Basic Introduction to hacking
-
Upload
sainath-volam -
Category
Education
-
view
674 -
download
3
description
Transcript of Basic Introduction to hacking
What is hacking?
Contents (1)
Who is hacker?Types of hackingWhy do hackers hack?Hacking demo on a live websiteSome hacked passwordsWhat hackers do after hacking?What do hackers know?
Who is hacker? (1)
Hack Cut with repeated irregular blows Examine something very minutely
Hacker The person who hacks
Cracker System intruder/destroyer
Who is hacker? (2)
Hacker means cracker nowadays Meaning has been changed
Types of hackers
1)White hat
2)Gray hat
3)Black hat
Types of hacking
Normal
data transfer
Interruption Interception
Modification
Types of hacking
key loggingSniffingMan in the middleSession hijackingSocial engineeringSystem hackingDos, DdosSession hijackingSql injection and many more.
Why do hackers hack?
Just for funShow offTo clarify the doubts in relationshipNotify many people their thoughtSteal important informationDestroy enemy’s computer network during
the warTo earn money
What do hackers do after hacking? (1)
Patch security hole The other hackers can’t intrude
Clear logs and hide themselvesInstall rootkit ( backdoor )
The hacker who hacked the system can use the system later
It contains trojans.
What do hackers do after hacking? (2)
Install exploit programInstall denial of service programUse all of installed programs silently
How can be a real hacker?
Study C/C++/assembly languageStudy computer architectureStudy operating systemStudy computer networkExamine the hacking tools for a monthThink the problem of the computer
Why can’t we defend against hackers?
There are many unknown security holeHackers need to know only one security hole
to hack the systemAdmin need to know all security holes to
defend the system
How to protect the system? (1)
Patch security hole oftenEncrypt important dataDo not run unused daemonSetup loghostUse firewallsBackup the system often
Deep freeze
Download deepfreeze and install it and later restart the system
What to do after hacked?
Shutdown the systemRemove the network cableRestore the system with the backup
Or reinstall all programs
Connect the system to the network
How to translate the hackers’ language (1)
1 -> i or l3 -> e4 -> a7 -> t9 -> g0 -> o$ -> s| -> i or l
|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x
How to translate the hackers’ language (2)
Ex) 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1
h4ck3d 1n
I did not hack this page, it was like this when I hacked in