page 18: Hacking

1988 first computer worms in the internet is developed by “Robert morries” .Wanted to know about the size of ARPA net. He is the first person indicted under the computer fraud.--3 years probation.--400 hours community service--fine $10,050 & cost of his supervision Cond..

Page 19: Hacking

1988

-- First National Bank of Chicago become victim of $70 million computer theft

1989

--hackers were arrested in western Germany

--broke into US government &corporate computers

--Sold operating system source code to soviet

KGBCond..

Page 20: Hacking

2000 &2003

---Hackers broke into Microsoft’s corporate networks & stole Windows & Office source code

---”I LOVE YOU “ virus spread over the internet & infected image and sound files

--18 year old arrested for developing & releasing B variant of the blaster warms

Page 21: Hacking

Ethical Hacking

Breaking system into by order of owner

Skills:-(1). Completely trustworthy(2).Strong programming & networking ability(3). Vast Knowledge of Software & Hardware (4). Good understanding of security(5).System management skill.

Cond…

Page 22: Hacking

Goals :-

--Finding security holes,

gather information

Analysis of Tools

security administrator tools for network analysis

Page 23: Hacking