SlideShare uma empresa Scribd logo
1 de 32
HACKING
  AND
CRACKING



   BY:
   Deepak Dedha
   Vanketesh Mishra
   Aayush Yadav
Objectives of Hacking and Cracking

 What is Hacking?
 Difference between Hacking and
  cracking
 Types of Hackers
 Types of Hacking Techniques
 Preventive measures
 Some Cracking Examples
HACKING
 Authorized  or Unauthorized
  attempts to bypass the security
  mechanisms of an information
  systems or network
 In simple words Hacking means
  finding out weaknesses in a
  computer or computer network
Why do people hack ?

   Just for fun
   Hack other systems secretly
   Notify many people their thought
   Steal important information
   Destroy enemy’s computer network
Literal Definitions
  Hacker :
           Someone who uses hacks.
  Cracker :
          some one who destructs
 things.
  Hacks :
          A different approach with
 some significant advantage over the
 current approach
Types of Hackers
White-hat Hackers
   The good guys who identify the
    security weakness of the system or
    network and inform the owner about
    them
Black Hat Hackers
       A black hat is the villain or
 bad guy, who crash into victim‟s
 security to steal information and
 destroy the victims security
 network.
Grey hat Hackers
A grey hat, in the hacking community,
 refers to a skilled hacker who is
 somewhere in between white and
 black hat hackers
Pretexting
Phishing
 Pretexting:
             Pretexting is the act of creating and using an
 invented scenario to persuade a target to release
 information (e.g. date of birth, Social Security Number, last
 bill amt.)
 Phishing:
      Phishing is an e-mail fraud method in which the
 perpetrator sends out email in an attempt to gather
 personal and financial information from recipients.
                 Phishers attempt to fraudulently acquire
 sensitive information, such as usernames, passwords and
 credit card details .Ebay and PayPal are two of the most
 targeted companies, and online banks are also common
 targets
Language of hackers
1 -> i or l   || -> n
3 -> e        |/| -> m
4 -> a        s -> z
7 -> t
              z -> s
9 -> g
              f -> ph
0 -> o
$ -> s        ph -> f
| -> i or l   x -> ck
              ck -> x
Example:
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3|| 1 h4ck3d 1n



I did not hack this page, it was like this
when I hacked in.
World famous hackers

 Stephen
    Wozniac




   Tsutomu
    Shimomura
 Kevin   Mitnick




 Kevin   Poulsen
Random Fact !!!!
 The average age group of
 hackers are aged between 14-24
 yrs. …
Did you know ?
 Socialnetworking sites like
 „FACEBOOK‟, ‟GMAIL‟,
 ‟YAHOO” comprised of 60% of
 direct or indirect hacking
 incidents.
Most popular virus
 Links  involving private pictures
  of celebrities.
 Links showing pictures of
  famous personalities like
  videos of Osama Bin Laden‟s
  killing.
Another popular scam
Facebook lottery scam.
Preventive measures
   Install a strong anti-virus
   Always run a anti-virus check before you
    download a program or a file from the
    internet.
   Avoid disclosing personal details like
    phone number, credit card details to
    strangers.
    A good firewall (Sygate personal)
    A good spy ware / Trojan buster.
    Use of genuine software
How to become Hacker
The best approach is to gain as much
knowledge about stuff as you can.

Good command over C / C++ / Perl will
definitely help.

But above all you need a good logical
brain.
Some Examples of Cracking
Windows    Cracking
   1).BIOS Password
 Breaking
   2).Windows Logon
Password Breaking
Bios password breaking

We can break BIOS password in any one of the following ways:

Trying default password

Hardware approach
Trying default passwords
            some default BIOS passwords


             Lkwpeter  AMI                         cmos
             j262     Award                       AMI!SW1
             AWARD_SW bios                          AMI? SW1
             AWARD_PW BIOS                          password
             Biostar   setup                        hewittrand




„j262‟ opens most version of Award bios; it works about 80 per
     cent of the time
Hardware approach
 If the default passwords did not work,
  then try to reset the Bios to its default
  settings so that it asks for no
  password at all. Procedure for
  hardware approach is as follows
 First, we have to open the computer
  and then look for a round lithium
  battery, it probably looks like a silver
  coin. So, remove the battery and after
  30 seconds or so put it back.
Window log on password
         breaking
   To hack windows login password, reboot and wait for the message:
     When we see the boot menu on the screen, press F2 or F12 before “Starting
    Windows 9x…” . The boot menu will come up. Select option to boot into DOS
    .


  C:>cd windows
 C:windows>ren *.pwl *.xyz // RENAME
  Or delete them by typing
 C:windows>del *.pwl *.xyz //DELETE
Easy and Simple approach
                    On many computers a series of
 keystrokes may crash the password program.
     keep pressing ESC 15 to 20 times . This will
 result in the crashing of the password program and the
 computer will continue booting .

BY BOOTING
  We can break into a computer by using live tools like
 conboot live cd which are readly available on internet .The
 live cd can be used to make a bootable pen drive and then
 we can break into any computer.
Hacking and cracking

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Reconnaissance
ReconnaissanceReconnaissance
Reconnaissance
 
Network Security
Network SecurityNetwork Security
Network Security
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
I Hunt Sys Admins
I Hunt Sys AdminsI Hunt Sys Admins
I Hunt Sys Admins
 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
A7 Missing Function Level Access Control
A7   Missing Function Level Access ControlA7   Missing Function Level Access Control
A7 Missing Function Level Access Control
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Security testing
Security testingSecurity testing
Security testing
 
Top 10 Web Security Vulnerabilities
Top 10 Web Security VulnerabilitiesTop 10 Web Security Vulnerabilities
Top 10 Web Security Vulnerabilities
 
