際際滷

際際滷Share a Scribd company logo
HACKING
AND
CRACKING
BY:
Mohit Agarwal
EC 2 year
Objectives of Hacking and
Cracking
 What is Hacking?
 Difference between Hacking and
cracking
 Types of Hackers
 Types of Hacking Techniques
 Preventive measures
 Some Cracking Examples
HACKING
 Authorized or Unauthorize
attempts to bypass the security
mechanisms of an information
systems or network
 In simple words Hacking means
finding out weaknesses in a
computer or computer network
Hacking
Why do people hack ?
 To make security stronger (Ethical hacking)
 Just for fun
 Steal important information
 Destroy enemys computer network
 For Fame
Types of Hackers
White-hat Hackers
 The good guys who identify the
security weakness of the system or
network and inform the owner about
them
Black Hat Hackers
A black hat is the villain or
bad guy, who crash into victims
security to steal information and
destroy the victims security
network.
Grey hat Hackers
A grey hat, in the hacking community,
refers to a skilled hacker who is
somewhere in between white and
black hat hackers
Pretexting
Phishing
Pretexting:
Pretexting is the act of been that u r not to
release information (e.g. date of birth, Social Security
Number, last bill amt.)
Phishing:
Phishing is an e-mail fraud method in which the
perpetrator sends out email in an attempt to gather
personal and financial information from recipients.
Phishers attempt to fraudulently acquire
sensitive information, such as usernames, passwords and
credit card details .Ebay and PayPal are two of the most
targeted companies, and online banks are also common
targets
Language of hackers - Leet
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
Example:
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3|| 1 h4ck3d 1n
I did not hack this page, it was like this
when I hacked in.
World famous hackers
 Stephen
Wozniac
 Tsutomu
Shimomura
 Kevin Mitnick
 Kevin Poulsen
Random Fact !!!!
 The average age group of
hackers are aged between 14-24
yrs.
Did you know ?
Social networking sites like
FACEBOOK, GMAIL,
YAHOO comprised of 60% of
direct or indirect hacking
incidents.
Most popular virus
Links involving private pictures
of celebrities.
Links showing pictures of
famous personalities like
videos of Osama Bin Ladens
killing.
Another popular scam
Facebook lottery scam.
Hacking
Preventive measures
 Install a strong anti-virus with full
security from internet, removal
memory etc.
 Avoid disclosing personal details like
phone number, credit card details to
strangers.
 A good firewall (Sygate personal)
 A good spy ware / Trojan buster.
 Use of genuine software
How to become Hacker
 The best approach is to gain as much
knowledge about stuff as you can.
 Good command over C / C++ / Perl
will definitely help.
 But above all you need a good logical
brain
Some Examples of Cracking
Windows Cracking
1) Windows Logon
password Breaking
Window log on password
breaking
 To hack windows login password, reboot and wait for the message:
When we see the boot menu on the screen, press F2 or F12 before Starting
Windows 9x . The boot menu will come up. Select option to boot into DOS
.
C:>cd windows
 C:windows>ren *.pwl *.xyz // RENAME
Or delete them by typing
 C:windows>del *.pwl *.xyz
//DELETE
Easy and Simple approach
On many computers a series of
keystrokes may crash the password program.
keep pressing ESC 15 to 20 times . This will
result in the crashing of the password program and the
computer will continue booting .
BY BOOTING
We can break into a computer by using live tools like
conboot live cd which are readly available on internet .The
live cd can be used to make a bootable pen drive and then
we can break into any computer.
Hacking
Hacking

More Related Content

What's hot (8)

Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
Jonathan Bacon
Hackers 22
Hackers 22Hackers 22
Hackers 22
Mahmoud Saeed
Hacker !
Hacker !Hacker !
Hacker !
Mahmoud Saeed
Hacker !
Hacker !Hacker !
Hacker !
Mahmoud Saeed
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515
lisawhipp
Web defacement
Web defacementWeb defacement
Web defacement
student
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
Sainath Volam
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Michael Asres
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
Jonathan Bacon
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515
lisawhipp
Web defacement
Web defacementWeb defacement
Web defacement
student
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
Sainath Volam
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Michael Asres

Similar to Hacking (20)

