100% found this document useful (1 vote)
376 views

Hacking: Don't Learn To Hack - Hack To Learn

The document discusses different types of hacking and security issues. It defines hackers as people who build things and crackers as people who try to gain unauthorized access to break systems. Social engineering techniques like pretexting and phishing are described as ways crackers obtain private information from targets. Various types of attacks are also outlined such as DoS, DDoS, NetBIOS, FTP, and through software. The document concludes with recommendations for securing systems like using antivirus software, firewalls, and avoiding pirated software.

Uploaded by

som87
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
376 views

Hacking: Don't Learn To Hack - Hack To Learn

The document discusses different types of hacking and security issues. It defines hackers as people who build things and crackers as people who try to gain unauthorized access to break systems. Social engineering techniques like pretexting and phishing are described as ways crackers obtain private information from targets. Various types of attacks are also outlined such as DoS, DDoS, NetBIOS, FTP, and through software. The document concludes with recommendations for securing systems like using antivirus software, firewalls, and avoiding pirated software.

Uploaded by

som87
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 15

HACKING

Dont Learn to Hack Hack to Learn

Difference between Hacker and Cracker


Hackers build things, Crackers break them

Literal Definitions
Cracker : Crackers are people who try to gain unauthorised access to computers to destructs things. Hacker : someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer.
Black-hat Bad guys White-hat Good guys

Reasons behind cracking


Just

for fun Show off crack other systems secretly Notify many people their thought Steal important information Destroy enemys computer network during the war

Social enginnering
Pretexting Phishing

Pretexting
Pretexting is the act of creating and using an invented scenario to persuade a target to release information (e.g. date of birth, Social Security Number, last bill amt.) In Pretexting an individual lies about his identity or purpose to obtain privileged data about another individual. A pretexter may then use this data to engage in identity theft or corporate espionage. Pretexting may be employed by telephone or email, through customer service instant messaging or a company Web site.

Phishing
Phishing is an e-mail fraud method in which the perpetrator sends out email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details ebay and paypal are two of the most targeted companies, and online banks are also common targets

Targets of social enginnering


Unaware

of info value receptionist

Special

privileges helpdesk tech support


vendors

Manufacturer/vendor Specific

departments accounting, HR

Types Of Attack

DoS and DDoS

Is an attempt to make a computer resource unavailable to its intended users. Make the hosted web pages unavailable on the Internet. DoS attacks have two general forms: Force the victim computer(s) to reset or consume its resources such that it can no longer provide its intended service. Obstruct the communication media between the intended users and the victim so that they can no longer communicate adequately.

NetBIOS Attack

exploits a bug in Windows.

NetBIOS is meant to be used on


local area networks, so machines on that network can share

information.

FTP Attack

File Transfer Protocol used to upload or download files Requires authentication to access private files. ftp backdoor programs like doly trojan,fore ,blade runner etc.

from websites.

Convert computer to ftp server without authentication.

Software Attack

Hacking through a software program. Needs installation

Security
With Hacking and cracking comes the concept of Security.

How to secure your self


Primary work to beef up your security.
A

good antivirus (AVG free / NOD32 trial) A good firewall (Sygate personal) A good spy ware / Trojan buster. Use of genuine software. Avoid ignoring even the simplest of things

Questions

You might also like