Você está na página 1de 19

Hacking

Prepared by: Divyesh Patel(10ec45) 4thEC

INDEX
Introduction History Hacker & Cracker Difference between hacker & cracker Which operating system hacker use?

Why do people hack?


Psycology of hackers Types of hacking

Need for security


Presentation_ID
2003 Cisco Systems, Inc. All rights reserved.

Introduction
Hacking is technique in which any one can access any ones computer without his permission The process of attempting any one computer resources for the purpose of help or secure system is called hacking.

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

History
1966 Robert Morric introduces the concept of safe hacking. 1969 Development in the field of hacking. 1990 Electronic Frontier Foundation was founded.

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

Who is Hacker?
A hacker is someone who gains unauthorized access to a computer system. Many hackers just like the challenge of breaking through a computer security system but not all hackers are harmless. It must also be said that not all hackers are bad. Government and huge companies use hackers to maintain their security systems. Hacker is not cyber criminal.
Presentation_ID
2003 Cisco Systems, Inc. All rights reserved.

Who is Cracker?
Person who enter into others system and violet the data is called Cracker. Cracker is cyber criminal. They can be easily identified because their actions are malicious.

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

Why do Crackers exist?


Crackers are exist because human nature is just so, frequently driven by to destroy instead of create. They are use for different purpose like for profit, some company use them for disable the competitor company, for cracks credit card number.

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

Difference between hacker & cracker


Hackers programs to check integrity of other programsThus when hacker create program it automatically check remote machine security structure They always do constructive work crackers rarely make their own program instead ,they steal tools,programms from others

crackers creates nothing & destroy much

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

Which operating system hacker use?


SUN

UNIX
MICROSOFT

Conti
Presentation_ID
2003 Cisco Systems, Inc. All rights reserved.

. SUN:
This is because these products are license ware & they can easily be obtained. UNIX: Popular platform because they required a low overhead. We gain good performance. This is reasonable. MICROSOFT: This supports many security tools that can be used to attack remote machine. It has advanced tools for networking as well.
Presentation_ID
2003 Cisco Systems, Inc. All rights reserved.

10

Why do people hack?


Just for fun. Show of their knowledge.

Hack other system secretly.


Destroy enemys computer network during the war. For profit people pays a cracker. Crack for sake of curiocity.

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

11

The pshycology of hackers


All information should be free. Access to computer should be unlimited and free. It can change life for better. It can create beauty on computer.

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

12

Types of hacking
There are many types of hacking Like

Password hacking
Software hacking Net hacking

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

13

Password hacking
Two types: 1.) Brute force

In that case hackers try out all the combination of all keyboard letters .It has grater success but it takes long time.
In that they are use predefine password It is unsuccessful method.

2.) Dictionary based

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

14

Software hacking
In that hackers changes the look & execution way of that software Chang the demo version into full version by decode the source code

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

15

Need for security


Some excellent software can provide you best security Like Trojan Firewall

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

16

Trojan
Windows Trojans are small aspect of windows security Trojan is unauthorized program contained within a program This program performs function unknown by user

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

17

Firewall
Firewall is any device used to prevent outsiders from gaining access to your network Types of firewalls Packet filter

Application proxy
Packet inspection

Presentation_ID

2003 Cisco Systems, Inc. All rights reserved.

18

Thank You
Presentation_ID
2003 Cisco Systems, Inc. All rights reserved.

19

Você também pode gostar