Upload
eric-watson
View
224
Download
4
Embed Size (px)
Citation preview
1
2Aug-2010Aug-2010
3
بسم الله الرحمن الرحيمبسم الله الرحمن الرحيم
والصالة والسالم على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه
:أجمعين أما بعد
- ينضم إلى عالم الشبكة نقدم اليوم تقريرا مصغرا عن عالم ضخم بل ضخم جدا
كثيرا ما نسمع عن الهاكرز ومعظمنا ال ".Hackers" العنكبوتيه ، وهو عالم الـهاكرز
يعلم شيء عن اآلليات التي يستخدمونها في عملهم ولكننا هنا سنتعرف على هذا
بالمتاهات و التي قد ال يستطيع تصورها بعض األشخاص العالم المظلم المليء
- ذو ان من تعلم فنون الذين ال علم لهم في هذه األمور االختراق اصبح يملكـ سالحا
الحدين هو الشخص نفسه صاحب الخبره فيمكن أن حدين والذي يحدد هذين
يستعمل علمه بالخير وبما يرضي الله ويمكن أن يستعمله بالشر وبما يغضب الله
عز وجل وكل هذا سوف يتم عرضه الحقا .
4
1.1. ............................................................................................................ .......................... .......... TerminologyTerminology
2.2. ............................................................................................. .................... ............... Types of hackersTypes of hackers
3.3. .... .... ...................................................................... .................................................... ToolsTools of hackers of hackers
4.4. …………………………………….........………………..… Methods of hacker .........………………..… Methods of hacker
5.5. …………………………………………………….........……….........………............ ............ Hackers DateHackers Date
6.6. ..……. ......... ..……. ......... The Difference between hackers &caracarasThe Difference between hackers &caracaras
7.7. ............... ............... ...................................................................................... Méthodes of hackersMéthodes of hackers
8.8. ......................... ......................... ..............................................................................................PreservationPreservation
5
hackers history falls into three phases:
1. Before 1969 .
2. The golden age of hackers 1980-1989.
3. Hackers Great War 1990-1994.
6
HackersHackers Meaning of the word hackers is the meaning of positive and Meaning of the word hackers is the meaning of positive and
means, very briefly a professional programmer.means, very briefly a professional programmer.
It was launched on the floor of skilled programmers who are It was launched on the floor of skilled programmers who are
able to deal with computer problems, experience and expertise able to deal with computer problems, experience and expertise
solving problems and problems of programming on a voluntary solving problems and problems of programming on a voluntary
basis oftenbasis often
Type of hackers:Type of hackers:
(White hat hacker)(White hat hacker)..
(Black hat hacker)(Black hat hacker)
(Grey hat hacker)(Grey hat hacker)..
7
CrackersCrackers Password Crackers is a word synonymous with the word Password Crackers is a word synonymous with the word
hackershackers
They are people who are forced to enter the system using their They are people who are forced to enter the system using their
methods and skills based on error detection code left by the methods and skills based on error detection code left by the
hackers to break the policy of reverting to their programs and hackers to break the policy of reverting to their programs and
policies subversive codes may be used various means to reach its policies subversive codes may be used various means to reach its
goal of sabotage on the others. goal of sabotage on the others.
Type of crackersType of crackers
1.1.ProfessionalProfessional
2.2. AmateurAmateur
8
1.1. HackersHackers
Skilled programmers are able to deal with computer problems, Skilled programmers are able to deal with computer problems, experience and expertise solving problems and the problems of experience and expertise solving problems and the problems of
programming.programming.2.2. Crackers:Crackers:
Who were the people who are forced to enter the system using Who were the people who are forced to enter the system using their methods and skills based on error detection code Hackers effects their methods and skills based on error detection code Hackers effects
of their programsof their programs..3.3. Server :Server :
Is an executable file format Is an executable file format EXEEXE extension is often a hacker sent extension is often a hacker sent to the victim to be between him and his computer a link to enable to the victim to be between him and his computer a link to enable
direct control of it.direct control of it.4.4. ReportReport
Is a transmission of information stored inside the device the victim Is a transmission of information stored inside the device the victim to the hacker, and occurs after the victim open to walk far, which has to the hacker, and occurs after the victim open to walk far, which has
been acknowledged and most types of traffic Fir at provide Report this been acknowledged and most types of traffic Fir at provide Report this uniform and there are several ways of reporting, including: by e-mail, uniform and there are several ways of reporting, including: by e-mail,
through the pages, CGI, through site of thethrough the pages, CGI, through site of the
no- ip. comno- ip. com.
9
5.5. CGI CGI :- :- Is a hacker designed the pages and submit them to sites hosted by free or paid and is Is a hacker designed the pages and submit them to sites hosted by free or paid and is
intended to receive the Report by Sir fled without errors or problemsintended to receive the Report by Sir fled without errors or problems6.6. BackDoor:BackDoor: Is the process of reverse connection used only take up this profession and be Is the process of reverse connection used only take up this profession and be
based on the operation of specific files in a device of the victim or the victim at based on the operation of specific files in a device of the victim or the victim at the site without his knowledge have an impact and a big role in breaking down.the site without his knowledge have an impact and a big role in breaking down.
