HACKING   Presented By..   Amit Kumar Pandey   MCA 4 TH  SEM
Introduction : Definition Types of Hacker Threats History of Hacking Ethical
Hackers Harmful behavior, Illegal access to computer, Wicked intention, Kind of electronically rebet robber, Breaker security system
Definition : “ A person who enjoy in learning the details of computer system & how to stretch their compatibility-as opposed to the most user of computer, who prefer to learn only the minimum amount necessary.” “ One who programmers enthusiastically or who enjoys programming rather then just theorizing about programming”
“ A person who – is an expert on enthusiast of creativity overcoming or circumventing limitation.” -Used as a compliment
Types of Hacking White Hat-  “ Ethical hacker who breaks security  but who does so far altruistic or at least- malicious reason. Clear defined code of ethics. Gray Hat-  “Ambiguous ethics” -”Borderline legality” Black Hat- ”Subvert computer security without  authorization. Uses technology for Terrorism,  Vandalism, identity theft, intellectual, proper theft……..
Types of Threats Attack on availability  Attack on confidentially Attack on integrity Attack on authentication
Attack on Confidentially Attacker listens communication Threats -Give away private information. -Spying password Ex. Spy ware source Destination Attacke r Normal information flow Intercepted information flow
Attack on Availability Interrupt communication channel Bring down destination Threats  ->System not available ->System not useable source destination
Attack on Integrity Attacker modifies the information and send to channel Threats Systems are not confidential source Destination Attacker Normal information flow Intercepted information flow
Attack on Authenticity Attacker fakes identity & insert counterfeit object on system. Threats - System not confidential - No one sure to communicate with right  partner Ex. Forget password source Destination Attacker Normal information flow Forget information
Real threats Loss of confidential information Viruses & worms Remote administration of system Defected web site & Security system. Cyber war ???
Defected website
Information Gathering More information about any organization is good for hacker to attack. Way to gather information. --port scan --ping sweep --social engineering
Social Engineering Attacker tries to convince some one to give about information, password…… Most innocent question  --what is phone number/ IP address… --Know abut Administrating person, for N/W --Network structure
History of Hacking 1970 Attack on American telephone system. ---John Draper found a whistle that produces 2600 Hz tone ---Tone used for signaling ---Together with his friend he develop a “Blue Box" which simulates a telephone operator's dialing console ---In combination he had the possibility to make free calls Cond..
1982 ---Teenage hacker group 414broke into 60 computer system, including Los Alamos laboratories 1988 ---Kevin Mitnick secretly monitor’s the e-mail of the security officials ---sentenced for one year of jail Cond…
1988  first computer worms in the internet is developed by “Robert morries” .Wanted to know about the size of ARPA net. He is the  first person indicted under the computer fraud. --3 years probation. --400 hours community service --fine $10,050 & cost of his supervision Cond..
1988 -- First National Bank of Chicago become victim of $70 million computer theft 1989 --hackers were arrested in western Germany --broke into US government &corporate computers --Sold operating system source code to soviet KGB Cond..
2000 &2003 ---Hackers broke into Microsoft’s corporate networks & stole Windows & Office source code ---”I LOVE YOU “ virus spread over the internet & infected image and sound files --18 year old arrested for developing & releasing B variant of the blaster warms
Ethical Hacking  Breaking system into  by order of owner Skills:- (1). Completely trustworthy (2).Strong programming & networking ability (3). Vast Knowledge of Software & Hardware  (4). Good understanding of security (5).System management skill. Cond…
Goals :- --Finding security holes, gather information Analysis of Tools security administrator tools for network analysis
Thank You

More Related Content

PPTX
Hacking
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPTX
Haking PPT
PPT
PPTX
Is hacking good or bad
PPTX
Hacking
PDF
What is Hacking? AND Types of Hackers
PPTX
Hacking
Hacking
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Haking PPT
Is hacking good or bad
Hacking
What is Hacking? AND Types of Hackers
Hacking

