Introduction to Hacking
Introduction to Hacking What is hacking
WHAT IS NETWORK SECURITY?
- Security is much larger than just packets, firewalls, and hackers. Security includes:
–Policies and procedures
–Liabilities and laws
–Human behavior patterns
–Corporate security programs and implementation
–Technical aspects- firewalls, intrusion detection systems, proxies, encryption, antivirus software, hacks, cracks, and attacks
- Understanding hacking tools and how attacks are carried out is only one piece of the puzzle.
Hacking
- THE PROCESS OF ATTEMPTING TO GAIN OR SUCCESSFULLY GAINING,UNOTHORIZED ACCESS TO COMPUTER RESOURCES FOR THE PURPOSE OF HELP OR SECURE SYSTEM IS CALLED HACKING
HISTORY OF HACKING
- 1966 – ROBERT MORRIS INTRODUCES THE CONCEPT OF SAFE HACKING.
- 1969 – DEVELOPMENT IN THE FIELD OF HACKING.
- 1990 – ELECTRONIC FRONTIER FOUNDATION WAS FOUNDED.
- 1995 – MARK ANDREESSON & ERIC RELEASE MOSAIC.
WHO IS HACKER?
HACKER IS NOT CYBER CRIMINAL BUT HE IS THE VERY INTELLIGENT PERSON WHO USES HIS KNOWLEDGE IN CONSTRUCTIVE MANNER TO SECURE SYSTEM & NEVER DAMAGE DATA
HE KNOWS ALL ABOUT THE OPERATING SYSTEM & DIFFERENT HOLES IN THE SYSTEM
WHO IS CRACKER?
- PERSON WHO ENTER INTO OTHER’S SYSTEM AND VIOLET THE SYSTEM,DAMAGE THE DATA,CREATE HAVOC IS CALLED CRACKER
- CRACKER IS CYBER CRIMINAL
- THEY CAN BE EASILY IDENTIFIED BECAUSE THEIR ACTIONS ARE MALICIOUS
WHY DO CRACKERS EXIST?
- CRACKERS EXIST BECAUSE HUMAN NATURE IS JUST SO,FREQUENTLY DRIVEN BY TO DESTROY INSTEAD OF CREATE
- THEY ARE USED FOR DIFFERENT PURPOSES LIKE FOR PROFIT,SOME COMPANY USE THEM FOR DISABLING THE COMPITITOR COMPANY, FOR CRACKING CREDIT CARD NUMBER
DIFFERENCE BETWEEN HACKER & CRACKER
- HACKER’S PROGRAMS TO CHECK INTIGRITY OF OTHER PROGRAMS.THUS WHEN HACKERS CREATE PROGRAM IT AUTOMATICALLY CHECKS REMOTE MACHINE SECURITY STRUCTURE
- THEY ALWAYS DO CONTRUCTIVE WORK
- CRACKERS RARELY MAKE THEIR OWN PROGRAM .INSTEAD ,THEY STEAL TOOL,PROGRAMS FROM OTHERS
- CRACKERS CREATES NOTHING & DESTROY MUCH
WHICH OPERATING SYSTEM HACKER USE
- SUN
- UNIX
- MICROSOFT
SUN
HACKERS Use EITHER SOLARIC X86 OR SCO AS A PLATFORM.
THIS IS BECAUSE THESE PRODUCTS ARE LICENSED WARE & THEY CAN EASILY BE OBTAINED.
UNIX
- POPULAR PLATFORM BECAUSE THEY REQUIRED A LOW OVERHEAD.
- WE CAN RUN LINUX ON A PALTRAY 386 AND GAIN GOOD PERFORMANCE.
- THIS IS REASONABLE.
MICROSOFT
- THIS SUPPORTS MANY SECURITY TOOLS THAT CAN BE USED TO ATTACK REMOTE MACHINE.
- IT HAS ADVANCED TOOLS FOR NETWORKING AS WELL.
WHY DO PEOPLE HACK ?
- JUST FOR FUN.
- SHOW OF THEIR KNOWLEDGE.
- HACK OTHER SYSTEM SECRETLY.
- DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.
- FOR PROFIT PEOPLE PAYS A CRACKER.
- CRACK FOR SAKE OF CURIOCITY.
THE PSYCOLOGY OF HACKERS
- ALL INFORMATION SHOULD BE FREE.
- ACCESS TO COMPUTER SHOULD BE UNLIMITED AND FREE.
- IT CAN CHANGE LIFE FOR BETTER.
- IT CAN CREATE BEAUTY ON COMPUTER.
