KEMBAR78
Lecture 5 | PDF | Security Hacker | File Transfer Protocol
0% found this document useful (0 votes)
2 views15 pages

Lecture 5

Uploaded by

sahilubaid583
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views15 pages

Lecture 5

Uploaded by

sahilubaid583
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Professional Practices

Lecture: 05

Introduction to hacking

12/18/2023 1
Introduction to hacking

The process of attempting to gain or successfully gaining, unauthorized


access to computer resources is called hacking.

OR

The process of modifying the features of a system, in order to


accomplish a goal outside of the creator's original purpose.

12/18/2023 2
Who is hacker?
◼ A computer hacker is someone who develops, changes or
attempts to circumvent (avoid) computer security hardware or
software.

◼ Intelligent, having advance knowledge of hardware and


software.

◼ Can either happen for negative (criminal) or positive reasons.

◼ Criminal hackers develop computer malware or spyware to


gain access to confidential information.

12/18/2023 3
Types of hacking
◼ Website Hacking

◼ Net Hacking

◼ Password Hacking

◼ Software Hacking

◼ Ethical Hacking

◼ Email Hacking

◼ Computer Hacking

◼ Hacktivism

12/18/2023 4
Website Hacking
◼ Hacking a website means taking control from
the website owner to a person who hacks the
website.

12/18/2023 5
Net Hacking

◼ Gathering information about the domain

◼ IP address (Address of your computer in the


internet)

◼ Port (It is logical port on your computer which


hacker can use to enter in the system)

12/18/2023 6
Password Hacking
◼ Password Hacking or Password cracking is the process
of recovering secret passwords from data that has been
stored in or transmitted by a computer system.

◼ Brute force (Hackers try out all the combination of all


keyboard letters)

◼ Dictionary based (Hackers use predefine passwords. It


is unsuccessful method)

12/18/2023 7
Software Hacking

◼ In that hackers changes the look & execution way of that


software. For example change the demo version into the
full version of that software.

◼ Modifying existing features of the software.

12/18/2023 8
Ethical Hacking
◼ The process in which a person hacks to find weakness
in a system and then usually patches (covers) them.

◼ Can be used to recover lost information where the


computer password has been lost.

◼ To test security of the system.

◼ Also called white hat computer hacking.

12/18/2023 9
Email Hacking
◼ Email hacking is unauthorized access to an email account or email
correspondence.

◼ A virus or other malware can be sent via email, and if executed may
be able to capture the user's password and send it to an attacker.

◼ Phishing involves emails that appear to be from legitimate sender


but are scams which ask for verification of personal information,
such as an account number, a password, or a date of birth. If
unsuspecting victims respond, the result may be stolen accounts,
financial loss, or identity theft

12/18/2023 10
Computer Hacking

◼ Computer Hacking is when files on computer


are viewed, created, edited or deleted without
authorization.

12/18/2023 11
Hacktivism
Hacktivism
Hacktivism refersinvolves
to the act ofhacking foroutpolitical,
hacking carried social,
for political, social, or ideological
or ideological
purposes.
reasons. Hacktivists may target organizations or websites to
Hacktivists often target websites or organizations to spread awareness, protest, or
promote their beliefs and causes.

promote their causes or beliefs.

12/18/2023 12
What should do after hacked?
◼ Shut down /Turn off the system

◼ Separate the system from network

◼ Restore the system with backup Or reinstall


all programs

◼ Connect the system to the network

◼ Good to call the police

12/18/2023 13
Tools of Hacking
Scanners

A program that automatically detects security weakness in remote host

Telnet

It is terminal emulation program that allows us to connect to remote


Telnet is a terminal emulation program that allows users to connect to a remote system over
a network and control it through a command-line interface.
system

FTP

FTP isTransfer
FTP (File one typeProtocol)of
is aprotocol but
type of network some
protocol usedtime it is
to transfer filesused
betweenas hacking
computers. tool,
However, it
can sometimes be exploited as a hacking tool. FTP typically operates on port 21.
To connect to an FTP server, you need special software called an FTP client. In some hacking scenarios,
port 21 for the ftp. For connecting ftp we need some ftp s/w known
attackers may repeatedly try to connect (or "hammer") the FTP server in an attempt to gain unauthorized
as
access.
ftp client. For connecting ftp server you have to hammer that server.

12/18/2023 14
Thank you!

12/18/2023 15

You might also like