Hacking: Don't Learn To Hack - Hack To Learn

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 19

HACKING

Don’t Learn to Hack – Hack to Learn


Outline
• Who is a “hacker”?
• Hacker characteristics
• What do hackers do?
• Hacker’s techniques
• System Hacking
Who is a “hacker”?
• There are at least two common
interpretations:
-A hacker is a person who breaks into
computers, usually by gaining access to
administrative controls
– Someone who bypasses the system’s
access controls by taking advantage of
security weaknesses left in the system by
developers
Hacker characteristics

• Black hat hacker


– A skilled hacker who breaks into a computer system or
network with malicious intent. in other words he is the person
who uses his programming skills to harm others. Eg: data
theft, credit card theft etc.

• Grey hat hacker


– A skilled hacker who sometimes acts illegally, sometimes in
good will, and sometimes not. In other words , he is the
person who uses his technical skills to bring profit to him but
does less harm or brings less loss to others. Example:

• White hat hacker:


– an ethical hacker or penetration tester who focuses on
securing and protecting IT systems. In other words he
is the person who uses his technical and programming
skills to protect other systems from being hacked. Example:
What Do Hackers Do?
• System
– Access confidential information
– Threaten someone from YOUR computer
– Broadcast your confidential letters or
materials
– Store illegal or espionage material
What Do Hackers Do?
• Network
– Eavesdrop and replay
– Imposer: server / client
– Modify data / stream
– Denial-of-Service
Hacker’s techniques
• System hacking
• Network hacking
• Software hacking
Hacking Jargons

• Foot printing
• Scanning
• Enumeration
• Gaining access
• Escalating privilege
• Covering tracks
• Creating backdoors
• Denial of service
• Phishing
Foot printing
• Objective
– To learn as much as you can about target
system, it's remote access capabilities, its
ports and services, and the aspects of its
security.
• Techniques
– Open source search
– Whois
– Web interface to whois
– ARIN whois
Scanning
• Objective
– Bulk target assessment and identification
of listing services focuses the attention on
the most promising avenues of entry
• Techniques
– Ping sweep
– TCP/UDP port scan
– OS Detection
Enumeration
• Objective
– More intrusive probing now begins as
attackers begin identifying valid user
accounts or poorly protected resource
shares
• Techniques
– List user accounts
– List file shares
– Identify applications
Gaining Access
• Objective
– Enough data has been gathered at this
point to make an informed attempt to
access the target
• Techniques
– File share brute forcing
– Password file grab
– Buffer overflows
– Password eavesdropping
Escalating Privileges
• Objective
– If only user level access was obtained in
the last step, the attacker will now seek to
gain the complete control of the system
• Techniques
– Password cracking
– Known exploits
Covering Tracks
• Objective
– Once total ownership of the target is
secured, hiding this from system
administrators become paramount ,lest
they quickly end the romp.
• Techniques
– Clear logs
– Hide tools
Denial of Service
• Objective
– If an attacker is unsuccessful in gaining
access ,they may use readily available
exploit code to disable a target as a last
resort.
• Techniques
– SYN flood
– Identical SYN requests
– Overlapping fragment/offset bugs
– DDOS
Ethical Hacking And Security.

• “To catch a thief, think like a thief”.


That’s the basis for ethical hacking.

• Great hackers work in the defense


industry, crime branch, etc and work
for the safety of the nation’s
systems. They also hack systems
used by terrorists and criminals and
catch them red handed.
Some Real-time Examples.

• Google hacking to find out any software


within 15 second
• How to Hide File & Folder Super Hidden
• Change any folder to Recycle Bin (for
data security)
• Hide your files in jpeg File without any
Software
• Block all startup Trojan virus with Help
of Msconfig
Google hacking to find out any
software within 15 second

• For example we need AVG antivirus or


any software, and we have 10-15
second so we use Google advanced
parameter, to search from
rapidshare.com

You might also like