Hacking and cracking
Hacking and crackingHacking and cracking
Hacking and cracking
Deepak kumar
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
Nugala Sathesh Chowdary
Hacking
HackingHacking
Hacking
vkradhika
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
Chandra Prakash
Hacking
HackingHacking
Hacking
Asma Khan
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
WorldTrade3
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
DiveshK4
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
Mayur Sutariya
UserSecurityAwareness.ppt awareness of security
UserSecurityAwareness.ppt awareness of securityUserSecurityAwareness.ppt awareness of security
UserSecurityAwareness.ppt awareness of security
nicealipk
IT security awareness
IT security awarenessIT security awareness
IT security awareness
Dr. Ramkumar Lakshminarayanan
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
Information security awareness
Information security awarenessInformation security awareness
Information security awareness
CAS
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
Kaushik Patra
Hacking
HackingHacking
Hacking
akam bajalan
Hacking
HackingHacking
Hacking
Virus
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
djkhatri
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
djkhatri
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
HACKING
HACKINGHACKING
HACKING
Shubham Agrawal
Hacking and cracking
Hacking and crackingHacking and cracking
Hacking and cracking
Deepak kumar
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
Chandra Prakash
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
WorldTrade3
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
DiveshK4
UserSecurityAwareness.ppt awareness of security
UserSecurityAwareness.ppt awareness of securityUserSecurityAwareness.ppt awareness of security
UserSecurityAwareness.ppt awareness of security
nicealipk
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
Information security awareness
Information security awarenessInformation security awareness
Information security awareness
CAS
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
Kaushik Patra
Hacking
HackingHacking
Hacking
Virus
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
djkhatri
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
djkhatri
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy

Hacking

  • 2. Objectives of Hacking and Cracking What is Hacking? Difference between Hacking and cracking Types of Hackers Types of Hacking Techniques Preventive measures Some Cracking Examples
  • 3. HACKING Authorized or Unauthorize attempts to bypass the security mechanisms of an information systems or network In simple words Hacking means finding out weaknesses in a computer or computer network
  • 5. Why do people hack ? To make security stronger (Ethical hacking) Just for fun Steal important information Destroy enemys computer network For Fame
  • 7. White-hat Hackers The good guys who identify the security weakness of the system or network and inform the owner about them
  • 8. Black Hat Hackers A black hat is the villain or bad guy, who crash into victims security to steal information and destroy the victims security network.
  • 9. Grey hat Hackers A grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers
  • 11. Pretexting: Pretexting is the act of been that u r not to release information (e.g. date of birth, Social Security Number, last bill amt.) Phishing: Phishing is an e-mail fraud method in which the perpetrator sends out email in an attempt to gather personal and financial information from recipients. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details .Ebay and PayPal are two of the most targeted companies, and online banks are also common targets
  • 12. Language of hackers - Leet 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x
  • 13. Example: 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|| 1 h4ck3d 1n I did not hack this page, it was like this when I hacked in.
  • 14. World famous hackers Stephen Wozniac Tsutomu Shimomura
  • 15. Kevin Mitnick Kevin Poulsen
  • 16. Random Fact !!!! The average age group of hackers are aged between 14-24 yrs.
  • 17. Did you know ? Social networking sites like FACEBOOK, GMAIL, YAHOO comprised of 60% of direct or indirect hacking incidents.
  • 18. Most popular virus Links involving private pictures of celebrities. Links showing pictures of famous personalities like videos of Osama Bin Ladens killing.
  • 21. Preventive measures Install a strong anti-virus with full security from internet, removal memory etc. Avoid disclosing personal details like phone number, credit card details to strangers. A good firewall (Sygate personal) A good spy ware / Trojan buster. Use of genuine software
  • 22. How to become Hacker The best approach is to gain as much knowledge about stuff as you can. Good command over C / C++ / Perl will definitely help. But above all you need a good logical brain
  • 23. Some Examples of Cracking Windows Cracking 1) Windows Logon password Breaking
  • 24. Window log on password breaking To hack windows login password, reboot and wait for the message: When we see the boot menu on the screen, press F2 or F12 before Starting Windows 9x . The boot menu will come up. Select option to boot into DOS . C:>cd windows C:windows>ren *.pwl *.xyz // RENAME Or delete them by typing C:windows>del *.pwl *.xyz //DELETE
  • 25. Easy and Simple approach On many computers a series of keystrokes may crash the password program. keep pressing ESC 15 to 20 times . This will result in the crashing of the password program and the computer will continue booting . BY BOOTING We can break into a computer by using live tools like conboot live cd which are readly available on internet .The live cd can be used to make a bootable pen drive and then we can break into any computer.