SlideShare a Scribd company logo
HACKING
The Art Of Exploitation
What is Hacking
Hacking refers to the activities which are done to intrude someone else’s personal
information so as to use it for malicious,unwanted purpose
OR
Hacking is a term which refer to the activities aimed to exploiting security amind to
exploiting security flaws to obtain personal information for gaining access to secured
network
Overview of Hacking
● Hack
➔ The rapid crafting of a new program or the making of changes to
existing,usually complicated software
● Hacker
➔ The Person who hacks
● Cracker
➔ System destroyer
Contents
● Who is hacker
● History of Hacking
● Types of Hacking
● Hacking accidents
● Why do hacker hack ?
● What hacker do after hacking ?
● What do hacker know ?
Who is hacker ?
● Hack
○ Cut with repeated irregular blows
○ Examine something very minutely
● Hacker
○ The person who hacks
● Cracker
○ System intruder/destroyer
● Hacker means cracker now days
○ Meaning has been changed
What is Hacker
A Hacker is someone who likes to tinker with electronics
computer system.Hacker like to explore and learn how computer
system work,finding ways to make them do what they do
better,or do things they weren’t intended to do Hcakers
History of Hacking
● 1960-1970
○ Good hack especially clever program code
● 1970-1990
○ Breaking in to computer became very easy
● 1990-present
○ www.developed & internet grow exponentially
○ Hacking can be writing a program for enjoyment
○ Hacking can also be done to perform reverse engineering of software where source code is lost
Types of Hacking
Interruption Interception
Modification Fabrication
Hacking Accidents
● Internet Worm
○ Robert T.Morris made an internet worm.It spread through the internet and crashed about 6000
system
● IP Spoof
○ Kevin Mitnick was caught by TSutomu Shimomura who was security expert.Kelvin uses the IP
Spoof attack in this accident
○ Internet Worm
● Cuckoo’s Egg
○ Clifford stoll caught the hacker who are the German hacker applied by KGB
Why do Hacker Hack?
● Just for fun
● Show off
● Hack other system secretly
● Notify many people their thought
● Steal important information
● Destroy enemy's computer network during the war
What do the Hacker do after hacking
● Patch security hole
○ The other hacker can’t intrude
● Clear logs and hide themselves
● Install rootkit(backdoor)
○ The hacker who hacked the system can use the system later
○ It consist trojan ls,ps and so on
● Install irc related program
○ identd ,irc,bitchx.eggdrop.bnc
● Install exploit porgram
● Install denial of service program
● Use all installed programs silently
What do Hacker Know
● Know how to intrude the system
● Know to crash the system
● Know where the hacking program are
How can protect the system ?
● Patch security hole often
● Encrypted important data
○ Ex:- pgp.ssh
● Do not run unused daemon Remove unused demon
● Remove unused setuid/setuid program
● Setup loghost
● Use switch hub
● Setup firewall
○ Ex ipchains
● Setup IDS
○ Ex:- snort
How can protect the system ?
● Backup the system often
What should do after hacked
● Shutdown the system
● Separate the system from network
● Restore the system with the backup
● Connect the system to the network
● It can be good to call the police
Thank You
If you have any question please don't feel hesitate to ask!
Shubham Choudhary

More Related Content

PPT
Hacking Question and Answer
PDF
Cryto Party at CCU
PDF
Internet of Things - Breaking 20 devices in 20 minutes preview
PDF
Weaponization of IoT
ODP
wanna be h4ck3r !
PPTX
ethical Hacking [007]
PDF
Sw2 b12
ODP
Key and cipher overview
Hacking Question and Answer
Cryto Party at CCU
Internet of Things - Breaking 20 devices in 20 minutes preview
Weaponization of IoT
wanna be h4ck3r !
ethical Hacking [007]
Sw2 b12
Key and cipher overview

What's hot (19)

PDF
S Dweek12
PPT
cryptography deepan fav subject
PDF
Protect Your Data Now
PPTX
Ethical hacking
PPT
Uzair ppt
PPTX
Dark web by Pranesh Kulkarni
PPS
Information security in the starbucks generation
PDF
Tor project and Darknet Report
PPTX
Dark web
PPT
Hacking
ODP
Cybersecurity
PDF
y3dips - Who Own Your Sensitive Information?
PDF
Securing blockchain assets
PDF
PPTX
Computer security
KEY
Computer crime hacking
PPTX
Hacking & Attack vector
PPTX
Alice and bob: Love & the most important crypto on the net
PDF
Hyper Island - 2012
S Dweek12
cryptography deepan fav subject
Protect Your Data Now
Ethical hacking
Uzair ppt
Dark web by Pranesh Kulkarni
Information security in the starbucks generation
Tor project and Darknet Report
Dark web
Hacking
Cybersecurity
y3dips - Who Own Your Sensitive Information?
Securing blockchain assets
Computer security
Computer crime hacking
Hacking & Attack vector
Alice and bob: Love & the most important crypto on the net
Hyper Island - 2012

Similar to Hacking its types and the art of exploitation (20)

