SlideShare a Scribd company logo
HACKING MUHAMMAD FAIZ IZZUDDIN BIN DAUD
Definition of Hacking Hacker  is a term applied often to  computer software  or  computer hardware   programmers , designers and administrators, and especially those who are perceived as experts or highly accomplished   A hacker is also someone who modifies electronics, for example, harm radio transceivers, printers or even home sprinkler systems for extra functionality or performance. The term usually bears strong connotations, but may be either favorable or denigrating depending on cultural
Hackers Activities A  hacker  is  working with computers and  network  systems  Confidentiality, Integrity, and Access . This includes individuals who work toward maintaining and improving the integrity of such mechanisms. Sometimes they also gain anunauthorized access by  clever tactics and detailed knowledge, while taking advantage of any carelessness or ignorance on the part of system operators.
Great Hackers Many programmers have been labeled "great hackers," but the specifics of who that label applies to is a matter of opinion. Certainly major contributors to  computer science  such as  Edsger Dijkstra  and  Donald Knuth , as well as the inventors of popular software such as  Linus Torvalds  ( Linux ), and  Dennis Ritchie  and  Ken Thompson  (the  C programming language ) are likely to be included in any such list.
Planning A Hacking  Step 1. Reconnaissance In this first step, hackers employ extensive pre-operative surveillance to find out detailed information about an organization that will help them later gain unauthorized access to computer systems. The most common method is social engineering, or tricking an employee into revealing sensitive information (such as a telephone number or a password). Other methods include dumpster diving, or rifling through an organization’s trash to find sensitive information (such as floppy disks or important documents that have not been shredded). This step can be automated if the attacker installs on an office computer a virus, worm, or “Spyware” program that performs surveillance and then transmits useful information, such as passwords, back to the attacker. “ Spyware” is a form of malicious code that is quietly installed on a computer without user knowledge when a user visits a malicious web site. It may remain undetected by firewalls or current anti-virus security products while monitoring keystrokes to record web activity or collect snapshots of screen displays and other restricted information for transmission back to an unknown third party.
Step 2.Scanning Once in possession of special restricted information, or a few critical phone numbers, an attacker performs additional surveillance by scanning an organization’s computer software and network configuration to find possible entry points. This process goes slowly, sometimes lasting months, as the attacker looks for several vulnerable openings into a system.network and bypass firewall security. Anewer way of scanning for vulnerabilities is called “ War Driving”, where hackers drive randomly through a neighborhood trying to detect signals from business or home wireless networks. Once a network is detected, the hacker may park nearby and attempt to log on to gain free, unauthorized access. “ antiforensics tools” are now available on the Internet that allow hackers to more effectively hide their actions, and thus defeat more investigators who search for technical evidence of computer intrusions.  Step 3.Gaining Access Once the attacker has developed an inventory of software and configuration vulnerabilities on a target network, he or she may quietly take over a system and network by using a stolen password to create a phony account, or by exploiting a vulnerability that allows themto install amalicious Trojan Horse, or automatic “bot” that will await further commands sent through the Internet.
Step 4: Maintaining access Once an attacker has gained unauthorized access, he or she may secretly install extra malicious programs that allow them to return as often as they wish. These programs, known as “Root Kits” or “Back Doors”, run unnoticed and can allow an attacker to secretly access a network at will. If the attacker can gain all the special privileges of a system administrator, then the computer or network has been completely taken over, and is “owned” by the attacker. Sometimes the attacker will reconfigure a computer system, or install software patches to close the previous security vulnerabilities just to keep other hackers out. Step 5: Covering Tracks Sophisticated attackers desire quiet, unimpeded access to the computer systems and data they take over. They must stay hidden to maintain control and gather more intelligence, or to refine preparations to maximize damage.  The “Root Kit” or “Trojan Horse” programs often allow the attacker to modify the log files of the computer system, or to create hidden files to help avoid detection by the legitimate systemadministrator. Security systemsmay not detect the unauthorized activities of a careful intruder for a long period of time.
Affect of Hacking in Society Recently people become afraid to use credit card facilities in an internet due to a robbery of a credit card. Hackers also use their knowledge to crack a new software to be use for him/herself or to be sold as pirate vcd.
Reference "The Hacker Papers" in  Psychology Today  August 1980  USA Today Article  Wired Article  For example,  Theo de Raadt  and  Richard Stallman   http://www.softpanorama.org/People/Stallman/prophet.shtml

