Download pdf - presentation on hacking

Transcript
Page 1: presentation on hacking

GANDHINAGAR INSTITUTE OF

TECHNOLOGYACTIVE LEARNING ASSIGNMENT

ON

“HACKING”

CYBER SECURITY [2150002]

PREPARED BY:- UPADHYAY AYUSH (150123119053)

Page 2: presentation on hacking

HACKING…

Page 3: presentation on hacking

What is hacking?

Hacking is the gaining of access(wanted or unwanted) to a computer

and viewing, copying, or creating data(leaving a trace) without the

intention of destroying data or maliciously harming the computer.

Hacking is a broad term used to describe many complex activities

wherein the end goal is typically to obtain access to a computer

system's servers, database(s), or stored files. This access may be any

combination or desired or undesired, and legal or illegal.

Page 4: presentation on hacking
Page 5: presentation on hacking

Hacker

A hacker is any person engaged in hacking.

Person who gains authorized/unauthorized access to a computer

WITHOUT the intention of causing damage.

In the computer security context, a hacker is someone who seeks

and exploits weaknesses in a computer system or computer network.

Hackers may be motivated by a multitude of reasons, such as profit,

protest, challenge, enjoyment, or to evaluate those weaknesses to

assist in removing them. The subculture that has evolved around

hackers is often referred to as the computer underground.

Page 6: presentation on hacking

Types of hacker

Hackers are of three types:

1. White hat hacker

2. Gray hat hacker

3. Black hat hacker

Page 7: presentation on hacking

Why do hackers hack ?

Just for fun.

Show off.

Hack other systems secretly.

Notify

Steal many people their thought, important information.

Destroy enemy’s computer network during the war.

Page 8: presentation on hacking

Types of hacking

Website Hacking

Network Hacking

Ethical Hacking

Email Hacking

Password Hacking

Online Banking Hacking

Computer Hacking

Page 9: presentation on hacking

1. Website Hacking:- Hacking a website means taking control from the website

owner to a person who hacks the website.

2. Network Hacking:- Network Hacking is generally means gathering information

about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc…

over the network.

3. Ethical Hacking:- Ethical hacking is where a person hacks to find weaknesses in

a system and then usually patches them.

4. Email Hacking:- Email hacking is illicit access to an email account or email

correspondence.

5. Password Hacking:- Password Hacking Password cracking is the process of

recovering secret passwords from data that has been stored in or transmitted by a

computer system.

Page 10: presentation on hacking

6. Online Banking Hacking:- Online banking Hacking Unauthorized accessing bank

accounts without knowing the password or without permission of account holder is

known as Online banking hacking.

7. Computer Hacking:- Computer Hacking is when files on your computer are

viewed, created, or edited without your authorization.

Page 11: presentation on hacking
Page 12: presentation on hacking

Robert Tappan Morris

Robert Tappan Morris was born in 8th November, 1965.

He is an American computer scientist and entrepreneur.

He is best known for creating the Morris Worm in 1988, considered the

first computer worm on the Internet.

Morris was prosecuted for releasing the worm, and became the first

person convicted under the then-new Computer Fraud and Abuse Act.

He later joined the faculty in the department of Electrical Engineering

and Computer Science at the MIT, where he received tenure in 2006.

Page 13: presentation on hacking

Early Life Morris was born in 1965 to parents Robert Morris and Anne Farlow Morris.

The senior Morris was a computer scientist at Bell Labs, who helped design

Multics and Unix; and later became the chief scientist at the National Computer

Security Centre, a division of the National Security Agency (NSA).

He grew up in the Millington section of Long Hill Township, New Jersey and

graduated from Delbarton School in 1983.

Morris attended Harvard University, and later went on to graduate school at

Cornell. During his first year there, he designed a computer worm that

disrupted many computers on what was then a fledgling internet. This landed

him in court a year later.

Page 14: presentation on hacking

The Morris WormMorris' worm was developed in 1988, while he was a graduate student at

Cornell University. He said it was designed to gauge the size of the Internet.

He released the worm from MIT, rather than from Cornell. The worm

exploited several vulnerabilities to gain entry to targeted systems, including:

o a hole in the debug mode of the Unix send mail program,

o a buffer overrun hole in the fingerd network service,

o the transitive trust enabled by people setting up rexec/rsh network logins

without password requirements.

Page 15: presentation on hacking

The worm was programmed to check each computer it found to

determine if the infection was already present. However, Morris

believed that some administrators might try to defeat his worm by

instructing the computer to report a false positive. To compensate

for this possibility, Morris directed the worm to copy itself anyway,

14% of the time, no matter what the response to the infection-status

interrogation.

This level of persistence was a design flaw: it created system loads

that not only brought it to the attention of system administrators, but

also disrupted the target computers. During the ensuing trial, it was

estimated that the cost in "potential loss in productivity" caused by

the worm and efforts to remove it from different systems ranged

from $200 to $53,000.

Page 16: presentation on hacking

Criminal prosecution

In 1989, Morris was indicted for violating United States Code Title 18,

the Computer Fraud and Abuse Act. He was the first person to be indicted

under this act. In December 1990, he was sentenced to three years of

probation, 400 hours of community service, and a fine of $10,050 plus the

costs of his supervision. He appealed, but the motion was rejected the

following March.

Morris' stated motive during the trial was "to demonstrate the

inadequacies of current security measures on computer networks by

exploiting the security defects [he] had discovered”.He completed his

sentence as of 1994.

Page 17: presentation on hacking

Later life & work

Morris' principal research interest is computer network

architectures which includes work on distributed hash tables such as

Chord and wireless mesh networks such as Roof net.

He is a long time friend and collaborator of Paul Graham. In

addition to founding two companies together, Graham dedicated his

book ANSI Common Lisp to Morris, and named the programming

language that generates the online stores' web pages RTML in his

honour. Graham lists Morris as one of his personal heroes, saying

"he's never wrong.”

Page 18: presentation on hacking

References http://www.hackersonlineclub.com/hackers-types/

www.wikipedia.org/wiki/Hacker

www.wikipedia.org/wiki/Hacking

http://compnetworking.about.com/od/networksecurityprivacy/f/what

-is-hacking.htm

http://www.urbandictionary.com/define.php?term=hackinghttp://sea

rchsecurity.techtarget.com/definition/hacker

https://en.wikipedia.org/wiki/Robert_Tappan_Morris

Page 19: presentation on hacking

Thank You