You are on page 1of 29

Main Topic-:Cyber Crime

Sub topic-: HACKING


TABLE OF CONTENTS

 HISTORY OF HACKING
 WHO ARE HACKERS
 WHAT HACKERS LOOK FOR
 BASIC KNOWLEDGE REQUIRED
TROJANS
 FIREWALL
 EMAIL HACKING
 VIRUSES
CRACKERS
HACKING TOOLS
RECENT HACKING METHODS
OPERATING SYSTEMS USED
 HACKED WEBSITES
 CONCLUSION
HISTORY OF HACKING
Hacking has been around for more than a century. In the 1870s,
several teenagers were flung off the country's brand new phone
system by enraged authorities. Here's a peek at how busy
hackers have been in the past 35 years.
When computers were invented there quickly emerged a need
to protect information stored on these computers.. Hackers
developed from curious people who desired to breach this form
of electronic privacy.
Click Here To Know more About History Of Hacking
WHO ARE HACKERS
Hacker is "Any person who derives joy from discovering ways to
circumvent limitations.“


A person intensely interested in the arcane and recondite
workings of any computer operating system.


Most often, hackers are programmers. As such, hackers obtain
advanced knowledge of operating systems and programming
languages. They may know of holes within systems and the reasons
for such holes.


Hackers constantly seek further knowledge, freely share what
they have discovered, and never, ever intentionally damage data.
WHAT HACKERS LOOK FOR
> Credit Information
> Any accounting data
> Data bases
> Mailing Lists
> Personal Addresses
> Email Addresses
> Account Passwords
> Home /Office Information
> Resumes
> Email
> Any Company Information / Services He Can Access
> Your or spouse's first and last name
> Children's names / ages
> Your address
> Your telephone number
> Letters you write to people
> Your personal resume
> Your family pictures
> Personal work
> Any official accounts / information
Basic knowledge required

HACKING

UNIX HEX EDITORS

PYTHON DOS
ASSEMBLY
LANGUAGES
H A C K IN G

G A IN IN G A C C E S S D E S T R O Y IN G T A R G E T

KEY LO GGER S V IR U S

PO R T SC AN N ER S W A R S C R IP T S

T R O JA N S

E M A IL B O M B S
TROJANS
A Trojans can also be called RAT's, or Remote
Administration Tools.
A destructive program that masquerades as a
benign application.
Trojan horses do not replicate themselves like
viruses but they can be just as destructive.
TYPES OF TROJANS
•Remote Access Trojans.
•Password sending Trojan.
•Key loggers.
•Destructive Trojans.
•FTP Trojans.
WORKING OF
TROJANS
Password Sending Trojans
The purpose of these Trojans is to rip all cached passwords and other information too like ICQ number
computer info and so on and send them to specified e-mail without letting the victim about the e-mail.

Key loggers
They log the keys that the victim is pressing and then check for passwords in the log file.

Destructive
The only one function of these Trojans is to destroy and delete files. This makes them very simple and
easy to use. They can automatically delete all your .dll or .ini or .exe files on your computer.

FTP Trojans
These Trojans open port 21 on your computer letting EVERYONE that has a FTP client to connect to
your computer without password and will full upload and download options.
The main purpose of a Firewall is to prevent unauthorized access
between networks.

What is a FIREWALL?
A firewall is any mechanism that acts to restrict access to a
network according to a set of defined rules.
Function as “front doors” to a network.

Firewalls are an effective start to securing a


network. Not a finish.
WHY FIREWALL
A firewall has some general responsibilities:
* If a particular action is not allowed by the
policy of the site, the firewall must make sure
that all attempts to perform the action will fail.
* The firewall should alert internal
administration of all cracking attempts.
* The firewall should log suspicious events.
EMAIL HACKING
Key logger
A key logger copies all the buttons pressed by the victim in a .txt file, all
you need is access to the victims PC with a Trojan or even yourself.

Trojan
Some Trojans have an option that gets the victims passwords and usernames by
pressing a button.