More Related Content

PPT
Computer Virus
PPTX
Hacking Vs Cracking in Computer Networks
PDF
PPT
Hacking Tutorial in Telugu
PPT
Computer security
PPTX
Security threats and safety measures
PPT
Internet Security
PPTX
SECURITY THREATS AND SAFETY MEASURES
Computer Virus
Hacking Vs Cracking in Computer Networks
Hacking Tutorial in Telugu
Computer security
Security threats and safety measures
Internet Security
SECURITY THREATS AND SAFETY MEASURES

What's hot (20)

PPTX
Tools and methods used in cybercrime
PPTX
Operating Systems: Computer Security
PPTX
Cyper security & Ethical hacking
PPT
Network Security Threats and Solutions
PPT
Tutorial 09 - Security on the Internet and the Web
 
PPT
Introduction to ethical hacking
PPTX
Hacking Presentation
PPTX
Internet security powerpoint
PPTX
Introduction To Ethical Hacking
PPTX
Types of cyber attacks
PPT
091005 Internet Security
PDF
Report on Hacking
PPTX
Security threats
PPTX
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
PPTX
Ethical hacking ppt
PDF
Research Paper - Hacker Plague
PPT
Tutorial 9 - Security on the Internet
 
PPTX
Network security presentation
PPT
New internet security
Tools and methods used in cybercrime
Operating Systems: Computer Security
Cyper security & Ethical hacking
Network Security Threats and Solutions
Tutorial 09 - Security on the Internet and the Web
 
Introduction to ethical hacking
Hacking Presentation
Internet security powerpoint
Introduction To Ethical Hacking
Types of cyber attacks
091005 Internet Security
Report on Hacking
Security threats
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Ethical hacking ppt
Research Paper - Hacker Plague
Tutorial 9 - Security on the Internet
 
Network security presentation
New internet security

Viewers also liked (10)

PPTX
The History Of I.T 2
PPT
Constraints In Sql
PPTX
PDF
What the hack?
PPTX
Data representation in computers
PPT
[1] Data Representation
PPT
Relational Algebra-Database Systems
PPT
Football a global sport
PDF
Relational Model and Relational Algebra - Lecture 3 - Introduction to Databas...
The History Of I.T 2
Constraints In Sql
What the hack?
Data representation in computers
[1] Data Representation
Relational Algebra-Database Systems
Football a global sport
Relational Model and Relational Algebra - Lecture 3 - Introduction to Databas...

Similar to Hacking (20)

PDF
What is a Hacker (part 2): How data is stolen
PPTX
Ethical hacking ppt
PPTX
Ethical Hacking
PPTX
Understanding advanced persistent threats (APT)
PPT
Cyber security and detailed informat.ppt
PPTX
hacking basics
PPTX
Dhams hacking
PPTX
Computer security
PPTX
Ethical hacking
PPTX
Ethical Hacking
PPTX
Security & threats Presentation => (Presenter: Komal Mehfooz)
PDF
The Basics of Protecting Against Computer Hacking
PPTX
Parag presentation on ethical hacking
PPT
Cybersecurity, Hacking, and Privacy
PPT
Ethical hacking
PPTX
Basics of hacking
PPT
Ethi mini1 - ethical hacking
PPTX
Introduction to Pre-Cybersecurity.pptx
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
DOCX
Ethical hacking
What is a Hacker (part 2): How data is stolen
Ethical hacking ppt
Ethical Hacking
Understanding advanced persistent threats (APT)
Cyber security and detailed informat.ppt
hacking basics
Dhams hacking
Computer security
Ethical hacking
Ethical Hacking
Security & threats Presentation => (Presenter: Komal Mehfooz)
The Basics of Protecting Against Computer Hacking
Parag presentation on ethical hacking
Cybersecurity, Hacking, and Privacy
Ethical hacking
Basics of hacking
Ethi mini1 - ethical hacking
Introduction to Pre-Cybersecurity.pptx
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Ethical hacking

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
Teaching material agriculture food technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
KodekX | Application Modernization Development
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Big Data Technologies - Introduction.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Teaching material agriculture food technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Understanding_Digital_Forensics_Presentation.pptx
KodekX | Application Modernization Development
sap open course for s4hana steps from ECC to s4
Big Data Technologies - Introduction.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm

