KEMBAR78
Hacking intro | PPTX
Introduction to hacking
What Is Hacking ?
A Hacking Is An Technique Which Goes Into The
Depths Of Any System, And Tries To Understand How
Things Actually Work, Not Just The Thing Which Runs
A Bunch Of Scripts From The Internet To Try And
Break Into Systems.
Hacking And Computers The Concept Of Hacking
Entered The Computer Culture At The MIT University
In The 1960s. There Are THREE Kinds Of Hackers
Who Give Accomplish The Task HACKING
Security
With Hacking, the concept comes
that is Security.


“Most Secured System”
• A system with power cable removed and sealed inside
  a many inch thick wall is also not a complete secure
  system
• This whole concept of secured system in itself is a
  flawed concept.
Common Causes of Security failure

IGNORANCE
IGNORANCE
IGNORANCE
IGNORANCE
IGNORANCE
Types Of Attack
•   DoS
•   PoD
•   DDoS
•   SYN Flood
•   UDP
•   Sql injection
Sql Injection Now a days this attack
 method is   HOT
Reason???
• increase in the use of database.
• A lot more increase in ignorant and novice
  programmers.
• And start using of LINUX
Next is Trojan Attacks
   Trojans : act as a RAT or Remote Administration Tool, which
    allow remote control and remote
    access to the attacker.

    Working:

    1. The Server Part of the Trojan is installed on the target
       system through trickery or disguise.

    2. This server part listens on a predefined port for
       connections.

    3. The attacker connects to this Server Part using the Client
       part of the Trojan on the predefined port number.

    4. Once this is done, the attacker has complete control over
       the target system.
Basic Hacking Skills
Learn how to program.
 This, of course, is the fundamental
 hacking skill. If you don't know any
 computer languages, you cant do hacking.

Get one of the open-source Unix's and learn to use and run
 it
  The single most important step any newbie can take towards
 acquiring hacker skills is to get a copy of Linux or one of the
 BSD-Unix’s, install it on a personal machine, and run it.

Learn how to use the World Wide Web and write HTML.
  To be worthwhile, your page must have content -- it must be
 interesting and/or useful to other hackers.
Hacking Premeasured
 When you start hacking the first thing you need to do is:
  to make sure the victim will not find out
   your real identity.

 So hide your IP by masking it or using a anonymous
  proxy server. This is only effective when the victim
  has no knowledge about computers and internet.
  Organizations like the F.B.I, C.I.A and such will find you in no
 time, so beware !

 The best thing to do is using a dialup connection that has a
 variable IP address. Be smart, when you signup for a internet dialup
 connection use a fake name and address.

 When hacking never leave traces of your hacking attempts, clear
 log files and make sure you are not monitored. So use a good
 firewall that keeps out retaliation hacking attempts of your victim.
Famous Hackers in History




 Ian Murphy      Kevin Mitnick   Johan Helsinguis




Linus Torvalds   Mark Abene       Robert Morris
Questions & Comments
Thank you
Made by: milind   mishra

Hacking intro

  • 2.
    Introduction to hacking WhatIs Hacking ? A Hacking Is An Technique Which Goes Into The Depths Of Any System, And Tries To Understand How Things Actually Work, Not Just The Thing Which Runs A Bunch Of Scripts From The Internet To Try And Break Into Systems. Hacking And Computers The Concept Of Hacking Entered The Computer Culture At The MIT University In The 1960s. There Are THREE Kinds Of Hackers Who Give Accomplish The Task HACKING
  • 4.
    Security With Hacking, theconcept comes that is Security. “Most Secured System” • A system with power cable removed and sealed inside a many inch thick wall is also not a complete secure system • This whole concept of secured system in itself is a flawed concept.
  • 5.
    Common Causes ofSecurity failure IGNORANCE IGNORANCE IGNORANCE IGNORANCE IGNORANCE
  • 6.
    Types Of Attack • DoS • PoD • DDoS • SYN Flood • UDP • Sql injection
  • 7.
    Sql Injection Nowa days this attack method is HOT Reason??? • increase in the use of database. • A lot more increase in ignorant and novice programmers. • And start using of LINUX
  • 8.
    Next is TrojanAttacks  Trojans : act as a RAT or Remote Administration Tool, which allow remote control and remote access to the attacker. Working: 1. The Server Part of the Trojan is installed on the target system through trickery or disguise. 2. This server part listens on a predefined port for connections. 3. The attacker connects to this Server Part using the Client part of the Trojan on the predefined port number. 4. Once this is done, the attacker has complete control over the target system.
  • 9.
    Basic Hacking Skills Learnhow to program. This, of course, is the fundamental hacking skill. If you don't know any computer languages, you cant do hacking. Get one of the open-source Unix's and learn to use and run it The single most important step any newbie can take towards acquiring hacker skills is to get a copy of Linux or one of the BSD-Unix’s, install it on a personal machine, and run it. Learn how to use the World Wide Web and write HTML. To be worthwhile, your page must have content -- it must be interesting and/or useful to other hackers.
  • 10.
    Hacking Premeasured  Whenyou start hacking the first thing you need to do is: to make sure the victim will not find out your real identity.  So hide your IP by masking it or using a anonymous proxy server. This is only effective when the victim has no knowledge about computers and internet. Organizations like the F.B.I, C.I.A and such will find you in no time, so beware !  The best thing to do is using a dialup connection that has a variable IP address. Be smart, when you signup for a internet dialup connection use a fake name and address.  When hacking never leave traces of your hacking attempts, clear log files and make sure you are not monitored. So use a good firewall that keeps out retaliation hacking attempts of your victim.
  • 11.
    Famous Hackers inHistory Ian Murphy Kevin Mitnick Johan Helsinguis Linus Torvalds Mark Abene Robert Morris
  • 12.
  • 13.
    Thank you Made by:milind mishra