24
1

1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

Embed Size (px)

Citation preview

Page 1: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

1

Page 2: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

2Aug-2010Aug-2010

Page 3: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

3

بسم الله الرحمن الرحيمبسم الله الرحمن الرحيم

والصالة والسالم على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

:أجمعين أما بعد

- ينضم إلى عالم الشبكة نقدم اليوم تقريرا مصغرا عن عالم ضخم بل ضخم جدا

كثيرا ما نسمع عن الهاكرز ومعظمنا ال ".Hackers" العنكبوتيه ، وهو عالم الـهاكرز

يعلم شيء عن اآلليات التي يستخدمونها في عملهم ولكننا هنا سنتعرف على هذا

بالمتاهات و التي قد ال يستطيع تصورها بعض األشخاص العالم المظلم المليء

- ذو ان من تعلم فنون الذين ال علم لهم في هذه األمور االختراق اصبح يملكـ سالحا

الحدين هو الشخص نفسه صاحب الخبره فيمكن أن حدين والذي يحدد هذين

يستعمل علمه بالخير وبما يرضي الله ويمكن أن يستعمله بالشر وبما يغضب الله

عز وجل وكل هذا سوف يتم عرضه الحقا .

Page 4: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

4

1.1. ............................................................................................................ .......................... .......... TerminologyTerminology

2.2. ............................................................................................. .................... ............... Types of hackersTypes of hackers

3.3. .... .... ...................................................................... .................................................... ToolsTools of hackers of hackers

4.4. …………………………………….........………………..… Methods of hacker .........………………..… Methods of hacker

5.5. …………………………………………………….........……….........………............ ............ Hackers DateHackers Date

6.6. ..……. ......... ..……. ......... The Difference between hackers &caracarasThe Difference between hackers &caracaras

7.7. ............... ............... ...................................................................................... Méthodes of hackersMéthodes of hackers

8.8. ......................... ......................... ..............................................................................................PreservationPreservation

Page 5: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

5

   hackers history falls into three phases:

1. Before 1969 .

2. The golden age of hackers 1980-1989.

3. Hackers Great War 1990-1994.

Page 6: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

6

HackersHackers Meaning of the word hackers is the meaning of positive and Meaning of the word hackers is the meaning of positive and

means, very briefly a professional programmer.means, very briefly a professional programmer.

    It was launched on the floor of skilled programmers who are It was launched on the floor of skilled programmers who are

able to deal with computer problems, experience and expertise able to deal with computer problems, experience and expertise

solving problems and problems of programming on a voluntary solving problems and problems of programming on a voluntary

basis oftenbasis often

Type of hackers:Type of hackers:

(White hat hacker)(White hat hacker)..

(Black hat hacker)(Black hat hacker)

(Grey hat hacker)(Grey hat hacker)..

Page 7: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

7

CrackersCrackers Password Crackers is a word synonymous with the word Password Crackers is a word synonymous with the word

hackershackers

They are people who are forced to enter the system using their They are people who are forced to enter the system using their

methods and skills based on error detection code left by the methods and skills based on error detection code left by the

hackers to break the policy of reverting to their programs and hackers to break the policy of reverting to their programs and

policies subversive codes may be used various means to reach its policies subversive codes may be used various means to reach its

goal of sabotage on the others. goal of sabotage on the others.

Type of crackersType of crackers

1.1.ProfessionalProfessional

2.2. AmateurAmateur

Page 8: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

8

1.1. HackersHackers

Skilled programmers are able to deal with computer problems, Skilled programmers are able to deal with computer problems, experience and expertise solving problems and the problems of experience and expertise solving problems and the problems of

programming.programming.2.2. Crackers:Crackers:

Who were the people who are forced to enter the system using Who were the people who are forced to enter the system using their methods and skills based on error detection code Hackers effects their methods and skills based on error detection code Hackers effects

of their programsof their programs..3.3. Server :Server :

