Hacking
Hacking
INTRODUCTION
THE PROCESS OF ATTEMPTING TO GAIN OR SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO COMPUTER RESOURCES FOR THE PURPOSE OF HELP OR SECURE SYSTEM IS CALLED HACKING
HISTORY OF HACKING
1966 ROBERT MORRIS INTRODUCES THE CONCEPT OF SAFE HACKING. 1969 DEVELOPMENT IN THE FIELD OF HACKING. 1990 ELECTRONIC FRONTIER FOUNDATION WAS FOUNDED. 1995 MARK ANDREESSON & ERIC RELEASE MOSAIC.
WHO IS HACKER?
HACKER IS NOT CYBER CRIMINAL BUT HE IS THE VERY INTELLIGENT PERSON WHO IS USE HIS KNOWLEDGE IN CONSTRUCTIVE TO SECURE SYSTEM & COMPUTER NEVER WITHOUT H CHNIQUEMANNER IN WHICH ANY ONE CAN ACESS ANY ONES THE PERSON WHO IS DOING THIS TYPE OF WORK IS CALLED HACKER DAMAGE DATA HE KNOW ALL ABOUT THE OPERATING SYSTEM & DIFFERENT HOLES IN THE SYSTEM
WHO IS CRACKER?
PERSON WHO ENTER INTO OTHERS SYSTEM AND VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE HAVOC IS CALLED CRACKER CRACKER IS CYBER CRIMINAL
SUN
HACKERS USING EITHER SOLARIC X86 OR SCO AS A PLATFORM. THIS IS BECAUSE THESE PRODUCTS ARE LICENSE WARE & THEY CAN EASILY BE OBTAINED.
UNIX
POPULAR PLATFORM BECAUSE THEY REQUIRED A LOW OVERHEAD. WE CAN RUN LINUX ON A PALTRAY 386 AND GAIN GOOD PERFORMANCE. THIS IS REASONABLE.
MICROSOFT
THIS SUPPORTS MANY SECURITY TOOLS THAT CAN BE USED TO ATTACK REMOTE MACHINE. IT HAS ADVANCED TOOLS FOR NETWORKING AS WELL.
TYPES OF HACKING
THERE ARE MANY TYPES OF HACKING LIKE PASSWORD HACKING SOFTWARE HACKING NET HACKING
PASSWORD HACKING
TWO TYPES 1. BRUTE FORCE IN THAT CASE HACKERS TRY OUT ALL THE COMBINATION OF ALL KEYBOARD LETTERS .IT HAS GRATER SUCCESS BUT IT TAKES LONG TIME 2. DICTIONARY BASED IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS UNSUCCESSFUL METHOD
SOFTWARE HACKING
IN THAT HACKERS CHANGES THE LOOK & EXCUTION WAY OF THAT SOFTWARE CHANG THE DEMO VERSION INTO FULL VERSION BY DECODE THE SOURCE CODE
IP ADDRESS
IP ADDRESS IS THE ADDRESS OF YOUR COMPUTER IN THE INTERNET IT IS UNIQ LIKE 192.168.23.45
PORT
IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR COMPUTER IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER CAN ENTER THERE ARE THOUSANDS OF PORTS INTO COMPUTER THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT LIKE PORT 21 : FTP PORT 23 : TELNET PORT 80 : HTTP PORT 25 : MAIL
HACKING TOOLS
THERE ARE MANY TOOLS ARE AVILABLE SCANNERS TELNET FTP LAN WATCH
SCANNERS
IT IS NOT A PHOTO SCANNER SCANNER IS PROGRAM THAT AUTOMATICALLY DETECTS SECURITY WEAKNESS IN REMOTE HOST PORT SCANNERS ARE USE IN HACKING PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN PORT ON THAT SYSTEM AND WHICH SERVICE IS RUNNING ON THAT IT CAN USE ALMOST ALL OPERATING SYSTEM EX. SATAN,NMAP
TELNET
TELNET IS ALTIMATE HACKING TOOL IT IS TERMINAL EMULATION PROGRAM THAT ALLOW US TO CONNECT TO REMOTE SYSTEM YOU HAVE TO FOLLOW THIS STEP TO USE TELNET C:\WINDOWS\TELNET [IP ADDRESS] PORT
FTP
FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS USE AS HACKING TOOL PORT 21 FOR THE FTP FOR CONNECTING FTP WE NEED SOME FTP S/W KNOWN AS FTP CLIENT FOR CONNECTING FTP SERVER YOU HAVE TO HAMMERING THAT SERVER COMMAND: C:\WINDOWS\FTP [IP ADDRESS]:PORT
LAN WATCH
LAN WATCH IS A SOFTWARE WHICH NOT ATTACK AND NOT DAMAGE REMOTE NETWORK BUT IT KEEP WATCH ON THE REMOTE NETWORK & GIVE ALL THE INFORMATION WHAT IS GOING ON THAT NETWORK
ATTACKS
THERE ARE MANY TYPES OF ATTACKS SPOOFING ATTACK TELNET BASED ATTACK DOS (Daniel of service) ATTACK PING OF DEATH DISTRIBUTED DOS ATTACK MAILBOMBS
TROJAN
WINDOWS TROJANS ARE SMALL ASPECT OF WINDOWS SECURUTY TROJAN IS UNOTHORIZED PROGRAM CONTAINED WITHIN A LEGIMATE PROGRAM THIS PROGRAM PERFORMS FUNCTION UNKNOWN BY USER
FIREWALL
FIREWALL IS ANY DEVICE USED TO PREVENT OUTSIDERS FROM GAINING ACCESS TO YOUR NETWORK TYPES OF FIREWALLS PACKET FILTER APPLICATION PROXY PACKET INSPECTION
CONCLUSION