Professional Documents
Culture Documents
security
Hacking.
What
is Hacking ?
Hacking/Computer
Hacking.
Infringement:etc.; violation.
WHO IS A HACKER?
WHO IS A HACKER?
The term Hacker was initially coined by the Model Railroad club at MIT. It generally
referred to any method or solution that functioned when referring to any type of
electronics or mechanical problems. The term eventually spread to include computer
hobbyists.
Back then, anybody who had an interest in programming or computing was
considered a "hacker". Perhaps a similar work would be "tinkerer" - someone who
liked to tinker with electronics, programming, general computing, etc...
The term was given a derogatory meaning by the media who portrayed criminals who
used similar skill sets as "hackers". Most people who consider themselves to be
Hackers today find this use unacceptable and will argue that the correct term for
these individuals is "Crackers" - people who crack security/software.
On hearing the word HACKER most of the peoples are scared. Most of them think of
hacker as a computer vandals. But hackers are not computer criminals. Traditionally,
hackers were computer geeks who know almost everything about computers both
hardware and software and are widely respected for there knowledge.
Introduction To Ethical
Hacking.
What
is Ethical Hacking?
Who Is Cracker?
is the means of bypassing a security system for the means of accomplishing a task that is prohibited
by the service or a machine.
Examples would be:
Deleting someone else's Facebook/Bebo/Myspace account
Getting
onto someone else xbox live account when the account info has been kept secret (this is only
hacking, if they get into the system themselves such as Xbox.com Admin)
Stealing
Stealing
Provides
Security
Identify
Loop Holes.
Can
Deface Websites.
Can
Inject Websites
Can
Spread Viruses
etc
Literal Definitions
Hacker :
Someone who uses hacks.
Cracker :
some one who destructs
things.
Hacks :
A different approach with
some significant advantage over the
current approach
Why do people
hack ?
To make security stronger ( Ethical
Hacking )
Just for fun
Show off
Hack other systems secretly
Notify many people their thought
Steal important information
Destroy enemys computer network
Types of Hackers
White-hat Hackers
The
Black Hat
Hackers
A black hat is the villain or bad
Grey hat
Hackers
A grey hat, in the hacking
Language of
hackers
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|\| -> n
|\/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
Example:
1 d1d n0t h4ck th1s p4g3, 1t w4s
l1k3 th1s wh3|\| 1 h4ck3d 1n
World famous
hackers
Stephen
Wozniac
Tsutomu
Shimomura
Kevin
Mitnick
Kevin
Poulsen
Female hacker
Cyber War
Welcomes to cyber
weapons list
Hacktivism
EXAMPLE OF
HACKTIVISM
INDIAN CYBER ARMY
Hacked by Pakistan
cyber army
Continue..
Cyber Attacks
There were two such instances between India and Pakistan that involved
cyberspace conflicts, started in 1990s. Earlier cyber attacks came to known
as early as in 1999. Since then, India and Pakistan were engaged in a longterm dispute over Kashmir which moved into cyberspace. Historical
accounts indicated that each country's hackers have been repeatedly
involved in attacking each other's computing database system. The number
of attacks has grown yearly: 45 in 1999, 133 in 2000, 275 by the end of
August 2001. In 2010, Indian hackers laid a cyber attack at least 36
government database websites going by the name "Indian Cyber Army". In
2013, Indian hackers hacked the official website of Election Commission of
Pakistan in an attempt to retrieve sensitive database information. In
retaliation, Pakistani hackers, calling themselves "True Cyber Army" hacked
and defaced ~1,059 websites of Indian election bodies.
According to the media, Pakistan's has been working on effective
cyber security system, in a program called the "Cyber Secure Pakistan"
(CSP).The program was launched in April 2013 by Pakistan Information
Security Association and the program as expanded to country's universities
he reasons for the Indian attack was that today is the 5th anniversary
of the 26/11 terrorists attacks on Mumbai.
Mirror:-http://www.zone-hack.com/134702.html
Deface Link:-https://www.centralbankofindia.co.in/site/
Poonam
Poonam
Heya
Hacker
The
Electric Army
On the 10th Birthday Of Facebook ,Its
Domain Got Hacked By Pro Hacker
Group Known as Syrian Electric
Army.
Hackers Penetrated Markmonitor and
Hacked Domain Panel Of
Facebook.com.
Anonymous
HACKED BY
ANNONYMOUS
Anonymous Facts..
Ethics of hacking
The
SOCIAL ENGINEERING
HISTORY OF SOCIAL
ENGINEERING
the
Social Engineering
Toolkit
Google Hacking
Google algorithm
Google Hacking
Operators
Intitle:
Google returns results
with the word/phrase
found within the title
of the page
Intitle:index.of
Inurl:
Finds a specific term
within the URL
Inurl:view/index.shtml
Filetype:
Searches for a
specific filetype
filetype:pdf
filetype:txt
Google
Hackingapgproach
We
inurl:viewerframe?mode=motion
Gmail hacking
Gmail
hacking step
1).Gmail login page
2).webhosting
website
3).hacking script
Most popular
virus
Links
involving private
pictures of celebrities.
Links showing pictures of
famous personalities like
Gaddafis dead body or
videos of Osama Bin Ladens
killing.
Creating virus
Jps
virus maker
Another popular
scam
Facebook lottery scam.
Website hacking
We can bypass website one of the following ways:
#Sql injection
Popular Hacked
sites
Some admin
passwordasswords
some
username:root,tiger,unix,admin
Password:toor,scott,linux,passw
ord
Preventive
measures
Install
a strong anti-virus
Always run a anti-virus check before
you download a program or a file
from the internet.
Avoid disclosing personal details like
phone number, credit card details to
strangers.
Phone phreaking
A
Continue
Senior
to the Government
ofIndia, a demand for 4.7 lakh
Cyber Security Professionals is
estimated by2015....Ethical
Hackinghas become the need of
the hour for not only corporate
organizations, but also for
government departments.