What's hot (20)

PPTX
Hackers
PPTX
how to prevent system from hacking...by sarika
PPTX
PPT
Hacking version 2
PPTX
Hacking
PPTX
Hacker&cracker
PPTX
Hacking (cs192 report )
PPTX
Hacking ppt
PPT
All about Hacking
DOC
Kinds of hackers
PDF
Hacking
PPTX
Hacking (basic)
PPT
H A C K I N Gjk,K
PPT
Ethical Hacking
PPTX
Hacking
PPTX
Hacking & Hackers
PPTX
Hacking & Attack vector
PPT
Cybercrime 1
PPTX
Ethical Hacking
PDF
Hacking
Hackers
how to prevent system from hacking...by sarika
Hacking version 2
Hacking
Hacker&cracker
Hacking (cs192 report )
Hacking ppt
All about Hacking
Kinds of hackers
Hacking
Hacking (basic)
H A C K I N Gjk,K
Ethical Hacking
Hacking
Hacking & Hackers
Hacking & Attack vector
Cybercrime 1
Ethical Hacking
Hacking

Viewers also liked (20)

PPT
Evaporation New Template
PPTX
Evaporation
PPTX
What is hacking | Types of Hacking
PPT
Basic Introduction to hacking
PPTX
Cybercrime (Computer Hacking)
PDF
Hacking Movable Type
PPTX
Internet and personal privacy
PPTX
Hacking 1
PPTX
Soil Steady-State Evaporation
PPTX
Group 4 (evaporation)
PPTX
Science - Evaporation
PPTX
AMAZING COMPUTER TRICKS
PPT
Water evaporation reduction from lakes
PDF
CFD-based Evaporation Estimation Approach
PPT
Hacking And EthicalHacking By Satish
PDF
Hacking sites for fun and profit
PDF
Evaporation 4 slides
PPTX
hacking and its types
PPTX
Hacking
PPT
Evaporation
Evaporation New Template
Evaporation
What is hacking | Types of Hacking
Basic Introduction to hacking
Cybercrime (Computer Hacking)
Hacking Movable Type
Internet and personal privacy
Hacking 1
Soil Steady-State Evaporation
Group 4 (evaporation)
Science - Evaporation
AMAZING COMPUTER TRICKS
Water evaporation reduction from lakes
CFD-based Evaporation Estimation Approach
Hacking And EthicalHacking By Satish
Hacking sites for fun and profit
Evaporation 4 slides
hacking and its types
Hacking
Evaporation

Similar to Hacking (20)

PPT
Hacking
PPT
Course on Ehtical Hacking - Introduction
PDF
Unit ii-hackers and cyber crimes
PDF
Hackers and cyber crimes
PPTX
PPTX
PPT
Ethical hacking
PPTX
PPT
Ethical hacking presentation_october_2006
PPT
Hacking
PPTX
Ethical hacking
PPT
Hacking And Its Prevention
PPTX
Cybercrime (Computer Hacking)
PPTX
Ethical Hacking
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
presentation on hacking
PPT
Hacking 1224807880385377-9
PPTX
Hacking (1)
PPT
hacking
Hacking
Course on Ehtical Hacking - Introduction
Unit ii-hackers and cyber crimes
Hackers and cyber crimes
Ethical hacking
Ethical hacking presentation_october_2006
Hacking
Ethical hacking
Hacking And Its Prevention
Cybercrime (Computer Hacking)
Ethical Hacking
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
presentation on hacking
Hacking 1224807880385377-9
Hacking (1)
hacking

More from Amit Pandey (9)

PPT
PPT
PPT
Learning
PPT
Some Characteristics Of Dqdb
PPT
Routing
PPT
Biomatrics
PPT
PPT
Job Analysis
PPTX
The Osi Model
Learning
Some Characteristics Of Dqdb
Routing
Biomatrics
Job Analysis
The Osi Model

