You are on page 1of 17

Seminar on :

HACKING
Presented By :
P. SrinivaS
Contents :
 History of Hacking
 Who is hacker
 Types of hacking
 Why do hackers hack
 What hackers do after hacking
 How can be a real hacker
 How can protect the system
 What should do after hacked
 How to translate the hackers’ language
History of HACKING
The real meaning of hacking is to expand the ca
pabilities of any electronic device; to use them
beyond the original intentions of the manufacture
r.
As a matter of fact, the first hackers appeared in th
e 1960's at the Massachusetts Institute of Te
chnology (MIT), and their first victims were elec
tric trains.
They wanted them to perform faster and more effi
ciently. So, is hacking always bad? Not really. It onl
y depends on how to use it. But it wasn't until a gro
up of these hackers decided to exert their knowled
ge in the computer mainframes of the MIT.
Hacker (or) Cracker
Hack
Cut with repeated irregular blows
Examine something very minutely
Hacker
The person who hacks
Hacker means cracker nowadays
Meaning has been changed
Cracker
System intruder/destroyer
TYPES OF HACKING

 Rogue Access Points


 Back Doors
 Viruses and Worms
 TROJAN HORSES
 Sniffing and Spoofing
WHY DO HACKERS HACK
 Just for fun
 Show off
 Hack other systems secretly
 Notify many people their tho
ught
 Steal important information
 Destroy enemy’s computer ne
twork during the war
What do Hackers do after
Hacking
Patch security hole
The other hackers can’t intrude
Clear logs and hide themselves
Install rootkit ( backdoor)
The hacker who hacked the syst
em can use the system later
It contains trojan ls, ps, and so
on
What do Hackers do after
Hacking
 Install irc related program
identd, irc, bitchx, eggdrop, bn
c
Install scanner program
mscan, sscan, nmap
Install exploit program
Install denial of service program
Use all of installed programs sile
ntly
REAL HACKER
 Study C/C++/assembly lan
guage
 Study computer architectu
re
 Study operating system
 Study computer network
 Examine the hacking tools
for a month
 Think the problem of the c
omputer
HOW CAN PROTECT SYSTEM
Patch security hole often
Encrypt important data
Ex) pgp, ssh
Do not run unused daemon
Remove unused setuid/ setg
id program
Setup log host
Use switch hub
HOW CAN PROTECT SYSTEM
Setup firewall
Ex) ipchains
Setup IDS
Ex) snort
Check unintentional changes
 Ex) tripwire
 Backup the system often
WHAT SHOULD DO AFTER
What shouldHACKED
do after hacked?
Shutdown the system
Or turn off the system
Separate the system from network
Restore the system with the backup
Or reinstall all programs
Connect the system to the network
It can be good to call the police
HACKER’S LANGUAGE
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh
3n 1 h4ck3d 1n

I did not hack this page, it was like this


when I hacked in
HACKER’S LANGUAGE
1 -> i or l |\| -> n
3 -> e |\/| -> m
4 -> a s -> z
7 -> t z -> s
9 -> g f -> ph
0 -> o ph -> f
$ -> s x -> ck
| -> i or l ck -> x
ANY
QUERIES

You might also like