Hacking

  • 1. HACKING MUHAMMAD FAIZ IZZUDDIN BIN DAUD
  • 2. Definition of Hacking Hacker is a term applied often to computer software or computer hardware programmers , designers and administrators, and especially those who are perceived as experts or highly accomplished A hacker is also someone who modifies electronics, for example, harm radio transceivers, printers or even home sprinkler systems for extra functionality or performance. The term usually bears strong connotations, but may be either favorable or denigrating depending on cultural
  • 3. Hackers Activities A hacker is working with computers and network systems Confidentiality, Integrity, and Access . This includes individuals who work toward maintaining and improving the integrity of such mechanisms. Sometimes they also gain anunauthorized access by clever tactics and detailed knowledge, while taking advantage of any carelessness or ignorance on the part of system operators.
  • 4. Great Hackers Many programmers have been labeled "great hackers," but the specifics of who that label applies to is a matter of opinion. Certainly major contributors to computer science such as Edsger Dijkstra and Donald Knuth , as well as the inventors of popular software such as Linus Torvalds ( Linux ), and Dennis Ritchie and Ken Thompson (the C programming language ) are likely to be included in any such list.
  • 5. Planning A Hacking Step 1. Reconnaissance In this first step, hackers employ extensive pre-operative surveillance to find out detailed information about an organization that will help them later gain unauthorized access to computer systems. The most common method is social engineering, or tricking an employee into revealing sensitive information (such as a telephone number or a password). Other methods include dumpster diving, or rifling through an organization’s trash to find sensitive information (such as floppy disks or important documents that have not been shredded). This step can be automated if the attacker installs on an office computer a virus, worm, or “Spyware” program that performs surveillance and then transmits useful information, such as passwords, back to the attacker. “ Spyware” is a form of malicious code that is quietly installed on a computer without user knowledge when a user visits a malicious web site. It may remain undetected by firewalls or current anti-virus security products while monitoring keystrokes to record web activity or collect snapshots of screen displays and other restricted information for transmission back to an unknown third party.
  • 6. Step 2.Scanning Once in possession of special restricted information, or a few critical phone numbers, an attacker performs additional surveillance by scanning an organization’s computer software and network configuration to find possible entry points. This process goes slowly, sometimes lasting months, as the attacker looks for several vulnerable openings into a system.network and bypass firewall security. Anewer way of scanning for vulnerabilities is called “ War Driving”, where hackers drive randomly through a neighborhood trying to detect signals from business or home wireless networks. Once a network is detected, the hacker may park nearby and attempt to log on to gain free, unauthorized access. “ antiforensics tools” are now available on the Internet that allow hackers to more effectively hide their actions, and thus defeat more investigators who search for technical evidence of computer intrusions. Step 3.Gaining Access Once the attacker has developed an inventory of software and configuration vulnerabilities on a target network, he or she may quietly take over a system and network by using a stolen password to create a phony account, or by exploiting a vulnerability that allows themto install amalicious Trojan Horse, or automatic “bot” that will await further commands sent through the Internet.
  • 7. Step 4: Maintaining access Once an attacker has gained unauthorized access, he or she may secretly install extra malicious programs that allow them to return as often as they wish. These programs, known as “Root Kits” or “Back Doors”, run unnoticed and can allow an attacker to secretly access a network at will. If the attacker can gain all the special privileges of a system administrator, then the computer or network has been completely taken over, and is “owned” by the attacker. Sometimes the attacker will reconfigure a computer system, or install software patches to close the previous security vulnerabilities just to keep other hackers out. Step 5: Covering Tracks Sophisticated attackers desire quiet, unimpeded access to the computer systems and data they take over. They must stay hidden to maintain control and gather more intelligence, or to refine preparations to maximize damage. The “Root Kit” or “Trojan Horse” programs often allow the attacker to modify the log files of the computer system, or to create hidden files to help avoid detection by the legitimate systemadministrator. Security systemsmay not detect the unauthorized activities of a careful intruder for a long period of time.
  • 8. Affect of Hacking in Society Recently people become afraid to use credit card facilities in an internet due to a robbery of a credit card. Hackers also use their knowledge to crack a new software to be use for him/herself or to be sold as pirate vcd.
  • 9. Reference "The Hacker Papers" in Psychology Today August 1980 USA Today Article Wired Article For example, Theo de Raadt and Richard Stallman http://www.softpanorama.org/People/Stallman/prophet.shtml