Hacking

  • 1. HACKING Presented By.. Amit Kumar Pandey MCA 4 TH SEM
  • 2. Introduction : Definition Types of Hacker Threats History of Hacking Ethical
  • 3. Hackers Harmful behavior, Illegal access to computer, Wicked intention, Kind of electronically rebet robber, Breaker security system
  • 4. Definition : “ A person who enjoy in learning the details of computer system & how to stretch their compatibility-as opposed to the most user of computer, who prefer to learn only the minimum amount necessary.” “ One who programmers enthusiastically or who enjoys programming rather then just theorizing about programming”
  • 5. “ A person who – is an expert on enthusiast of creativity overcoming or circumventing limitation.” -Used as a compliment
  • 6. Types of Hacking White Hat- “ Ethical hacker who breaks security but who does so far altruistic or at least- malicious reason. Clear defined code of ethics. Gray Hat- “Ambiguous ethics” -”Borderline legality” Black Hat- ”Subvert computer security without authorization. Uses technology for Terrorism, Vandalism, identity theft, intellectual, proper theft……..
  • 7. Types of Threats Attack on availability Attack on confidentially Attack on integrity Attack on authentication
  • 8. Attack on Confidentially Attacker listens communication Threats -Give away private information. -Spying password Ex. Spy ware source Destination Attacke r Normal information flow Intercepted information flow
  • 9. Attack on Availability Interrupt communication channel Bring down destination Threats ->System not available ->System not useable source destination
  • 10. Attack on Integrity Attacker modifies the information and send to channel Threats Systems are not confidential source Destination Attacker Normal information flow Intercepted information flow
  • 11. Attack on Authenticity Attacker fakes identity & insert counterfeit object on system. Threats - System not confidential - No one sure to communicate with right partner Ex. Forget password source Destination Attacker Normal information flow Forget information
  • 12. Real threats Loss of confidential information Viruses & worms Remote administration of system Defected web site & Security system. Cyber war ???
  • 14. Information Gathering More information about any organization is good for hacker to attack. Way to gather information. --port scan --ping sweep --social engineering
  • 15. Social Engineering Attacker tries to convince some one to give about information, password…… Most innocent question --what is phone number/ IP address… --Know abut Administrating person, for N/W --Network structure
  • 16. History of Hacking 1970 Attack on American telephone system. ---John Draper found a whistle that produces 2600 Hz tone ---Tone used for signaling ---Together with his friend he develop a “Blue Box" which simulates a telephone operator's dialing console ---In combination he had the possibility to make free calls Cond..
  • 17. 1982 ---Teenage hacker group 414broke into 60 computer system, including Los Alamos laboratories 1988 ---Kevin Mitnick secretly monitor’s the e-mail of the security officials ---sentenced for one year of jail Cond…
  • 18. 1988 first computer worms in the internet is developed by “Robert morries” .Wanted to know about the size of ARPA net. He is the first person indicted under the computer fraud. --3 years probation. --400 hours community service --fine $10,050 & cost of his supervision Cond..
  • 19. 1988 -- First National Bank of Chicago become victim of $70 million computer theft 1989 --hackers were arrested in western Germany --broke into US government &corporate computers --Sold operating system source code to soviet KGB Cond..
  • 20. 2000 &2003 ---Hackers broke into Microsoft’s corporate networks & stole Windows & Office source code ---”I LOVE YOU “ virus spread over the internet & infected image and sound files --18 year old arrested for developing & releasing B variant of the blaster warms
  • 21. Ethical Hacking Breaking system into by order of owner Skills:- (1). Completely trustworthy (2).Strong programming & networking ability (3). Vast Knowledge of Software & Hardware (4). Good understanding of security (5).System management skill. Cond…
  • 22. Goals :- --Finding security holes, gather information Analysis of Tools security administrator tools for network analysis