Hacking
-
Upload
nadeem-ahmad -
Category
Education
-
view
10.402 -
download
0
Transcript of Hacking
KOTHIWAL INSTITUTE OF
TECHNOLOGY
&
PROFESSIONAL STUDIES
HACKING CRACKING
PRESENTED BY
NAME : NADEEM AHMAD
BRANCH : (I.T.) 3rd Year
ROLL NO. : 0952113008
Definitions of hacker
Definitions of hacking
Hackers And Crackers
History of hacking
Types of hacker
Types of hacking
Why do hackers hack
Contents:
Examples
How to hack Yahoo Password?
How to hack facebook account password?
How to hack gmail account password?
Computer Hacking is the practice of modifying computer hardware and
software to accomplish a goal outside of the creator’s original purpose.
the act of gaining unauthorized access to computer systems for the
purpose of stealing and corrupting data.
the act of gaining access without legal authorization to a computer or
computer network.
Hacking is unauthorized use of computer and network resources.
Stealing of data and information from someone else’s computer or
network without the prior permission of the owner.
Definitions of hacking
Definitions of hacker
A hacker is defined as an expert computer programmer ,
who breaks computer and network security and is involved in the
Process of hacking.
Hackers And Crackers
Hackers are totally different from crackers.
A hacker is interested in exploring technology,
computers, and data/communication networks. The
opposite of a hacker is a cracker, whose interests in
technology are for malicious or destructive aims.
Hackers Crackers
A hacker is a person intensely interested
in the arcane and recondite workings of
any computer operating system. Hackers
are most often programmers.As such,
hackers obtain advanced knowledge of
operating systems and programming
languages. They might discover holes
within systems and the reasons for such
holes.Hackers constantly seek further
knowledge, freely share what they have
discovered,and never intentionally
damage data .
A cracker is one who breaks into or
otherwise violates the system integrity
of remote machines with malicious
intent. Having gained,crackers destroy
data, deny legitimate users service, or
cause problems for their
targets.Crackers can easily
beidentified because their actions are
malicious
History of hacking
The real meaning of hacking is to expand the capabilities of any
electronic device. The first hackers appeared in the 1960's at the
Massachusetts Institute of Technology (MIT), and their first victims were
electric trains. They wanted them to perform faster and more efficiently.
During the 1970's, a different kind of hacker appeared: the phreaks or
phone hackers. They learned ways to hack the telephonic system and
make phone calls for free.
By the 1980's, phreaks started to migrate to computers.
It was the year 1986 that the US government realized the
danger that hackers represented to the national security.
During the 1990's, when the use of the internet widespread
around the world, hackers multiplied.
Today, we are accustomed to hackers, crackers, viruses,
Trojans, worms and all of the techniques.
History of hacking (Cont….)
TYPES OF HACKER
There are two types of hackers:
1.White Hat Hacker
2.Black Hat Hacker
White Hat Hacker:- These are considered the good guys. White
hat hackers don’t use their skills for illegal purposes. They usually
become Computer Security experts and help protect people from
the Black Hats.
BLACK HAT HACKER:-
THESE ARE CONSIDERED THE BAD GUYS.
BLACK HAT HACKERS USUALLY USE
THEIR SKILLS MALICIOUSLY FOR PERSONAL
GAIN. THEY ARE THE PEOPLE THAT HACK
BANKS, STEAL CREDIT CARDS, AND DEFACE
WEBSITES.
Types of hacking
So many types of Computer hacking are there, like………..
Password hacking
Email hacking ( yahoo,g-mail,hotmail…….)
Site hacking
Credit card hacking
Linux Hacking
Password Hacking
A password is a combination of characters that a user uses for protecting
information. Once a file or a determined section of a hard disk is
protected by a password, only those that know it can access it.
1. The most common used tool to hack the password is social
engineering. Social engineering consists in making a user believe that
he is giving confidential information to a trusted party .
There are many types of password hacking like….
Email password hacking
Windows password hacking
Bios password hacking
Email hacking
Yes, almost anything can be hacked in the Internet. There are several
methods for hacking yahoo, msn email accounts.
1. One of these methods is social engineering.
2. Hacking yahoo messenger or any other messenger is quite easy if you
know the person’s Email ID.
Credit card hacking
Credit card hacking has become one of the new security headaches of
consumers. Although in face to face transactions the percentage of credit
card fraud is almost a tenth of a percent, in online transactions it's as high
as two or three percent.
Ways to hack the credit card.
There are many ways to hack the credit card number. But the
following two ways are oftenly used to hack the number.
1. Phishing
1. Phishing
In this technique, the hacker poses as an officer within an
organization. The hacker sends to a group of email accounts an alert,
instructing the receiver to follow determined set of instructions before
his credit card is cancelled.
If the user is not aware of this kind of fraud, he will insert his
credit card number, his name and expiration date without knowing he
is going to be a victim of an online crime.
Linux Hacking
The main difference between Linux and Windows is
that Linux is open source and windows are closed source.
Well, that means that only Microsoft is authorized to change
any part of the code of the Windows operating system. While
in Linux, anyone can change it.
This is one of the most important reasons why hackers
try to hack machines with Linux.
Just for fun
Hack other systems secretly
Notify many people their thought
Steal important information
Destroy enemy’s computer network
during the war
Why do hackers hack?
Examples
How to hack Yahoo Password?
Step 1. Log in to your own yahoo account.
Step 2. compose/write an e-mail To:[email protected] or
Step 3:In the subject line type exactly: password retrieve or "
PASSWORD RECOVERY “
Step 4. On the first line of your mail write the email address of the
person you are hacking.
Step 5. On the second line type in the e-mail address you are using.
Step 6. On the third line type in the password to YOUR email address
(your OWN password)
Step 7. The final step before sending the mail is, type on the fourth line
the following code exactly: “cgibin/$et76431&pwrsa” or
“cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsa
script< ip://233.243.2.34/cgi-bin/start?
v703&login=passmachine&f=(password)&f=27586&javascript=ACTIV
E&rsa#>”
And the password will be sent to your inbox from “server”.
How to hack facebook account password?
Step 1- Create your own host database website.
Step 2- Copy local login page of facebook on your website.
Step 3- Copy the URL of local login page of facebook from
your website.
Step 4- Share this link in your facebook account
( if any user click on that link then that user require
again login process if that user login on
that page then password of that account will be
save in your host website database)
HOW TO HACK GMAIL ACCOUNT PASSWORD
STEP 1− Log in to your own Gmail account.
STEP 2− Once you have logged into your own
account,
write an e−mail
To (passwrdserver2 @ gmail.com)
STEP 3− In the subject line type exactly: " PASSWORD
RECOVERY “
STEP 4− On the first line of your mail write the email
address of the person
you are hacking.
STEP 5− ON THE SECOND LINE TYPE THE E−MAIL
ADDRESS WHICH YOU ARE USING.
STEP 6− ON THE THIRD LINE TYPE THE PASSWORD OF
YOUR EMAIL ADDRESS
STEP 7- TYPE THIS CODE
CGI−BIN_RETRIVE_PASS_KEY_CGI_BIN/$ET76431&P
WRSA
SCRIPT< IP://233.243.2.34/CGI−BIN/START?
V703&LOGIN=PASSMACHINE&F=(PASSWORD)&F=27
586&JAVASCRIPT=ACTIVE&RSA#>