ODP
Introduction To Hacking
PPT
Hacker
PPTX
Ethical hacking
PPTX
Ethical Hacking.pptx Hacker Presentation
PPTX
Ethical hacking
PPTX
Ethical Hacking - An Overview
PPTX
Inetsecurity.in Ethical Hacking presentation
ODP
Ethical hacking ppt
PPTX
Ethical hacking.pptx
PPTX
Ethical hacking ppt by shantanu arora
PPTX
Jaishreeethicalhackingppt-171011183223.pptx
PPTX
Presentation on Ethical Hacking ppt
PPTX
Ethical Hacking Redefined
PPTX
How to hack or what is ethical hacking
PDF
Introduction of hacking and cracking
PPTX
sourabh_sipPPT.pptx
ODP
Hit by a Cyberattack: lesson learned
PPTX
Summer training in jaipur
PPTX
Hacking intro
PPTX
Ethical hacking and cyber security intro
Introduction To Hacking
Hacker
Ethical hacking
Ethical Hacking.pptx Hacker Presentation
Ethical hacking
Ethical Hacking - An Overview
Inetsecurity.in Ethical Hacking presentation
Ethical hacking ppt
Ethical hacking.pptx
Ethical hacking ppt by shantanu arora
Jaishreeethicalhackingppt-171011183223.pptx
Presentation on Ethical Hacking ppt
Ethical Hacking Redefined
How to hack or what is ethical hacking
Introduction of hacking and cracking
sourabh_sipPPT.pptx
Hit by a Cyberattack: lesson learned
Summer training in jaipur
Hacking intro
Ethical hacking and cyber security intro

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Electronic commerce courselecture one. Pdf
PPTX
Cloud computing and distributed systems.
PPTX
sap open course for s4hana steps from ECC to s4
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
20250228 LYD VKU AI Blended-Learning.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectral efficient network and resource selection model in 5G networks
Electronic commerce courselecture one. Pdf
Cloud computing and distributed systems.
sap open course for s4hana steps from ECC to s4
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Dropbox Q2 2025 Financial Results & Investor Presentation
Per capita expenditure prediction using model stacking based on satellite ima...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Spectroscopy.pptx food analysis technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
NewMind AI Weekly Chronicles - August'25 Week I
Understanding_Digital_Forensics_Presentation.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Hacking its types and the art of exploitation

  • 1. HACKING The Art Of Exploitation
  • 2. What is Hacking Hacking refers to the activities which are done to intrude someone else’s personal information so as to use it for malicious,unwanted purpose OR Hacking is a term which refer to the activities aimed to exploiting security amind to exploiting security flaws to obtain personal information for gaining access to secured network
  • 3. Overview of Hacking ● Hack ➔ The rapid crafting of a new program or the making of changes to existing,usually complicated software ● Hacker ➔ The Person who hacks ● Cracker ➔ System destroyer
  • 4. Contents ● Who is hacker ● History of Hacking ● Types of Hacking ● Hacking accidents ● Why do hacker hack ? ● What hacker do after hacking ? ● What do hacker know ?
  • 5. Who is hacker ? ● Hack ○ Cut with repeated irregular blows ○ Examine something very minutely ● Hacker ○ The person who hacks ● Cracker ○ System intruder/destroyer ● Hacker means cracker now days ○ Meaning has been changed
  • 6. What is Hacker A Hacker is someone who likes to tinker with electronics computer system.Hacker like to explore and learn how computer system work,finding ways to make them do what they do better,or do things they weren’t intended to do Hcakers
  • 7. History of Hacking ● 1960-1970 ○ Good hack especially clever program code ● 1970-1990 ○ Breaking in to computer became very easy ● 1990-present ○ www.developed & internet grow exponentially ○ Hacking can be writing a program for enjoyment ○ Hacking can also be done to perform reverse engineering of software where source code is lost
  • 8. Types of Hacking Interruption Interception Modification Fabrication
  • 9. Hacking Accidents ● Internet Worm ○ Robert T.Morris made an internet worm.It spread through the internet and crashed about 6000 system ● IP Spoof ○ Kevin Mitnick was caught by TSutomu Shimomura who was security expert.Kelvin uses the IP Spoof attack in this accident ○ Internet Worm ● Cuckoo’s Egg ○ Clifford stoll caught the hacker who are the German hacker applied by KGB
  • 10. Why do Hacker Hack? ● Just for fun ● Show off ● Hack other system secretly ● Notify many people their thought ● Steal important information ● Destroy enemy's computer network during the war
  • 11. What do the Hacker do after hacking ● Patch security hole ○ The other hacker can’t intrude ● Clear logs and hide themselves ● Install rootkit(backdoor) ○ The hacker who hacked the system can use the system later ○ It consist trojan ls,ps and so on ● Install irc related program ○ identd ,irc,bitchx.eggdrop.bnc ● Install exploit porgram ● Install denial of service program ● Use all installed programs silently
  • 12. What do Hacker Know ● Know how to intrude the system ● Know to crash the system ● Know where the hacking program are
  • 13. How can protect the system ? ● Patch security hole often ● Encrypted important data ○ Ex:- pgp.ssh ● Do not run unused daemon Remove unused demon ● Remove unused setuid/setuid program ● Setup loghost ● Use switch hub ● Setup firewall ○ Ex ipchains ● Setup IDS ○ Ex:- snort
  • 14. How can protect the system ? ● Backup the system often
  • 15. What should do after hacked ● Shutdown the system ● Separate the system from network ● Restore the system with the backup ● Connect the system to the network ● It can be good to call the police
  • 16. Thank You If you have any question please don't feel hesitate to ask! Shubham Choudhary