Basic Introduction to hacking
-
Upload
sainath-volam -
Category
Education
-
view
667 -
download
3
description
Transcript of Basic Introduction to hacking
![Page 1: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/1.jpg)
What is hacking?
![Page 2: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/2.jpg)
Contents (1)
Who is hacker?Types of hackingWhy do hackers hack?Hacking demo on a live websiteSome hacked passwordsWhat hackers do after hacking?What do hackers know?
![Page 3: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/3.jpg)
Who is hacker? (1)
Hack Cut with repeated irregular blows Examine something very minutely
Hacker The person who hacks
Cracker System intruder/destroyer
![Page 4: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/4.jpg)
Who is hacker? (2)
Hacker means cracker nowadays Meaning has been changed
![Page 5: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/5.jpg)
Types of hackers
1)White hat
2)Gray hat
3)Black hat
![Page 6: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/6.jpg)
Types of hacking
Normal
data transfer
Interruption Interception
Modification
![Page 7: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/7.jpg)
Types of hacking
key loggingSniffingMan in the middleSession hijackingSocial engineeringSystem hackingDos, DdosSession hijackingSql injection and many more.
![Page 8: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/8.jpg)
Why do hackers hack?
Just for funShow offTo clarify the doubts in relationshipNotify many people their thoughtSteal important informationDestroy enemy’s computer network during
the warTo earn money
![Page 9: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/9.jpg)
What do hackers do after hacking? (1)
Patch security hole The other hackers can’t intrude
Clear logs and hide themselvesInstall rootkit ( backdoor )
The hacker who hacked the system can use the system later
It contains trojans.
![Page 10: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/10.jpg)
What do hackers do after hacking? (2)
Install exploit programInstall denial of service programUse all of installed programs silently
![Page 11: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/11.jpg)
How can be a real hacker?
Study C/C++/assembly languageStudy computer architectureStudy operating systemStudy computer networkExamine the hacking tools for a monthThink the problem of the computer
![Page 12: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/12.jpg)
Why can’t we defend against hackers?
There are many unknown security holeHackers need to know only one security hole
to hack the systemAdmin need to know all security holes to
defend the system
![Page 13: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/13.jpg)
How to protect the system? (1)
Patch security hole oftenEncrypt important dataDo not run unused daemonSetup loghostUse firewallsBackup the system often
![Page 14: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/14.jpg)
Deep freeze
Download deepfreeze and install it and later restart the system
![Page 15: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/15.jpg)
What to do after hacked?
Shutdown the systemRemove the network cableRestore the system with the backup
Or reinstall all programs
Connect the system to the network
![Page 16: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/16.jpg)
How to translate the hackers’ language (1)
1 -> i or l3 -> e4 -> a7 -> t9 -> g0 -> o$ -> s| -> i or l
|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x
![Page 17: Basic Introduction to hacking](https://reader036.fdocuments.in/reader036/viewer/2022062300/554f4f83b4c905b9508b4c5b/html5/thumbnails/17.jpg)
How to translate the hackers’ language (2)
Ex) 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1
h4ck3d 1n
I did not hack this page, it was like this when I hacked in