Main Topic-:Cyber Crime: Hacking
Main Topic-:Cyber Crime: Hacking
Main Topic-:Cyber Crime: Hacking
HISTORY OF HACKING
WHO ARE HACKERS
WHAT HACKERS LOOK FOR
BASIC KNOWLEDGE REQUIRED
TROJANS
FIREWALL
EMAIL HACKING
VIRUSES
CRACKERS
HACKING TOOLS
RECENT HACKING METHODS
OPERATING SYSTEMS USED
HACKED WEBSITES
CONCLUSION
HISTORY OF HACKING
Hacking has been around for more than a century. In the 1870s,
several teenagers were flung off the country's brand new phone
system by enraged authorities. Here's a peek at how busy
hackers have been in the past 35 years.
When computers were invented there quickly emerged a need
to protect information stored on these computers.. Hackers
developed from curious people who desired to breach this form
of electronic privacy.
Click Here To Know more About History Of Hacking
WHO ARE HACKERS
Hacker is "Any person who derives joy from discovering ways to
circumvent limitations.“
A person intensely interested in the arcane and recondite
workings of any computer operating system.
Most often, hackers are programmers. As such, hackers obtain
advanced knowledge of operating systems and programming
languages. They may know of holes within systems and the reasons
for such holes.
Hackers constantly seek further knowledge, freely share what
they have discovered, and never, ever intentionally damage data.
WHAT HACKERS LOOK FOR
> Credit Information
> Any accounting data
> Data bases
> Mailing Lists
> Personal Addresses
> Email Addresses
> Account Passwords
> Home /Office Information
> Resumes
> Email
> Any Company Information / Services He Can Access
> Your or spouse's first and last name
> Children's names / ages
> Your address
> Your telephone number
> Letters you write to people
> Your personal resume
> Your family pictures
> Personal work
> Any official accounts / information
Basic knowledge required
HACKING
PYTHON DOS
ASSEMBLY
LANGUAGES
H A C K IN G
G A IN IN G A C C E S S D E S T R O Y IN G T A R G E T
KEY LO GGER S V IR U S
PO R T SC AN N ER S W A R S C R IP T S
T R O JA N S
E M A IL B O M B S
TROJANS
A Trojans can also be called RAT's, or Remote
Administration Tools.
A destructive program that masquerades as a
benign application.
Trojan horses do not replicate themselves like
viruses but they can be just as destructive.
TYPES OF TROJANS
•Remote Access Trojans.
•Password sending Trojan.
•Key loggers.
•Destructive Trojans.
•FTP Trojans.
WORKING OF
TROJANS
Password Sending Trojans
The purpose of these Trojans is to rip all cached passwords and other information too like ICQ number
computer info and so on and send them to specified e-mail without letting the victim about the e-mail.
Key loggers
They log the keys that the victim is pressing and then check for passwords in the log file.
Destructive
The only one function of these Trojans is to destroy and delete files. This makes them very simple and
easy to use. They can automatically delete all your .dll or .ini or .exe files on your computer.
FTP Trojans
These Trojans open port 21 on your computer letting EVERYONE that has a FTP client to connect to
your computer without password and will full upload and download options.
The main purpose of a Firewall is to prevent unauthorized access
between networks.
What is a FIREWALL?
A firewall is any mechanism that acts to restrict access to a
network according to a set of defined rules.
Function as “front doors” to a network.
Trojan
Some Trojans have an option that gets the victims passwords and usernames by
pressing a button.
MSN porgies
There are some MSN programs for that job , you send to your victim a file
that's 12Kb and when they run it, the victim sends you automatically the user
and the password.
EMAIL BOMBS
The e-mail bomb is a simple and effective harassment tool.
Bomb track
Is first mail-bombing tool written for the Macintosh platform.
Kaboom
The most popular bomber out there. It uses minimal resources, does a superb job,
has a simple user interface, and attempts to obscure the attacker's source address.
• Stephen Wozniak
• Tim Berners-Lee
• Linus Torvalds
• Richard Stallman
• Tsutomu Shimomura
OPERATING SYSTEMS USED
Jonathan James Case
•James gained notoriety when he became the first juvenile to be
sent to prison for hacking. He was sentenced at 16 years old.
•In an anonymous PBS interview, he professes, "I was just looking
around, playing around. What was fun for me was a challenge to
see what I could pull off.“
•James's major intrusions targeted high-profile organizations. He
installed a backdoor into a Defense Threat Reduction Agency
server.
•The DTRA is an agency of the Department of Defense charged
with reducing the threat to the U.S. and its allies from nuclear,
biological, chemical, conventional and special weapons. The
backdoor he created enabled him to view sensitive emails and
capture employee usernames and passwords.
•
• James also cracked into NASA computers, stealing
software worth approximately $1.7 million.
According to the Department of Justice, "The
software supported the International Space Station's
physical environment, including control of the
temperature and humidity within the living space."
NASA was forced to shut down its computer systems,
ultimately racking up a $41,000 cost. James
explained that he downloaded the code to supplement
his studies on C programming, but contended, "The
code itself was crappy . . . certainly not worth $1.7
million like they claimed."
Legion of Doom (LOD)
• Members:Franklin Darden a.k.a The Leftist, Adam
Grant a.k.a The Urvile , Robert Riggs a.k.a The
Prophet)
• Arrested: July 21, 1989
• Charged: 1989
• Convicted: 1990
• Crime: Cracking into Bell South's Telephone
(including 911) Networks - possessing proprietary
BellSouth software and information, unauthorized
intrusion, illegal possession of phone credit card
numbers with intent to defraud, and
conspiracy. From the Government's Sentencing
Memorandum: "BellSouth spend approximately
$1.5 million in identifying the intruders into their
system and has since then spent roughly $3
million more to further secure their network."
• Sentences: Frank Darden (24): 14 months, Adam
Grant (22): 14 months, Robert Riggs (22): 21
months. Collectively ordered to pay $233,000.00
in restitution.
HACKED WEBSITES
Year Websites Hacked
1981 213
1985 1961
1989 159,000
1993 2,056,000
1997 36,000,000
2001 90,500,000