Is an executable file format Is an executable file format EXEEXE extension is often a hacker sent extension is often a hacker sent to the victim to be between him and his computer a link to enable to the victim to be between him and his computer a link to enable

direct control of it.direct control of it.4.4. ReportReport

Is a transmission of information stored inside the device the victim Is a transmission of information stored inside the device the victim to the hacker, and occurs after the victim open to walk far, which has to the hacker, and occurs after the victim open to walk far, which has

been acknowledged and most types of traffic Fir at provide Report this been acknowledged and most types of traffic Fir at provide Report this uniform and there are several ways of reporting, including: by e-mail, uniform and there are several ways of reporting, including: by e-mail,

through the pages, CGI, through site of thethrough the pages, CGI, through site of the

no- ip. comno- ip. com.

Page 9: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

9

5.5. CGI CGI :- :- Is a hacker designed the pages and submit them to sites hosted by free or paid and is Is a hacker designed the pages and submit them to sites hosted by free or paid and is

intended to receive the Report by Sir fled without errors or problemsintended to receive the Report by Sir fled without errors or problems6.6. BackDoor:BackDoor: Is the process of reverse connection used only take up this profession and be Is the process of reverse connection used only take up this profession and be

based on the operation of specific files in a device of the victim or the victim at based on the operation of specific files in a device of the victim or the victim at the site without his knowledge have an impact and a big role in breaking down.the site without his knowledge have an impact and a big role in breaking down.

7.7. Shell:Shell: Script is a software written in PHP (programming web pages) is used to control Script is a software written in PHP (programming web pages) is used to control

the sites that have been raised by making a Bal Gelb Rossi and the main types the sites that have been raised by making a Bal Gelb Rossi and the main types C99, Re57Shell, My Shell, is the first type is best for beginners .. The second C99, Re57Shell, My Shell, is the first type is best for beginners .. The second type of professional competence, and is often applied in the gaps PDF File type of professional competence, and is often applied in the gaps PDF File Include mainlyInclude mainly

8.8. Gap:Gap: Is a software error in the design of the site is often a hacker to search for these Is a software error in the design of the site is often a hacker to search for these

errors and useerrors and use .. .. Among the most famous of these errors SQL Injections, Perl, Among the most famous of these errors SQL Injections, Perl, CGI, File IncludeCGI, File Include..

..

Page 10: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

10

9.9. Encryption:Encryption:

             Is a process server, edit the values through the Hex in order to Is a process server, edit the values through the Hex in order to

enable a server to skip the protection systems installed on the victim enable a server to skip the protection systems installed on the victim

machine, and is changing the numbers of certain lines to be machine, and is changing the numbers of certain lines to be

determined by the hackerdetermined by the hacker

10.10.IP( IP( internet protocol):internet protocol):

Is the number consists of four sections representing the address Is the number consists of four sections representing the address

of each device connected to the Internet, may be either a fixed of each device connected to the Internet, may be either a fixed

address such as lines of DSL, or the address of a variable for each address such as lines of DSL, or the address of a variable for each

time he lines connect to the internet, such as the Dial-UP.time he lines connect to the internet, such as the Dial-UP.

Page 11: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

11

1.1. Some hackers engaged in espionage as a hobby and an opportunity to Some hackers engaged in espionage as a hobby and an opportunity to

show the possibilities and the challenge of self and others practiced this show the possibilities and the challenge of self and others practiced this

work out to achieve several objectives including the following: work out to achieve several objectives including the following:

2.2. To obtain money through the theft of banking information such as account To obtain money through the theft of banking information such as account

numbers or credit cards. \numbers or credit cards. \

3.3.   To obtain information or photographs for purposes of extortion motivated To obtain information or photographs for purposes of extortion motivated

by financial or diversionary threat some girls or young, if not responded to by financial or diversionary threat some girls or young, if not responded to

the demands of diversionary or financial. the demands of diversionary or financial.

4.4.   Access to files as beautiful as Alorcamax or PowerPoint files, sounds or Access to files as beautiful as Alorcamax or PowerPoint files, sounds or

images, or. images, or.

