You are on page 1of 11

TECHNICAL SEMINAR PRESENTATION

NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

HACKING A NEW
PERSPECTIVE

Advisor
Mr. Indraneel Mukhopadhyay

AJIT KUMAR ROLL# CS200118203 [1]


TECHNICAL SEMINAR PRESENTATION
INTRODUCTION
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

Hacking is the method of breaking into information system


without proper authentication and permission.Hacking community
is basically divided into four groups :-

1. Hackers
2. Crackers
3. Phreaks
4. Script Kiddies

AJIT KUMAR ROLL# CS200118203 [2]


TECHNICAL SEMINAR PRESENTATION
HACKING TECHNIQUES
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

1. Password Cracking.

2. Sniffing .

3. Spoofing.

4. Scanning.

5. Denial -of -services.

AJIT KUMAR ROLL# CS200118203 [3]


TECHNICAL SEMINAR PRESENTATION

PASSWORD CRACKING
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

Different password cracking method are :-

1.Dictionary Attack.
2.Brute force attack.
3.Sniffing.

Some popular password cracker :-

1. Cracker.
2. John the Ripper.
3. L0phtCrack.

AJIT KUMAR ROLL# CS200118203 [4]


TECHNICAL SEMINAR PRESENTATION
SNIFFER
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

Sniffer is a program or tool that captures information over


computer network.Sniffer is of two types commercial and
underground .

COMMERCIAL SNIFFER can be used for :-


1. Fault analysis to detect problems in a network.
2. Performance analysis to detect network bottleneck.

UNDERGROUND SNIFFER can be used for :-


1. Confidential information such as e-mail message.
2. Financial data such as credit card numbers.

AJIT KUMAR ROLL# CS200118203 [5]


TECHNICAL SEMINAR PRESENTATION
HACKING WINDOWS XP
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

1. EXPLORER.EXE
2. REGISTRY

EXPLOIT THROUGH REGISTRY


i) Secure Desktop Restriction
ii) Automatic Logon to XP
iii) Remove Active Desktop Options from the Settings Menu
iv) Remove Run from the Start Menu
v) Hide the Screen Saver Settings Page
vi) Restrict Changes to User Folder Locations

AJIT KUMAR ROLL# CS200118203 [6]


TECHNICAL SEMINAR PRESENTATION
LOOPHOLES IN WINDOWS XP
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

Win2k Boot Disc Can Bypass Windows XP Passwords

Bypass the CMOS Password

Absence of Firewall

Absence of Antivirus

AJIT KUMAR ROLL# CS200118203 [7]


TECHNICAL SEMINAR PRESENTATION
INTERNET HACKNIG TOOLS
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

1. Telnet
2. Domain Name System
3. Port
4. Ping
5. Tracert
6. Netstat

AJIT KUMAR ROLL# CS200118203 [8]


TECHNICAL SEMINAR PRESENTATION
SENDING FAKE E-MAIL
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

1. Return – path
2. Received
3. From
4. To
5. Subject
6. Date

AJIT KUMAR ROLL# CS200118203 [9]


TECHNICAL SEMINAR PRESENTATION
CONCLUSION
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

Windows XP is one of the most widely used Operating system in


the world so it is important to learn the security and loopholes.
Here we learned the different tool and techniques used for
hacking.This knowledge is very much helpful for administrator
who maintain the system in an organization. Using registry we
can hack the Windows XP locally. The access to explorer.exe is
one of the greatest loophole in windows through which we can
exploit Windows XP.Apart from this we learned about hacking
related to internet security. At last we learn about prevention ,one
should take to overcome this flaws.

AJIT KUMAR ROLL# CS200118203 [10]


TECHNICAL SEMINAR PRESENTATION
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

THANK YOU

AJIT KUMAR ROLL# CS200118203 [11]

You might also like