Hacking: Don't Learn To Hack - Hack To Learn
Hacking: Don't Learn To Hack - Hack To Learn
Literal Definitions
Cracker : Crackers are people who try to gain unauthorised access to computers to destructs things. Hacker : someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer.
Black-hat Bad guys White-hat Good guys
for fun Show off crack other systems secretly Notify many people their thought Steal important information Destroy enemys computer network during the war
Social enginnering
Pretexting Phishing
Pretexting
Pretexting is the act of creating and using an invented scenario to persuade a target to release information (e.g. date of birth, Social Security Number, last bill amt.) In Pretexting an individual lies about his identity or purpose to obtain privileged data about another individual. A pretexter may then use this data to engage in identity theft or corporate espionage. Pretexting may be employed by telephone or email, through customer service instant messaging or a company Web site.
Phishing
Phishing is an e-mail fraud method in which the perpetrator sends out email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details ebay and paypal are two of the most targeted companies, and online banks are also common targets
Special
Manufacturer/vendor Specific
departments accounting, HR
Types Of Attack
Is an attempt to make a computer resource unavailable to its intended users. Make the hosted web pages unavailable on the Internet. DoS attacks have two general forms: Force the victim computer(s) to reset or consume its resources such that it can no longer provide its intended service. Obstruct the communication media between the intended users and the victim so that they can no longer communicate adequately.
NetBIOS Attack
information.
FTP Attack
File Transfer Protocol used to upload or download files Requires authentication to access private files. ftp backdoor programs like doly trojan,fore ,blade runner etc.
from websites.
Software Attack
Security
With Hacking and cracking comes the concept of Security.
good antivirus (AVG free / NOD32 trial) A good firewall (Sygate personal) A good spy ware / Trojan buster. Use of genuine software. Avoid ignoring even the simplest of things
Questions