32
HACKING AND CRACKING BY: Deepak Dedha Vanketesh Mishra Aayush Yadav

Hacking and cracking

Embed Size (px)

Citation preview

Page 1: Hacking and cracking

HACKING AND

CRACKING

BY:Deepak DedhaVanketesh MishraAayush Yadav

Page 2: Hacking and cracking

Objectives of Hacking and Cracking

What is Hacking?

Difference between Hacking and

cracking

Types of Hackers

Types of Hacking Techniques

Preventive measures

Some Cracking Examples

Page 3: Hacking and cracking

HACKING

Authorized or Unauthorized

attempts to bypass the security

mechanisms of an information

systems or network

In simple words Hacking means

finding out weaknesses in a

computer or computer network

Page 4: Hacking and cracking
Page 5: Hacking and cracking

Why do people hack ?

Just for fun

Hack other systems secretly

Notify many people their thought

Steal important information

Destroy enemy’s computer network

Page 6: Hacking and cracking

Literal DefinitionsHacker :

Someone who uses hacks.

Cracker :

some one who destructs

things.

Hacks :

A different approach with

some significant advantage over the

current approach

Page 7: Hacking and cracking

Types of Hackers

Page 8: Hacking and cracking

White-hat Hackers

The good guys who identify the

security weakness of the system or

network and inform the owner about

them

Page 9: Hacking and cracking

Black Hat Hackers

A black hat is the villain or

bad guy, who crash into victim‟s

security to steal information and

destroy the victims security

network.

Page 10: Hacking and cracking

Grey hat Hackers

A grey hat, in the hacking community,

refers to a skilled hacker who is

somewhere in between white and

black hat hackers

Page 11: Hacking and cracking

Pretexting

Phishing

Page 12: Hacking and cracking

Pretexting:

Pretexting is the act of creating and using an

invented scenario to persuade a target to release

information (e.g. date of birth, Social Security Number, last

bill amt.)

Phishing:Phishing is an e-mail fraud method in which the

perpetrator sends out email in an attempt to gather

personal and financial information from recipients.

Phishers attempt to fraudulently acquire

sensitive information, such as usernames, passwords and

credit card details .Ebay and PayPal are two of the most

targeted companies, and online banks are also common

targets

Page 13: Hacking and cracking

Language of hackers

1 -> i or l

3 -> e

4 -> a

7 -> t

9 -> g

0 -> o

$ -> s

| -> i or l

|\| -> n

|\/| -> m

s -> z

z -> s

f -> ph

ph -> f

x -> ck

ck -> x

Page 14: Hacking and cracking

Example:

1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|\| 1 h4ck3d 1n

I did not hack this page, it was like this when I hacked in.

Page 15: Hacking and cracking

World famous hackers

Stephen Wozniac

Tsutomu Shimomura

Page 16: Hacking and cracking

Kevin Mitnick

Kevin Poulsen

Page 17: Hacking and cracking

Random Fact !!!!

The average age group of

hackers are aged between 14-24

yrs. …

Page 18: Hacking and cracking

Did you know ?

Social networking sites like

„FACEBOOK‟, ‟GMAIL‟,

‟YAHOO” comprised of 60% of

direct or indirect hacking

incidents.

Page 19: Hacking and cracking

Most popular virus

Links involving private pictures

of celebrities.

Links showing pictures of

famous personalities like

videos of Osama Bin Laden‟s

killing.

Page 20: Hacking and cracking
Page 21: Hacking and cracking

Another popular scam

Facebook lottery scam.

Page 22: Hacking and cracking
Page 23: Hacking and cracking

Preventive measures

Install a strong anti-virus

Always run a anti-virus check before you

download a program or a file from the

internet.

Avoid disclosing personal details like

phone number, credit card details to

strangers.

A good firewall (Sygate personal)

A good spy ware / Trojan buster.

Use of genuine software

Page 24: Hacking and cracking

How to become Hacker

The best approach is to gain as much

knowledge about stuff as you can.

Good command over C / C++ / Perl will

definitely help.

But above all you need a good logical

brain.

Page 25: Hacking and cracking
Page 26: Hacking and cracking

Some Examples of Cracking

Windows Cracking

1).BIOS Password

Breaking

2).Windows Logon

Password Breaking

Page 27: Hacking and cracking

Bios password breaking

We can break BIOS password in any one of the following ways:

Trying default password

Hardware approach

Page 28: Hacking and cracking

Trying default passwords some default BIOS passwords

Lkwpeter AMI cmos

j262 Award AMI!SW1

AWARD_SW bios AMI? SW1

AWARD_PW BIOS password

Biostar setup hewittrand

„j262‟ opens most version of Award bios; it works about 80 per

cent of the time

Page 29: Hacking and cracking

Hardware approach

If the default passwords did not work, then try to reset the Bios to its default settings so that it asks for no password at all. Procedure for hardware approach is as follows

First, we have to open the computer and then look for a round lithium battery, it probably looks like a silver coin. So, remove the battery and after 30 seconds or so put it back.

Page 30: Hacking and cracking

Window log on password

breaking

To hack windows login password, reboot and wait for the message:

When we see the boot menu on the screen, press F2 or F12 before “Starting

Windows 9x…” . The boot menu will come up. Select option to boot into DOS

.

C:\>cd windows

C:\windows>ren *.pwl *.xyz // RENAME

Or delete them by typing

C:\windows>del *.pwl *.xyz //DELETE

Page 31: Hacking and cracking

Easy and Simple approachOn many computers a series of

keystrokes may crash the password program.

keep pressing ESC 15 to 20 times . This will result in the crashing of the password program and the computer will continue booting .

BY BOOTING

We can break into a computer by using live tools like conboot live cd which are readly available on internet .The live cd can be used to make a bootable pen drive and then we can break into any computer.

Page 32: Hacking and cracking