TYPES OF HACKING
THERE ARE MANY TYPES OF HACKING
LIKE
- PASSWORD HACKING
- SOFTWARE HACKING
- NET HACKING
PASSWORD HACKING
TWO TYPES
1.BRUTE FORCE
- IN THAT CASE HACKERS TRY OUT ALL THE COMBINATION OF ALL KEYBOARD LETTERS .IT HAS GRATER SUCCESS BUT IT TAKES LONG TIME
2.DICTIONARY BASED
- IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS UNSUCCESSFUL METHOD
SOFTWARE HACKING
- IN THAT HACKERS CHANGES THE LOOK & EXCUTION WAY OF THAT SOFTWARE
- CHANG THE DEMO VERSION INTO FULL VERSION BY DECODING THE SOURCE CODE
IP ADDRESS
- IP ADDRESS IS THE ADDRESS OF YOUR COMPUTER IN THE INTERNET
- IT IS UNIQ
- LIKE 192.168.23.45
PORT
- IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR COMPUTER
- IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER CAN ENTER
- THERE ARE THOUSANDS OF PORTS INTO COMPUTER
- THE PERTICULAR SERVICE IS RUNNING ON PERTICULAR PORT
- LIKE
PORT 21 : FTP
PORT 23 : TELNET
PORT 80 : HTTP
PORT 25 : MAIL
HACKING TOOLS
THERE ARE MANY TOOLS ARE AVILABLE
- SCANNERS
- TELNET
- FTP
- LAN WATCH
SCANNERS
- IT IS NOT A PHOTO SCANNER
- SCANNER IS PROGRAM THAT AUTOMATICALLY DETECTS SECURITY WEAKNESS IN REMOTE HOST
- PORT SCANNERS ARE USED IN HACKING
- PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN PORT ON THAT SYSTEM AND WHICH SERVICE IS RUNNING ON THAT
- IT CAN USE ALMOST ALL OPERATING SYSTEM
- EX. SATAN,NMAP
TELNET
- TELNET IS ULTIMATE HACKING TOOL
- IT IS TERMINAL EMULATION PROGRAM THAT ALLOWS US TO CONNECT TO REMOTE SYSTEM
- YOU HAVE TO FOLLOW THIS STEP TO USE TELNET
C:\WINDOWS\TELNET [IP ADDRESS] PORT
FTP
- FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS USED AS HACKING TOOL
- PORT 21 FOR THE FTP
- FOR CONNECTING FTP WE NEED SOME FTP S/W KNOWN AS FTP CLIENT
- FOR CONNECTING FTP SERVER YOU HAVE TO HAMMER THAT SERVER
- COMMAND:
C:\WINDOWS\FTP [IP ADDRESS]:PORT
WHY DO PEOPLE HACK ?
- JUST FOR FUN.
- SHOW OF THEIR KNOWLEDGE.
- HACK OTHER SYSTEM SECRETLY.
- DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR.
- FOR PROFIT PEOPLE PAYS A CRACKER.
- CRACK FOR SAKE OF CURIOCITY.
THE PSYCOLOGY OF HACKERS
- ALL INFORMATION SHOULD BE FREE.
- ACCESS TO COMPUTER SHOULD BE UNLIMITED AND FREE.
- IT CAN CHANGE LIFE FOR BETTER.
- IT CAN CREATE BEAUTY ON COMPUTER.
TYPES OF HACKING
THERE ARE MANY TYPES OF HACKING
LIKE
- PASSWORD HACKING
- SOFTWARE HACKING
- NET HACKING
PASSWORD HACKING
TWO TYPES
1.BRUTE FORCE
- IN THAT CASE HACKERS TRY OUT ALL THE COMBINATION OF ALL KEYBOARD LETTERS .IT HAS GRATER SUCCESS BUT IT TAKES LONG TIME
2.DICTIONARY BASED
- IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS UNSUCCESSFUL METHOD
SOFTWARE HACKING
- IN THAT HACKERS CHANGES THE LOOK & EXCUTION WAY OF THAT SOFTWARE
- CHANG THE DEMO VERSION INTO FULL VERSION BY DECODING THE SOURCE CODE
IP ADDRESS
- IP ADDRESS IS THE ADDRESS OF YOUR COMPUTER IN THE INTERNET
- IT IS UNIQ
- LIKE 192.168.23.45
PORT
- IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR COMPUTER
- IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER CAN ENTER
- THERE ARE THOUSANDS OF PORTS INTO COMPUTER
- THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT
- LIKE
PORT 21 : FTP
PORT 23 : TELNET
PORT 80 : HTTP
PORT 25 : MAIL
HACKING TOOLS
THERE ARE MANY TOOLS ARE AVILABLE
- SCANNERS
- TELNET
- FTP
- LAN WATCH
SCANNERS
- IT IS NOT A PHOTO SCANNER
- SCANNER IS PROGRAM THAT AUTOMATICALLY DETECTS SECURITY WEAKNESS IN REMOTE HOST
- PORT SCANNERS ARE USED IN HACKING
- PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN PORT ON THAT SYSTEM AND WHICH SERVICE IS RUNNING ON THAT
- IT CAN USE ALMOST ALL OPERATING SYSTEM
TELNET
- TELNET IS ULTIMATE HACKING TOOL
- IT IS TERMINAL EMULATION PROGRAM THAT ALLOWS US TO CONNECT TO REMOTE SYSTEM
- YOU HAVE TO FOLLOW THIS STEP TO USE TELNET
C:\WINDOWS\TELNET [IP ADDRESS] PORT
FTP
- FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS USED AS HACKING TOOL
- PORT 21 FOR THE FTP
- FOR CONNECTING FTP WE NEED SOME FTP S/W KNOWN AS FTP CLIENT
- FOR CONNECTING FTP SERVER YOU HAVE TO HAMMER THAT SERVER
- COMMAND:
C:\WINDOWS\FTP [IP ADDRESS]:PORT