You are on page 1of 11

c

cccccccc ccc
 cc
  c
c

c c c c c c c c cc
c c c c c c c c c c cccccc
c c c c c c c c c c cccccc
cc
c
 c

Hacking is the said to be the real war field in this era. It is the war between the
ethical hackers and the non-ethical hackers.͟Hacker͟ is a word that has two
meanings .Traditionally a hacker is someone who likes to think with software or
electronic systems. Hackers enjoy exploring how computer systems operate. They
love discovering new ways to work electronically. Recently, hacking has taken on
a new meaning-someone who maliciously breaks into systems for personal gain.
Technically these criminals are called crackers(criminal hackers).Crackers break
into systems with malicious intent. They are out for personal gain, fame, profit
and even revenge. They modify, delete and steal critical information ,often
making other people miserable.

Ethical hacking-also known as penetration testing or


white hacking-involves the same tools, tricks and techniques that hackers use. But
one with the major difference: ethical hacking is legal. The intend of ethical
hacking is to discover vulnerabilities from a hacker͛s viewpoint so systems can be
better secured. Black hat hacker is one who breaks into networks or computers,
or creates computer viruses, which leads to the total break-down or
malfunctioning. They are specialized in unauthorized penetration. They use
hardware bugs, malicious programs ,viruses and they mostly uses the ͞back door
penetration͟ for their entry. Password cracking, spoofing and sniffing are the
main techniques that the hackers use.

The good guys(white-hat) hackers don͛t like being in the same


category as the bad guy(black-hat) hackers. The mind-set and the motives of both
are of different aspects. So in-order to resist the problems caused by the Black
hat, the White hat hackers are used against them because - ͚u uu

uu   u


 cc c
Y black hat hacker, also known as a cracker or a dark side hacker (this last
definition is a direct reference to the Star Wars movies and the dark side of the
force), is someone who uses his skills with a criminal intent. Some examples are:
cracking bank accounts in order to make transferences to their own accounts,
stealing information to be sold in the black market, or attacking the computer
network of an organization for money.

They also may distribute computer viruses, Internet


worms, and deliver spam through the use of botnets. The term may also refer to
hackers who crack software to remove protection methods: copy prevention,
trial/demo version, serial number, hardware key, date checks, CD check (NO-CD)
or software annoyances like nag screens and adware.

Some famous cases of black hat hacking include Kevin


Mitnick, who used his black hat hackers skills to enter the computers of
organizations such as Nokia, Fujitsu, Motorola and Sun Microsystems (it must be
mentioned that he is now a white hat hacker); Kevin Poulsen, who took control of
all the phone lines in Los Yngeles in order to win a radio contest (the prize was a
Porsche 944 S2); and Vladimir Levin, which is the handle of the mastermind
behind the stealing of $10'000,000 to Citigroup.

cc c

White hat hackers, also known as "ethical hackers," are computer security
experts, who specialize in penetration testing, and other testing methodologies,
to ensure that a company's information systems are secure. Such people are
employed by companies where these professionals are sometimes called
"sneakers.͞.Groups of these people are often called tiger teams or red teams.
These security experts may utilize a variety of methods to carry out their tests,
including social engineering tactics, use of hacking tools, and attempts to evade
security to gain entry into secured areas.

The National Security Ygency offers certifications such as the CNSS 4011. Such a
certification covers orderly, ethical hacking techniques and team management.
Yggressor teams are called "red" teams. Defender teams are called "blue" teams.
c

c c c!ccc "!#c!c!#c

The difference between black hat and white hat hackers is that white hat hacker
uses their skills and knowledge as a way to defend someone from attackers. That
means that white hat hackers offer their services to corporations, public
organizations and educational institutions.

These services include a complete revision of their computer network security,


implementation of new security systems (they may be hardware or software),
user training and future recommendations. Yll these measures will be able to
combat unauthorized hacking; black hat hackers, however, will continue trying.

j  

Y
    
            
 
    
           
                 
 
                   

      


  

   
  
      

    
           
  
            
     
             
              

   
                 

       
  
         
 
 !             
 
                    Y

                
    Y
             

       


 " # 

                

 
            

         


        
            !    

                   
                    

                  Y
  
              

        
      
         

     
              $      
                  
    

c$ c %&c

It͛s a simple procedure, but if done in a master͛s way a lot of gain could be made
out of .It͛s the method by which directs the user who owns an account in the web
to the illegal path, by which a hacker can get the password of the victim and have
an access over his account.

Now this seminar deals with the simplest way how a black hat hacker uses to hack
an account.

cccccccccc '
c'(c c
c
`c "!#c !c !#)c*c*c !#c*c!c*+,-...c

`c !#**c"*/cc0+c

`c *c*c*"c *c!c*+,-....c

!1c c c+-,...c

The gpedit.msc is an the settings of a computer system. Many of the viruses


created by the black hat hackers directly disables this settings.Ynd to overcome
this effect one must what the gpedit.msc is and must be ready to clerar the error
caused by this virus.

