14

Hacking

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Hacking
Page 2: Hacking

Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers.

Page 3: Hacking

WHO IS HACKER?Hack

Cut with repeated irregular blowsExamine something very minutely

HackerThe person who hacks

CrackerSystem intruder/destroyerHacker means cracker nowadays

Page 4: Hacking

HISTORY OF HACKING

Telephone hackingUse telephone freelyIt’s called phreaking

Computer virusDestroy many computers

Network hackingHack the important server

remotely and destroy/modify/disclose the information

Page 5: Hacking

TYPES OF HACKINGNormal

data transfer

Interruption Interception

Modification Fabrication

Page 6: Hacking

HACKING ACCIDENTSInternet Worm

Robert T. Morris made an internet worm. It spread through the internet and crashed about 6000 systems.

Cuckoo’s EggClifford Stoll caught the

hackers who are the German hackers applied by KGB

Page 7: Hacking

WHY DO HACKERS HACK?Just for funShow offHack other systems secretlyNotify many people their thoughtSteal important informationDestroy enemy’s computer network during

the war

Page 8: Hacking

WHAT DO HACKERS KNOW?

Don’t know what Unix isDon’t know what they doKnow how to intrude the systemKnow how to crash the systemKnow where the hacking programs are

Page 9: Hacking

HOW CAN BE A REAL HACKERStudy C/C++/assembly

languageStudy computer

architectureStudy operating systemStudy computer networkExamine the hacking

tools for a monthThink the problem of the

computer

Page 10: Hacking

WHY CAN’T DEFEND AGAINST HACKERS?

There are many unknown security holeHackers need to know only one security hole

to hack the systemAdmin need to know all security holes to

defend the system

Page 11: Hacking

WHAT SHOULD DO AFTER HACK?

Shutdown the systemOr turn off the system

Separate the system from networkRestore the system with the backup

Or reinstall all programsConnect the system to the networkIt can be good to call the police

Page 12: Hacking

HOW TO TRANSLATE HACKERS LANGUAGE?

1 -> i or l3 -> e4 -> a7 -> t9 -> g0 -> o$ -> s| -> i or l

|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x

Page 13: Hacking

Ex)1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s

wh3n 1 h4ck3d 1n

I did not hack this page, it was like this when I hacked in

Page 14: Hacking

THANK YOU!!!

PRESENTED BY:KARAN POSHATTIWAR