7.7. Shell:Shell: Script is a software written in PHP (programming web pages) is used to control Script is a software written in PHP (programming web pages) is used to control
the sites that have been raised by making a Bal Gelb Rossi and the main types the sites that have been raised by making a Bal Gelb Rossi and the main types C99, Re57Shell, My Shell, is the first type is best for beginners .. The second C99, Re57Shell, My Shell, is the first type is best for beginners .. The second type of professional competence, and is often applied in the gaps PDF File type of professional competence, and is often applied in the gaps PDF File Include mainlyInclude mainly
8.8. Gap:Gap: Is a software error in the design of the site is often a hacker to search for these Is a software error in the design of the site is often a hacker to search for these
errors and useerrors and use .. .. Among the most famous of these errors SQL Injections, Perl, Among the most famous of these errors SQL Injections, Perl, CGI, File IncludeCGI, File Include..
..
10
9.9. Encryption:Encryption:
Is a process server, edit the values through the Hex in order to Is a process server, edit the values through the Hex in order to
enable a server to skip the protection systems installed on the victim enable a server to skip the protection systems installed on the victim
machine, and is changing the numbers of certain lines to be machine, and is changing the numbers of certain lines to be
determined by the hackerdetermined by the hacker
10.10.IP( IP( internet protocol):internet protocol):
Is the number consists of four sections representing the address Is the number consists of four sections representing the address
of each device connected to the Internet, may be either a fixed of each device connected to the Internet, may be either a fixed
address such as lines of DSL, or the address of a variable for each address such as lines of DSL, or the address of a variable for each
time he lines connect to the internet, such as the Dial-UP.time he lines connect to the internet, such as the Dial-UP.
11
1.1. Some hackers engaged in espionage as a hobby and an opportunity to Some hackers engaged in espionage as a hobby and an opportunity to
show the possibilities and the challenge of self and others practiced this show the possibilities and the challenge of self and others practiced this
work out to achieve several objectives including the following: work out to achieve several objectives including the following:
2.2. To obtain money through the theft of banking information such as account To obtain money through the theft of banking information such as account
numbers or credit cards. \numbers or credit cards. \
3.3. To obtain information or photographs for purposes of extortion motivated To obtain information or photographs for purposes of extortion motivated
by financial or diversionary threat some girls or young, if not responded to by financial or diversionary threat some girls or young, if not responded to
the demands of diversionary or financial. the demands of diversionary or financial.
4.4. Access to files as beautiful as Alorcamax or PowerPoint files, sounds or Access to files as beautiful as Alorcamax or PowerPoint files, sounds or
images, or. images, or.
5.5. Demonstrate the ability to break through and address the obstacles and Demonstrate the ability to break through and address the obstacles and
the opportunity to be proud of securing a victory in the event of a hacker the opportunity to be proud of securing a victory in the event of a hacker
to enter one of the devices or information systems. to enter one of the devices or information systems.
6.6. To obtain secret codes e-mail to allow him to spy on private messages or To obtain secret codes e-mail to allow him to spy on private messages or
theft of the name of the e-mail as a whole. theft of the name of the e-mail as a whole.
12
1. to penetrate the sites and walking Firat and forums. (Web site,
server
2. penetrate the e-mail and chat rooms.
3. hacking the ( LAN).
4. penetration of personal computers (PC).
5. Penetration through the reverse connection. Back door
6. penetration through the browser Internet Explorer.
7. Penetration through the program of music files player Real Player.
8. Penetration of random
13
Installation of firewalls and spy ware struggles such as - Nod23-KasperSky - Panda-Spy ware Doctor - Norton
Make a regular survey and comprehensive on your computer at
more frequent intervals as possible, especially if you use the I
nternet on a daily basis .?*** Do not enter suspicious sites that
hackers are using these sites such as the introduction of spy
ware to victims where the installation of spy ware file (patch)
automatically the device by simply entering the person to the site.
Do not open any email from an unknown source because hackers
are using e-mail messages to send files to the victims of spying.
14
Not keep any personal information inside your own such as letters,
photos, important files and other information such as bank account
numbers or credit card ..
Place the numbers secret, where your important files can be opened
only knows the PIN only and you.
Always try to change your password periodically is porous.
Make sure to lift the cable Internet connection after the completion of
the use of the Internet.Not receiving any files during the (chat) from people who are not trusted, especially if these files carry over (exe) such as (love.exe)
or that the files are with such Alamtdadin (hammed .pif.jpg) and be
like these files is grown spy ware programs on your computer through
which he can count on hackers from accessing your computer and
cause harm and problems.
15
1. Web Cracker 4
2. Net Buster
3. Net Bus Haxporg
4. Bus Scong.
5. BO Client and Server
6. netbus1.70 هو األكثر شيوعا بين مستخدمي المايكرو سوفت شات .
