Professional Practices
Lecture: 05
Introduction to hacking
12/18/2023 1
Introduction to hacking
The process of attempting to gain or successfully gaining, unauthorized
access to computer resources is called hacking.
OR
The process of modifying the features of a system, in order to
accomplish a goal outside of the creator's original purpose.
12/18/2023 2
Who is hacker?
◼ A computer hacker is someone who develops, changes or
attempts to circumvent (avoid) computer security hardware or
software.
◼ Intelligent, having advance knowledge of hardware and
software.
◼ Can either happen for negative (criminal) or positive reasons.
◼ Criminal hackers develop computer malware or spyware to
gain access to confidential information.
12/18/2023 3
Types of hacking
◼ Website Hacking
◼ Net Hacking
◼ Password Hacking
◼ Software Hacking
◼ Ethical Hacking
◼ Email Hacking
◼ Computer Hacking
◼ Hacktivism
12/18/2023 4
Website Hacking
◼ Hacking a website means taking control from
the website owner to a person who hacks the
website.
12/18/2023 5
Net Hacking
◼ Gathering information about the domain
◼ IP address (Address of your computer in the
internet)
◼ Port (It is logical port on your computer which
hacker can use to enter in the system)
12/18/2023 6
Password Hacking
◼ Password Hacking or Password cracking is the process
of recovering secret passwords from data that has been
stored in or transmitted by a computer system.
◼ Brute force (Hackers try out all the combination of all
keyboard letters)
◼ Dictionary based (Hackers use predefine passwords. It
is unsuccessful method)
12/18/2023 7
Software Hacking
◼ In that hackers changes the look & execution way of that
software. For example change the demo version into the
full version of that software.
◼ Modifying existing features of the software.
12/18/2023 8
Ethical Hacking
◼ The process in which a person hacks to find weakness
in a system and then usually patches (covers) them.
◼ Can be used to recover lost information where the
computer password has been lost.
◼ To test security of the system.
◼ Also called white hat computer hacking.
12/18/2023 9
Email Hacking
◼ Email hacking is unauthorized access to an email account or email
correspondence.
◼ A virus or other malware can be sent via email, and if executed may
be able to capture the user's password and send it to an attacker.
◼ Phishing involves emails that appear to be from legitimate sender
but are scams which ask for verification of personal information,
such as an account number, a password, or a date of birth. If
unsuspecting victims respond, the result may be stolen accounts,
financial loss, or identity theft
12/18/2023 10
Computer Hacking
◼ Computer Hacking is when files on computer
are viewed, created, edited or deleted without
authorization.
12/18/2023 11
Hacktivism
Hacktivism
Hacktivism refersinvolves
to the act ofhacking foroutpolitical,
hacking carried social,
for political, social, or ideological
or ideological
purposes.
reasons. Hacktivists may target organizations or websites to
Hacktivists often target websites or organizations to spread awareness, protest, or
promote their beliefs and causes.
promote their causes or beliefs.
12/18/2023 12
What should do after hacked?
◼ Shut down /Turn off the system
◼ Separate the system from network
◼ Restore the system with backup Or reinstall
all programs
◼ Connect the system to the network
◼ Good to call the police
12/18/2023 13
Tools of Hacking
Scanners
A program that automatically detects security weakness in remote host
Telnet
It is terminal emulation program that allows us to connect to remote
Telnet is a terminal emulation program that allows users to connect to a remote system over
a network and control it through a command-line interface.
system
FTP
FTP isTransfer
FTP (File one typeProtocol)of
is aprotocol but
type of network some
protocol usedtime it is
to transfer filesused
betweenas hacking
computers. tool,
However, it
can sometimes be exploited as a hacking tool. FTP typically operates on port 21.
To connect to an FTP server, you need special software called an FTP client. In some hacking scenarios,
port 21 for the ftp. For connecting ftp we need some ftp s/w known
attackers may repeatedly try to connect (or "hammer") the FTP server in an attempt to gain unauthorized
as
access.
ftp client. For connecting ftp server you have to hammer that server.
12/18/2023 14
Thank you!
12/18/2023 15