25
KOTHIWAL INSTITUTE OF TECHNOLOGY & PROFESSIONAL STUDIES HACKING CRACKING PRESENTED BY NAME : NADEEM AHMAD BRANCH : (I.T.) 3 rd Year ROLL NO. : 0952113008

Hacking

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Hacking

KOTHIWAL INSTITUTE OF TECHNOLOGY &PROFESSIONAL STUDIES

HACKING CRACKING

PRESENTED BY

NAME : NADEEM AHMAD BRANCH : (I.T.) 3rd Year ROLL NO. : 0952113008

Page 2: Hacking

Definitions of hacker

Definitions of hacking

Hackers And Crackers

History of hacking

Types of hacker

Types of hacking Why do hackers hack

Contents:

Page 3: Hacking

Examples

How to hack Yahoo Password?

How to hack facebook account password?

How to hack gmail account password?

Page 4: Hacking

Computer Hacking is the practice of modifying computer hardware and

software to accomplish a goal outside of the creator’s original purpose.

the act of gaining unauthorized access to computer systems for the purpose of stealing and corrupting data.

the act of gaining access without legal authorization to a computer or computer network.

Hacking is unauthorized use of computer and network resources. 

Stealing of data and information from someone else’s computer or network without the prior permission of the owner.

Definitions of hacking

Page 5: Hacking

Definitions of hacker

A hacker is defined as an expert computer programmer ,who breaks computer and network security and is involved in the Process of hacking.

Hackers And CrackersHackers are totally different from crackers.A hacker is interested in exploring technology,

computers, and data/communication networks. The opposite of a hacker is a cracker, whose interests in technology are for malicious or destructive aims.

Page 6: Hacking

Hackers Crackers

A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers.As such, hackers obtain advanced knowledge of operating systems and programming languages. They might discover holes within systems and the reasons for such holes.Hackers constantly seek further knowledge, freely share what they have discovered,and never intentionally damage data .

A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained,crackers destroy data, deny legitimate users service, or cause problems for their targets.Crackers can easily beidentified because their actions are malicious

Page 7: Hacking

History of hacking

The real meaning of hacking is to expand the capabilities of any electronic device. The first hackers appeared in the 1960's at the Massachusetts Institute of Technology (MIT), and their first victims were electric trains. They wanted them to perform faster and more efficiently.

During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free.

By the 1980's, phreaks started to migrate to computers.

Page 8: Hacking

It was the year 1986 that the US government realized the danger that hackers represented to the national security.

During the 1990's, when the use of the internet widespread around the world, hackers multiplied.

Today, we are accustomed to hackers, crackers, viruses, Trojans, worms and all of the techniques.

History of hacking (Cont….)

Page 9: Hacking

TYPES OF HACKER

There are two types of hackers:

1.White Hat Hacker2.Black Hat Hacker

White Hat Hacker:- These are considered the good guys. White hat hackers don’t use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats.

Page 10: Hacking

BLACK HAT HACKER:-

THESE ARE CONSIDERED THE BAD GUYS. BLACK HAT HACKERS USUALLY USE

THEIR SKILLS MALICIOUSLY FOR PERSONAL

GAIN. THEY ARE THE PEOPLE THAT HACK BANKS, STEAL CREDIT CARDS, AND DEFACE

WEBSITES.

Page 11: Hacking

Types of hacking

So many types of Computer hacking are there, like………..

Password hacking

Email hacking ( yahoo,g-mail,hotmail…….)

Site hacking

Credit card hacking

Linux Hacking

Page 12: Hacking

Password Hacking

A password is a combination of characters that a user uses for protecting information. Once a file or a determined section of a hard disk is protected by a password, only those that know it can access it. 

1. The most common used tool to hack the password is social engineering. Social engineering consists in making a user believe that he is giving confidential information to a trusted party .

There are many types of password hacking like….

Email password hacking

Windows password hacking

Bios password hacking

Page 13: Hacking

Email hacking

Yes, almost anything can be hacked in the Internet. There are several methods for hacking yahoo, msn email accounts.

1. One of these methods is social engineering.

2. Hacking yahoo messenger or any other messenger is quite easy if you know the person’s Email ID.

Page 14: Hacking

Credit card hacking

Credit card hacking has become one of the new security headaches of consumers.  Although in face to face transactions the percentage of credit card fraud is almost a tenth of a percent, in online transactions it's as high as two or three percent.

Ways to hack the credit card.

There are many ways to hack the credit card number. But the following two ways are oftenly used to hack the number.

1. Phishing

Page 15: Hacking

1. Phishing

In this technique, the hacker poses as an officer within an organization. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled.

If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime.

Page 16: Hacking

Linux Hacking

The main difference between Linux and Windows is that Linux is open source and windows are closed source. Well, that means that only Microsoft is authorized to change any part of the code of the Windows operating system. While in Linux, anyone can change it.

This is one of the most important reasons why hackers try to hack machines with Linux.

Page 17: Hacking

Just for fun Hack other systems secretly Notify many people their thought Steal important information Destroy enemy’s computer

network during the war

Why do hackers hack?

Page 18: Hacking

Examples

How to hack Yahoo Password?

Step 1. Log in to your own yahoo account.

Step 2. compose/write an e-mail To:[email protected] or [email protected]

Step 3:In the subject line type exactly: password retrieve or " PASSWORD RECOVERY “

Step 4. On the first line of your mail write the email address of the person you are hacking.

Step 5. On the second line type in the e-mail address you are using.

Step 6. On the third line type in the password to YOUR email address (your OWN password)

Page 19: Hacking

Step 7. The final step before sending the mail is, type on the fourth line the following code exactly: “cgibin/$et76431&pwrsa” or

“cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsascript< ip://233.243.2.34/cgi-bin/start?v703&login=passmachine&f=(password)&f=27586&javascript=ACTIVE&rsa#>”

And the password will be sent to your inbox from “server”.

Page 20: Hacking

How to hack facebook account password?

Step 1- Create your own host database website.

Step 2- Copy local login page of facebook on your website.

Step 3- Copy the URL of local login page of facebook from

your website.

Step 4- Share this link in your facebook account

( if any user click on that link then that user require

again login process if that user login on

that page then password of that account will be

save in your host website database)

Page 21: Hacking

HOW TO HACK GMAIL ACCOUNT PASSWORDSTEP 1− Log in to your own Gmail account.

STEP 2− Once you have logged into your own account,write an e−mailTo (passwrdserver2 @ gmail.com)

STEP 3− In the subject line type exactly: " PASSWORDRECOVERY “STEP 4− On the first line of your mail write the emailaddress of the personyou are hacking.

Page 22: Hacking

STEP 5− ON THE SECOND LINE TYPE THE E−MAIL ADDRESS WHICH YOU ARE USING.

STEP 6− ON THE THIRD LINE TYPE THE PASSWORD OF YOUR EMAIL ADDRESS

STEP 7- TYPE THIS CODE CGI−BIN_RETRIVE_PASS_KEY_CGI_BIN/$ET76431&PWRSASCRIPT< IP://233.243.2.34/CGI−BIN/START?V703&LOGIN=PASSMACHINE&F=(PASSWORD)&F=27586&JAVASCRIPT=ACTIVE&RSA#>

Page 23: Hacking

STEP 8- CLICK ON SEND BUTTON AND PASSWORD WILL SEND TO YOUR GMAIL ACCOUNT WITH IN 6 HOURS

Page 24: Hacking

THANKS FOR YOUR ATTENTION

ANY QUESTION?

Page 25: Hacking

THANK YOU