Академический Документы
Профессиональный Документы
Культура Документы
Abstract Introduction Hackers Why Hackers Hack Types of Hacking And Cracking Ethical Hacking General Awareness Conclusion References
2
The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail ,online banking etc; As with most technological advances, there is also a Dark side: criminal hackers.
Hackers
Access computer system or network
without authorization.
Breaks the law; may go to prison.
Crackers
Break into systems to steal or
destroy data.
U.S. Department of Justice calls
both hackers.
Ethical hacker
Performs most of the same activities
Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring and Learning how Computer systems operate. Recently, Hacker has taken on a new meaning someone who maliciously breaks into systems for personal gain. Crackers break into malicious intentions. systems with
6
Criminal Hackers or Crackers who use their skills and knowledge for illegal or malicious purposes. White Hat Hacker: A White Hat Hacker is computer guy who perform Ethical Hacking. These are usually security professionals with knowledge of hacking and the Hacker toolset and who use this knowledge to locate security weaknesses and implement countermeasures in the resources.
The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers they just hack to see what they can hack and what they cant hack, usually by testing their own systems. Many Hackers are the guys who get kicked out of corporate and government IT and security organizations. They try to bring down the status of the organization by attacking or stealing information. 8
Phishing Trojans Ip Spoofing Cyber Terrorist Windows Hacking & Security Software Cracking & Patching
out
Phishing is a way of attempting to acquire information such as usernames , passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
10
Read all the Email Carefully and Check if the Sender is Original Watch the Link Carefully before Clicking. Always check the URL in the Browser before Signing IN to your Account
11
The term is derived from the TrojanHorse story in Greek mythology. Trojan may allow a hacker remote access to a target computer system. Once a Trojan has been installed on a target computer system, a hacker may have access to the computer remotely and perform various operations, limited by user privileges on the target computer system and the design of the Trojan.
12
NEVER download blindly from people or sites which you aren't 100% sure about. Even if the file comes from a friend, you still must be sure what the file is before opening it. NEVER use features in your programs that automatically get or preview files. Anti-Virus Software
13
Spoofing is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. Ex:Sites www.hidemyass.com
14
There are Hackers called Cyber Terrorists, who attack Government computers or public utility infrastructures, such as power stations and air-traffic-control towers . They crash critical systems or steal classified government information. While in a conflict with enemy countries some government start Cyber war via Internet.
15
16
17
A reverse engineer requires a deep understanding of both the hardware and the software, and how it all works together. A Debugger is a software program that attaches to and controls other software programs. A debugger allows single stepping of code, debug tracing, setting breakpoints, and viewing variables and memory state in the target program as it executes in a stepwise fashion. Debuggers are invaluable in determining logical program flow. Olly Debugger, Soft Ice, IDA Pro are some of the very famous Software Debuggers. 18
19
20
Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems. Ethical hackers typically have very strong programming and computer networking skills. Ethical Hacking is testing the resources for a good cause and for the betterment of technology.
21
Ethical hackers
Employed by companies to perform penetration tests
Penetration test
Legal attempt to break into a companys network to find
it weakest link
Tester only reports findings, does not harm the company
22
OphCrack Backtrack
Key logger's
Some tricks
23
24
25
Ethical Hacking is just a security system or tool for security to safe your data it is not an ultimate solution of problem. To test the security and the other functionalities of product is not new. But in the early stages of Internet no one know about Ethical Hacking even about hacking, but with the passage of time people are more concern about the security of their data, especially due to hackers. Time to time assessment, prepared interference recognition, good system administration performance and computer safety knowledge are all very vital part of a firms or companys security system. 26
Web Resources:
http://www.netsecurity.org/
Hacker Motives:
Technology: http://en.wikipedia.org/wiki/Ethical_Hacker
27
Queries
28
THANK YOU
29