MSN porgies
There are some MSN programs for that job , you send to your victim a file
that's 12Kb and when they run it, the victim sends you automatically the user
and the password.
EMAIL BOMBS
The e-mail bomb is a simple and effective harassment tool.
Bomb track
Is first mail-bombing tool written for the Macintosh platform.
Kaboom
The most popular bomber out there. It uses minimal resources, does a superb job,
has a simple user interface, and attempts to obscure the attacker's source address.

Some other popular email Bombers are:


Avalanche
Extreme Mail
The Homicide
Up Yours
VIRUS

A Virus is an independent program which reproduces


itself.

Often a weapon of the hacker.


Viruses are used to destroy rival systems of the hacker, or
destroy other systems.
One virus may do nothing but e-mail out to a few
specific IP addresses.
CRACKERS
 A cracker is a person who
breaks into or otherwise
violates the system integrity
of remote machines, with
malicious intent. Crackers,
having gained unauthorized
access, destroy vital data,
and cause problems for
their targets. Crackers can
easily be identified because
their actions are malicious.
Recent Hacking Methods
BINDS/DNS vulnerability
Obtain a root shell remotely
IMPAD
Obtain a root shell remotely
SNIFFERS
Snatch passwords from Net
RootKits
Cook Book Hackers
TOP 10 HACKERS
Black Hat Crackers
• Jonathan James
• Adrian Lamo
• Kevin Mitnick
• Kevin Poulsen
• Robert Tappan Morris
White Hat Hackers

• Stephen Wozniak
• Tim Berners-Lee
• Linus Torvalds
• Richard Stallman
• Tsutomu Shimomura
OPERATING SYSTEMS USED
Jonathan James Case
•James gained notoriety when he became the first juvenile to be
sent to prison for hacking. He was sentenced at 16 years old.
•In an anonymous PBS interview, he professes, "I was just looking
around, playing around. What was fun for me was a challenge to
see what I could pull off.“
•James's major intrusions targeted high-profile organizations. He
installed a backdoor into a Defense Threat Reduction Agency
server.
•The DTRA is an agency of the Department of Defense charged
with reducing the threat to the U.S. and its allies from nuclear,
biological, chemical, conventional and special weapons. The
backdoor he created enabled him to view sensitive emails and
capture employee usernames and passwords.

• James also cracked into NASA computers, stealing
software worth approximately $1.7 million.
According to the Department of Justice, "The
software supported the International Space Station's
physical environment, including control of the
temperature and humidity within the living space."
NASA was forced to shut down its computer systems,
ultimately racking up a $41,000 cost. James
explained that he downloaded the code to supplement
his studies on C programming, but contended, "The
code itself was crappy . . . certainly not worth $1.7
million like they claimed."
Legion of Doom (LOD)
• Members:Franklin Darden a.k.a The Leftist, Adam
Grant a.k.a The Urvile , Robert Riggs a.k.a The
Prophet)
•  Arrested:           July 21, 1989
•  Charged:           1989
•  Convicted:         1990
• Crime: Cracking into Bell South's Telephone
(including 911) Networks - possessing proprietary
BellSouth software and information, unauthorized
intrusion, illegal possession of phone credit card
numbers with intent to defraud, and
conspiracy.  From the Government's Sentencing
Memorandum: "BellSouth spend approximately
$1.5 million in identifying the intruders into their
system and has since then spent roughly $3
million more to further secure their network." 
• Sentences:  Frank Darden (24): 14 months, Adam
Grant (22): 14 months, Robert Riggs (22): 21
months. Collectively ordered to pay $233,000.00
in restitution.
HACKED WEBSITES
Year Websites Hacked
1981 213
1985 1961
1989 159,000
1993 2,056,000
1997 36,000,000
2001 90,500,000

Click Here To see a Graphical View


CONCLUSION
The competition between protecting and hacking is
becoming serious.
To follow the path:
Look to the master,
Follow the master,
Walk with the master,
See through the master,
Become the master.

So, if you want to be a hacker, repeat the


following things until you believe them.
12/08/21 29

You might also like