5.5.   Demonstrate the ability to break through and address the obstacles and Demonstrate the ability to break through and address the obstacles and

the opportunity to be proud of securing a victory in the event of a hacker the opportunity to be proud of securing a victory in the event of a hacker

to enter one of the devices or information systems. to enter one of the devices or information systems.

6.6. To obtain secret codes e-mail to allow him to spy on private messages or To obtain secret codes e-mail to allow him to spy on private messages or

theft of the name of the e-mail as a whole. theft of the name of the e-mail as a whole.

Page 12: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

12

1. to penetrate the sites and walking Firat and forums. (Web site,

server

2. penetrate the e-mail and chat rooms.

3. hacking the ( LAN).

4. penetration of personal computers (PC).

5. Penetration through the reverse connection. Back door

6. penetration through the browser Internet Explorer.

7. Penetration through the program of music files player Real Player.

8. Penetration of random

Page 13: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

13

Installation of firewalls and spy ware struggles such as      - Nod23-KasperSky - Panda-Spy ware Doctor - Norton

Make a regular survey and comprehensive on your computer at

more frequent intervals as possible, especially if you use the I

nternet on a daily basis .?*** Do not enter suspicious sites that

hackers are using these sites such as the introduction of spy

ware to victims where the installation of spy ware file (patch)

automatically the device by simply entering the person to the site.

 Do not open any email from an unknown source because hackers

are using e-mail messages to send files to the victims of spying.

Page 14: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

14

Not keep any personal information inside your own such as letters,

photos, important files and other information such as bank account

numbers or credit card ..

 Place the numbers secret, where your important files can be opened

only knows the PIN only and you.

 Always try to change your password periodically is porous.

 Make sure to lift the cable Internet connection after the completion of

the use of the Internet.Not receiving any files during the (chat) from people who are not trusted, especially if these files carry over (exe) such as (love.exe)

or that the files are with such Alamtdadin (hammed .pif.jpg) and be

like these files is grown spy ware programs on your computer through

which he can count on hackers from accessing your computer and

cause harm and problems.

Page 15: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

15

1. Web Cracker 4

2. Net Buster  

3. Net Bus Haxporg   

4. Bus Scong.

5.  BO Client and Server

6. netbus1.70 هو األكثر شيوعا بين مستخدمي المايكرو سوفت شات .  

7. SUB 7

8. Hackers Utility 

9. Back Orifice

10. Deep Throat 2.0

11. Porter Scan على ارقام الـ IP و الـ Ports

12. ultrascan-15.exe 

13. Zip Cracker 

14. Girl Friend 

Page 16: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

16

How do you know if your computer is hacked?How do you know if your computer is hacked? At the outset you know if your computer is breaking through to determine the

changes caused by hackers in the operating system, such as opening and closing the screen automatically or the presence of new files did not enter one or delete files existed, or open Internet sites or give an order to the printer in addition to the many changes that you see and know and learn from which the presence of an intruder uses your computer ..

This way you can know from which you entered a hacker into your computer or

tha your computer properly.

Open (Start)(Start) and then of (Run). (Run).

Type the following: system. ini: system. ini

     Page will appear, go to the fifth line where If you find that the line is written

like this:

exe = user. exe user. exe = user. exe user. Know that your computer has not been penetrated by hackers.?

If you find the fifth line is written so? User. exe = user. exe *** *** ***?exe = user. exe *** *** ***? you

know that your computer has been hacked by a hacker

Page 17: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

17

Detection methods for hackers

There are many ways to detect the presence of spy ware on your computer ..

The first way:The first way:

Programs to detect spyware, viruses, use one of the detection software spyware as well as protection from spyware and hackers through the work of a firewall to prevent the entry is being ...