7. SUB 7
8. Hackers Utility
9. Back Orifice
10. Deep Throat 2.0
11. Porter Scan على ارقام الـ IP و الـ Ports
12. ultrascan-15.exe
13. Zip Cracker
14. Girl Friend
16
How do you know if your computer is hacked?How do you know if your computer is hacked? At the outset you know if your computer is breaking through to determine the
changes caused by hackers in the operating system, such as opening and closing the screen automatically or the presence of new files did not enter one or delete files existed, or open Internet sites or give an order to the printer in addition to the many changes that you see and know and learn from which the presence of an intruder uses your computer ..
This way you can know from which you entered a hacker into your computer or
tha your computer properly.
Open (Start)(Start) and then of (Run). (Run).
Type the following: system. ini: system. ini
Page will appear, go to the fifth line where If you find that the line is written
like this:
exe = user. exe user. exe = user. exe user. Know that your computer has not been penetrated by hackers.?
If you find the fifth line is written so? User. exe = user. exe *** *** ***?exe = user. exe *** *** ***? you
know that your computer has been hacked by a hacker
17
Detection methods for hackers
There are many ways to detect the presence of spy ware on your computer ..
The first way:The first way:
Programs to detect spyware, viruses, use one of the detection software spyware as well as protection from spyware and hackers through the work of a firewall to prevent the entry is being ...
Of the most famous and best-detection software spyware:
Norton internet securityNorton internet security Zone alarmZone alarm MacAfee firewallMacAfee firewall The CleanerThe Cleaner
18
among the most famous and the best protection from hackersamong the most famous and the best protection from hackersZone AlarmZone Alarm Lockdowns 2000Lockdowns 2000 JammerJammer Internet Alert 99Internet Alert 99 Tiny Personal FirewallTiny Personal Firewall
19
: : RegistryRegistry بواسطة ملف تسجيل النظام
. StartStart انقر على زر البدء
- rigidityrigidity : األمر RunRun أكتب في خانة التشغيل
- : Registery EditorRegistery Editor افتح المجلدات التالية حسب الترتيب في قائمة
- HKEY_LOCAL_MACHINEHKEY_LOCAL_MACHINE
- SoftwareSoftware ثمثم MicrosoftMicrosoft
- WindowsWindows ثمثم Current VersionCurrent Version
- RunRun ثمثم Run or Run onceRun or Run once
- قم بمسح الملف كامالserver .exeserver .exe االن هل يوجد ملف باسم
- Explorer32 "C/WINDOWS\Expl32.exeExplorer32 "C/WINDOWS\Expl32.exe أو سوف تجد الملف بهذا االسم
- DataData او قد ظهر أمامه سهم صغيراو قد ظهر أمامه سهم صغير <---<---
. فهو ملف تجسس إذ ليس له عنوان معين بالو يندوز
DeleteDelete تخلص منه بالضغط على الزر األيمن للفارة ثم
20
msconfigmsconfig: بواسطة األمر
StartStart انقر على زر البدء -
msconfigmsconfig :: األمر التالياألمر التالي RunRun اكتب في خانة التشغيل -
- System Configuration UtilitySystem Configuration Utility سوف تظهر لك نافذة
- Start upStart up اختر من هذه النافذة من أعلى قسم -
- ستظهر لك شاشة تعرض البرامج التي تبدأ العمل مباشرة مع بدء تشغيل الجهاز-
افحص هذه البرامج جيدا بالنظر فإن شككت بوجود برامج غريبة لم تقم أنت بتثبيتها بجهازك فقم بإلغاء اإلشارة الظاهرة بالمربع الصغير المقابل له فتكون بذلك قد أوقفت عمل البرنامج التجسسي
.أو غيره من البرامج الغير مرغوب بها
21
By Player Dos:By Player Dos:
This method was used before the advent of Windows to show the spy files, such as patch & Trojan, one of the easiest ways:
? - Open the trampling of the Study of the MS-DOSMS-DOS to start a list of the START
? - Type the following command: C: / Windows \ dir patch .* e?C: / Windows \ dir patch .* e?
If any do the patch file to scan it in the following way:? C: \ Windows \ delete patch .*\ delete patch .*
22
Open the win.ini file is located in the Windows folder and look in the beginning of the first lines for any values similar to the following terms:
run = xxxx.exerun = xxxx.exe
run = xxxx.dl load = xxxx.exerun = xxxx.dl load = xxxx.exe
load = xxxx.dl Note that xxxx means the name of the server If load = xxxx.dl Note that xxxx means the name of the server If you find you find
any value from them immediately Vahzvha In other words, you must Postural line of the lines above in the beginning of the first lines to the
win.ini file, the afternoonDeleted this email immediately *
23
Open the file system.ini system.ini The existing windows folder and you will find in the fifth line the following
statement?
: ***** = Explorer.exe***** = Explorer.exe if your machine is infected you will find the form of the former phrase is so:
***** = Explorer.exe xxx.exe***** = Explorer.exe xxx.exe
***** = Explorer.exe xxx.exe***** = Explorer.exe xxx.exe with the knowledge that xxx is the name of the server? : Rundlll6.exe and Task_Bar.exe Rundlll6.exe and Task_Bar.exe
Found that patients do scans your name server to become only the line as follows:
*****=Explorer.exe *****=Explorer.exe
24