For this one must go to the start ->run->and type in gpedit.msc

c
c

c
It is the registry edit key tag given at the run command. by doing so a screen may
pop out like this giving instruction to move to the registry. The necessary changes
could be thus given at the regedit and more by adding a dword or any other. The
further changes in the system could be thus defined. The user can give the
additional changes so as hack a system or prevent anyone from hacking the
system.

c
c

')  cc'$2 'c


In recent years, the terms black hat and white hat have been applied to the
Search Engine Optimization (SEO) industry. Black hat SEO tactics, also called
spamdexing, attempt to redirect search results to particular target pages in a
fashion that is against the search engines' terms of service, whereas white hat
methods are generally approved by the search engines.

Some of the blackhat SEO tactics include: keyword stuffing, hidden text and links,
doorway and cloaked pages, link farming and blog comment spam

 c 34c

Suppose u want to search google for a forum then simply write :-

inurl:forum

i mean to say whenever u want to search something in url den type : -

inurl:desired thing

Whenever u have to search in text right :-

intext:desired thing

if u want 2 search any website's login page then type

intext:login inurl:website address

Now supose u want to search a PDF , DOC , PPT on the internet then write this in
google -:

filetype:pdf

there are many more things in SEO ͙

c c!#/c
*c!#5!"c*c c!#6c

Dos Yttacks or Denial Of Services Yttack have become very common


amongst Hackers who use them as a path to fame and respect in the underground
groups of the internet. Denial Of Service Yttack basically means denying valid
internet and network users from using the services of the target network or
server. It basically means, launching an attack, which will temporarily make the
services, offered by Network unusable by the legitimate users.

This part deals with how to hack a website or web server using the Dos attack
Hacking techniques.

c7& c c

Deals with the part how a virus attacks a system and also deals with how to get
rid of the harmful viruses by easy methods of hacking.

So that you can overcome the viruses without an antivirus in your system.

2' 
c 

Deals with the part of how to hack a mobile by the easy steps of hacking.

Gives how to track your phone if lost͙

2 *c*c!!#c*c c
 cc c
Password cracking doesn͛t always involve sophisticated tools.It can be as simple
as finding a sticky note with the password written on it stuck right to the monitor
or hidden under a keyboard. Ynother crude technique is known as ͞dumpster
diving͟, which basically involves an attacker going through your garbage to find
discarded documentation that may contain passwords.

Yttacks can involve far greater levels of sophistication. Here are some of the more
common techniques used in password cracking.

*!c!!#c

Y simple dictionary attack is by the fastest way to break into a machine. Y


dictionary file (a text file full of dictionary words) is loaded into a cracking
application(such as LOphtCrack).which is run against user accounts located by the
application. Because of the majority of passwords are often simplistic, running a
dictionary attack is often sufficient to the job.

c!!#cc

Ynother well-known form of attack is the hybrid attack.Y hybrid attack will add
numbers of symbols to the filename to successfully crack a password. Many
people change their passwords by simply adding a number to the end of their
current password. The pattern usually takes this form:first month password is
͞cat͟:second month password is ͟cat1͟:third month password is ͞cat2͟:and so on.

c*c!!#c

Y brute force attack is the most comprehensive form of attack, though it may
often take a long time to work depending on the complexity of the password.
Some brute force attacks can take a week depending on the complexity of the
password. LOphtcrack can also be used in a brute force attack.

'2c'(cc''
c  c& c'c  c'cc 8 2c
One of the most popular tools is the LOphtcrack(now called LC4). LOphtCrack is a
tool that allows an attacker to take an encrypted Windows NT/2000 passwords
and convert them to plain text. Windows NT/2000 passwords are in
cryptographic hashes and cannot be read without a tool like Lophtcarck . It works
by attempting every alphanumeric combinations possible to try to crack the
passwords.

Ynother commonly used tool is a protocol analyzer(better known as network


sniffer, such as Sniffer Pro or Etherpeek),which is capable of capturing every piece
of data on the network segment to which it is attached. When such a tool is
running in promiscuous mode it can ͞sniff͟ everything going around that segment
such as logins and data transfers. Ys this can seriously damage network security
allowing attackers to capture passwords and sensitive data.

Password and user account exploitation is one of the largest isuues in the network
security. Yttacks on a company or organisation͛s computer systems take many
different forms, such as spoofing,smurfing,and other types of denial of
service(Dos) attacks.these attacks are designed to harmor interrupt the use of
your operational systems.Password cracking is a term used to describe the
penetration of network,system or resource with or without the use of tools to
unlock a resource that has been secured with a password.

You might also like