Of the most famous and best-detection software spyware:

Norton internet securityNorton internet security   Zone alarmZone alarm   MacAfee firewallMacAfee firewall   The CleanerThe Cleaner

Page 18: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

18

among the most famous and the best protection from hackersamong the most famous and the best protection from hackersZone AlarmZone Alarm  Lockdowns 2000Lockdowns 2000  JammerJammer  Internet Alert 99Internet Alert 99  Tiny Personal FirewallTiny Personal Firewall

Page 19: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

19

: : RegistryRegistry بواسطة ملف تسجيل النظام

 . StartStart انقر على زر البدء

-   rigidityrigidity : األمر RunRun أكتب في خانة التشغيل

-  : Registery EditorRegistery Editor افتح المجلدات التالية حسب الترتيب في قائمة

- HKEY_LOCAL_MACHINEHKEY_LOCAL_MACHINE  

- SoftwareSoftware    ثمثم MicrosoftMicrosoft  

- WindowsWindows     ثمثم Current VersionCurrent Version

- RunRun    ثمثم Run or Run onceRun or Run once

- قم بمسح الملف كامالserver .exeserver .exe االن هل يوجد ملف باسم

- Explorer32 "C/WINDOWS\Expl32.exeExplorer32 "C/WINDOWS\Expl32.exe أو سوف تجد الملف بهذا االسم

- DataData او قد ظهر أمامه سهم صغيراو قد ظهر أمامه سهم صغير <---<---

 . فهو ملف تجسس إذ ليس له عنوان معين بالو يندوز

DeleteDelete تخلص منه بالضغط على الزر األيمن للفارة ثم

Page 20: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

20

msconfigmsconfig: بواسطة األمر

  StartStart انقر على زر البدء -

 msconfigmsconfig :: األمر التالياألمر التالي RunRun اكتب في خانة التشغيل -

-  System Configuration UtilitySystem Configuration Utility سوف تظهر لك نافذة

-  Start upStart up اختر من هذه النافذة من أعلى قسم -

- ستظهر لك شاشة تعرض البرامج التي تبدأ العمل مباشرة مع بدء تشغيل الجهاز-

افحص هذه البرامج جيدا بالنظر فإن شككت بوجود برامج غريبة لم تقم أنت بتثبيتها بجهازك فقم بإلغاء اإلشارة الظاهرة بالمربع الصغير المقابل له فتكون بذلك قد أوقفت عمل البرنامج التجسسي

.أو غيره من البرامج الغير مرغوب بها

Page 21: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

21

By Player Dos:By Player Dos:

    This method was used before the advent of Windows to show the spy files, such as patch & Trojan, one of the easiest ways:

? - Open the trampling of the Study of the MS-DOSMS-DOS to start a list of the START

? - Type the following command: C: / Windows \ dir patch .* e?C: / Windows \ dir patch .* e?

If any do the patch file to scan it in the following way:? C: \ Windows \ delete patch .*\ delete patch .*

Page 22: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

22

Open the win.ini file is located in the Windows folder and look in the beginning of the first lines for any values similar to the following terms:

  run = xxxx.exerun = xxxx.exe

run = xxxx.dl load = xxxx.exerun = xxxx.dl load = xxxx.exe

load = xxxx.dl Note that xxxx means the name of the server If load = xxxx.dl Note that xxxx means the name of the server If you find you find

any value from them immediately Vahzvha In other words, you must Postural line of the lines above in the beginning of the first lines to the

win.ini file, the afternoonDeleted this email immediately *

Page 23: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

23

Open the file system.ini system.ini The existing windows folder and you will find in the fifth line the following

statement?

: ***** = Explorer.exe***** = Explorer.exe if your machine is infected you will find the form of the former phrase is so:

 ***** = Explorer.exe xxx.exe***** = Explorer.exe xxx.exe

***** = Explorer.exe xxx.exe***** = Explorer.exe xxx.exe with the knowledge that xxx is the name of the server? : Rundlll6.exe and Task_Bar.exe Rundlll6.exe and Task_Bar.exe

 Found that patients do scans your name server to become only the line as follows:

 *****=Explorer.exe *****=Explorer.exe

Page 24: 1. 2 Aug-2010 3 بسم الله الرحمن الرحيم والصلاة والسلام على اشرف الخلق والمرسلين ، سيدنا محمد وعلى آله وصحبه

24