Security Patterns with the WSO2 ESB
Security Patterns with the WSO2 ESBSecurity Patterns with the WSO2 ESB
Security Patterns with the WSO2 ESB
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Network Software
Network SoftwareNetwork Software
Network Software
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Security testing
Security testingSecurity testing
Security testing
 
Nmap scripting engine
Nmap scripting engineNmap scripting engine
Nmap scripting engine
 
RIA Cross Domain Policy
RIA Cross Domain PolicyRIA Cross Domain Policy
RIA Cross Domain Policy
 
Web application Security tools
Web application Security toolsWeb application Security tools
Web application Security tools
 

Semelhante a Hacking and cracking

UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptDiveshK4
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information SecurityWorldTrade3
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptricagip499
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxssuser59e4b8
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxsumita02
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayChandra Prakash
 
Information security awareness
Information security awarenessInformation security awareness
Information security awarenessCAS
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptxFaith Shimba
 

Semelhante a Hacking and cracking (20)

Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking And EthicalHacking By Satish
Hacking And EthicalHacking By SatishHacking And EthicalHacking By Satish
Hacking And EthicalHacking By Satish
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Hacking
HackingHacking
Hacking
 
Network security
Network securityNetwork security
Network security
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
 
HACKING
HACKINGHACKING
HACKING
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
Information security awareness
Information security awarenessInformation security awareness
Information security awareness
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptx
 

Hacking and cracking

  • 1. HACKING AND CRACKING BY: Deepak Dedha Vanketesh Mishra Aayush Yadav
  • 2. Objectives of Hacking and Cracking  What is Hacking?  Difference between Hacking and cracking  Types of Hackers  Types of Hacking Techniques  Preventive measures  Some Cracking Examples
  • 3. HACKING  Authorized or Unauthorized attempts to bypass the security mechanisms of an information systems or network  In simple words Hacking means finding out weaknesses in a computer or computer network
  • 4.
  • 5. Why do people hack ?  Just for fun  Hack other systems secretly  Notify many people their thought  Steal important information  Destroy enemy’s computer network
  • 6. Literal Definitions Hacker : Someone who uses hacks. Cracker : some one who destructs things. Hacks : A different approach with some significant advantage over the current approach
  • 8. White-hat Hackers  The good guys who identify the security weakness of the system or network and inform the owner about them
  • 9. Black Hat Hackers A black hat is the villain or bad guy, who crash into victim‟s security to steal information and destroy the victims security network.
  • 10. Grey hat Hackers A grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers
  • 12.  Pretexting: Pretexting is the act of creating and using an invented scenario to persuade a target to release information (e.g. date of birth, Social Security Number, last bill amt.)  Phishing: Phishing is an e-mail fraud method in which the perpetrator sends out email in an attempt to gather personal and financial information from recipients. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details .Ebay and PayPal are two of the most targeted companies, and online banks are also common targets
  • 13. Language of hackers 1 -> i or l || -> n 3 -> e |/| -> m 4 -> a s -> z 7 -> t z -> s 9 -> g f -> ph 0 -> o $ -> s ph -> f | -> i or l x -> ck ck -> x
  • 14. Example: 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|| 1 h4ck3d 1n I did not hack this page, it was like this when I hacked in.
  • 15. World famous hackers  Stephen Wozniac  Tsutomu Shimomura
  • 16.  Kevin Mitnick  Kevin Poulsen
  • 17. Random Fact !!!!  The average age group of hackers are aged between 14-24 yrs. …
  • 18. Did you know ?  Socialnetworking sites like „FACEBOOK‟, ‟GMAIL‟, ‟YAHOO” comprised of 60% of direct or indirect hacking incidents.
  • 19. Most popular virus  Links involving private pictures of celebrities.  Links showing pictures of famous personalities like videos of Osama Bin Laden‟s killing.
  • 20.
  • 22.
  • 23. Preventive measures  Install a strong anti-virus  Always run a anti-virus check before you download a program or a file from the internet.  Avoid disclosing personal details like phone number, credit card details to strangers.  A good firewall (Sygate personal)  A good spy ware / Trojan buster.  Use of genuine software
  • 24. How to become Hacker The best approach is to gain as much knowledge about stuff as you can. Good command over C / C++ / Perl will definitely help. But above all you need a good logical brain.
  • 25.
  • 26. Some Examples of Cracking Windows Cracking 1).BIOS Password Breaking 2).Windows Logon Password Breaking
  • 27. Bios password breaking We can break BIOS password in any one of the following ways: Trying default password Hardware approach
  • 28. Trying default passwords  some default BIOS passwords Lkwpeter AMI cmos j262 Award AMI!SW1 AWARD_SW bios AMI? SW1 AWARD_PW BIOS password Biostar setup hewittrand „j262‟ opens most version of Award bios; it works about 80 per cent of the time
  • 29. Hardware approach  If the default passwords did not work, then try to reset the Bios to its default settings so that it asks for no password at all. Procedure for hardware approach is as follows  First, we have to open the computer and then look for a round lithium battery, it probably looks like a silver coin. So, remove the battery and after 30 seconds or so put it back.
  • 30. Window log on password breaking  To hack windows login password, reboot and wait for the message: When we see the boot menu on the screen, press F2 or F12 before “Starting Windows 9x…” . The boot menu will come up. Select option to boot into DOS . C:>cd windows  C:windows>ren *.pwl *.xyz // RENAME Or delete them by typing  C:windows>del *.pwl *.xyz //DELETE
  • 31. Easy and Simple approach On many computers a series of keystrokes may crash the password program. keep pressing ESC 15 to 20 times . This will result in the crashing of the password program and the computer will continue booting . BY BOOTING We can break into a computer by using live tools like conboot live cd which are readly available on internet .The live cd can be used to make a bootable pen drive and then we can break into any computer.