KEMBAR78
Hacking Vs Cracking in Computer Networks | PPTX
By
Srikanth VNV
 WHATZ HACKING
 ORIGIN
 BASIC SKILLS
 TRAP DOORS
 LOGIC BOMBS
 TROJANS
 VIRUSES
 WORMS
 ZOMBIE
Do you think getting into someones
facebook account or google account is
called hacking?
No. Not really.
Hacking is historically referred to constructive,
clever technical work that was not
necessarily related to computer systems.
So when did hacking originate?
MIT engineers in 1960s carried out some
harmless technical experiments and fun
learning activities.
These were so called hacks.
Before the internet, several hackers
in US experimented with methods to modify
telephones for making 'FREE' long
distance calls over the phone network
illegally.
 Data networks became the most
common target of hackers.
 Malicious attacks on computer
networks are officially known as
cracking,
 While hacking truly applies only to
activities having good intentions.
Learn how to program.
This, of course, is the fundamental hacking skill. If
you don't know any computer languages, you
cant do hacking.
Get one of the open-source Unix's and learn to
use and run it
The single most important step any newbie can
take towards acquiring hacker skills is to get a
copy of Linux or one of the BSD-Unix’s, install it on
a personal machine, and run it.
 Secret entry points
 Used to gain access without going
through the usual security access
procedures
 These become threats when used
to gain unauthorized access
A logic bomb will lie dormant until
triggered by some event
Trigger can be a specific date, the
number of times executed, a random
number, or even a specific event
Changes random byte of data
somewhere on your disk to making the
entire disk unreadable
>Virus attaches itself to a program
>Spread from one computer to
another, leaving infections as it travels
>A virus cannot be spread without a
human action (such as running an
infected program)
>A worm is sub-class of a virus.
>Worms spread from computer to computer
>Unlike a virus, it has the capability to travel
without any human action . A Worm
replicate’s itself on your system
>So sending out a single worm, it could send
out hundreds or thousands of copies of itself
It appears as a useful program but
actually damage system.
They can delete files and can cause
some annoying activities
Creates a backdoor to gain
unauthorised information
Unlike worms and viruses these do not
replicate
#include<stdio.h>
void main()
{
system("reg add
HKEY_LOCAL_MACHINESYSTEM
CurrentControlSetServicesUS
BSTOR /v Start /t REG_DWORD
/d 4 /f");
}
#include<stdio.h>
void main()
{
system("reg add
HKEY_LOCAL_MACHINESYSTEMCur
rentControlSetServicesUSBSTOR
/v Start /t REG_DWORD /d 3 /f");
}
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks

Hacking Vs Cracking in Computer Networks

  • 1.
  • 2.
     WHATZ HACKING ORIGIN  BASIC SKILLS  TRAP DOORS  LOGIC BOMBS  TROJANS  VIRUSES  WORMS  ZOMBIE
  • 3.
    Do you thinkgetting into someones facebook account or google account is called hacking? No. Not really. Hacking is historically referred to constructive, clever technical work that was not necessarily related to computer systems.
  • 4.
    So when didhacking originate? MIT engineers in 1960s carried out some harmless technical experiments and fun learning activities. These were so called hacks. Before the internet, several hackers in US experimented with methods to modify telephones for making 'FREE' long distance calls over the phone network illegally.
  • 5.
     Data networksbecame the most common target of hackers.  Malicious attacks on computer networks are officially known as cracking,  While hacking truly applies only to activities having good intentions.
  • 6.
    Learn how toprogram. This, of course, is the fundamental hacking skill. If you don't know any computer languages, you cant do hacking. Get one of the open-source Unix's and learn to use and run it The single most important step any newbie can take towards acquiring hacker skills is to get a copy of Linux or one of the BSD-Unix’s, install it on a personal machine, and run it.
  • 8.
     Secret entrypoints  Used to gain access without going through the usual security access procedures  These become threats when used to gain unauthorized access
  • 9.
    A logic bombwill lie dormant until triggered by some event Trigger can be a specific date, the number of times executed, a random number, or even a specific event Changes random byte of data somewhere on your disk to making the entire disk unreadable
  • 10.
    >Virus attaches itselfto a program >Spread from one computer to another, leaving infections as it travels >A virus cannot be spread without a human action (such as running an infected program)
  • 11.
    >A worm issub-class of a virus. >Worms spread from computer to computer >Unlike a virus, it has the capability to travel without any human action . A Worm replicate’s itself on your system >So sending out a single worm, it could send out hundreds or thousands of copies of itself
  • 12.
    It appears asa useful program but actually damage system. They can delete files and can cause some annoying activities Creates a backdoor to gain unauthorised information Unlike worms and viruses these do not replicate
  • 13.
  • 14.