Download File

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Security-focused operating system wikipedia , lookup

Mobile security wikipedia , lookup

Network tap wikipedia , lookup

Cyberattack wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wireless security wikipedia , lookup

Computer security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Unix security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cybercrime wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Distributed firewall wikipedia , lookup

Transcript
PREPARED BY :
Harsh patel dhruv patel sreejit sundaram
INTRODUCTION TO HACKING

HACKING means going to into system and
exploring the hosts system and getting whatever
information you need and getting yourself out and
clearing your trails without getting yourself busted.
HACKER
 HACKER are intelligent computer professionals who
are Interested in learning advanced techniques about
operating system programming languages and
application software.

HACKER try to gain in depth knowledge of a system
and use that information to find out the possible security
gaps in a system HACKER share their knowledge with
other people and this increase security awarness.
CRACKER

CRACKER are individual who break into
computer with malicious intent .

CRACKER try to get unauthorized access into a
system and cause damage or destroy
confidential information.

They break into or otherwise violate the system
integrity of remote machines, with evil intent.
ETHICS OF HACKING


Essentially, hackers are intelligent computer programmer
Who follow an ethic:
Hackers should never harm the system they break into.
Hackers believe that:
Access to computer should be unlimited and total.
All information should be free.
Authorities should be mistrusted and decentralization
Promoted.
Hackers should create the beauty of a computer.
Hackers should be judged by their hacking skills.
TYPES OF SECURITY
Network security violations can be broadly divided into
five distinct area:
 AUTHENFICATION:
 ACCESS CONTROL:
 DATA INTEGRITY:
 DATA CONFIDENTIALITY:
 DENIAL OF SERVICE ATTACKS:
FIREWALL
 A FIREWALL is a network security system designed to
prevent unauthorized access to a private network from
any other network.

Typically, it works closely with a router program to
determine if a packet should be forwarded to
its
destination.

It also provides a proxy service that makes network
requests on behalf of the users on a network.
TYPES OF FIREWALL
 ROUTER-BASED FIREWALL:
PROXY-BASED
FIREWALL:
What does a firewall do?
 A firewall can analyze all the traffic between a network and the
Internet.
 It is examines all the traffic between two networks.
 it is routed between the networks, otherwise it is stopped.
 It checks the protocol which the packet being delivered and
also check port number to which it is being sent.
 The main function of firewall is to provide centralized access
control on how users use the network.
What can’t a firewall do?
 A firewall cannot prevent individual users with modems from
dialing into or out of the network, bypassing the firewall
altogether.
 If employee can do some mistakes so it can’t be controlled by
firewall.
 the planning of any security policy but that cannot be solved
with firewalls alone.
Who needs a firewall?
 Any person who is responsible for a private network and
connect with a public network.
 For more a person who connect so much as single computer
with internet via modem needed personal firewall.
 Many dial-up users believe that other types of protection will
protect them.They are feel that no one can break their security
in the computer.
 Some dial-up users have victims of major attacks and they lost
their files and also a lots of work.
IP-ADDRESS

Every system connected to a particular network has a
unique identification said IP address or internet
protocol address Which is just as in real world every
person has his own contact address.

Getting the internet protocol or the IP address of a
remote system is said to the most important step in
hacking of a system.
STRUCTURE OF IP ADDRESS

IP address divided into a number of classes which have
different ranges.
Class
Class
Class
Class
Class
A: 8 bits for Netid & 24 bits for Hostid.
B: 16 bits for Netid & 16 bits for Hostid.
C: 24 bits for Netid & 8 bits for Hostid.
D: 32-bit multicast Groupid.
E: Currently not in use.
ABOUT THE PORTS

Ports are virtual pipes that allow internet services
such as file transfer protocol and e-mail exchange to
share a single physical connection.

Usually hackers run a port scanning program to list
the ports available and then find out websites that
lists weakness & try to get a match for target
system.
TYPES OF PORTS
There are mainly five types of ports available.
Port No
No –21
No –23
No –25
No –80
No –125
Services
FTP
Telenet
SMPT
HTTP-appache
POP3
HOW TO HACK
There are four steps to hacking.
 Step-1: Getting access to site
Using ports through internet hacker gets
an access to target system.

Step-2: Gaining control of the system
Now hacker take the overall control of
the target system.
HOW TO HACK

Step3: Covering Traces
Hacker finds the path to hack anything in
the target system.

Step4: Keeping that Account
Hacker never use his personal account to
hack anything.
ATTITUDE OF HACKER
A true hacker has a purpose and a reason for
breaking into any box.A true hacker why is doing what
he does and is doing it for reason like knowledge free
information and access.
so if you want to be Hacker,repeat the following
things until you believe them.

The world is full of fascinating problems waiting to be
solved .
 Nobody should ever have to solve a problem twice.

Boredom and drudgery are evil.

Freedom is good.

Attitude is no substitute for competence.
BIBLIOGRAPHY

Hacking tools & techniques by NIIT.

Basics of network security, firewalls by NIIT.

Internet.
www.vicomsoft.com
www.darwinmag.com
www.5starsupport.com
www.pwcrack.com