HACKING
#1

presented by:
vamsi

[attachment=9496]
INTRODUCTION
 It is an intellectual activity
 It is a sort of mental gymnasium
 It can also used for criminal activities
 Ethical hacking is one of remedy to prevent the criminal hacking
HACKER Vs CRACKER
 Hacker - a computer freak who peeps into others computers
- computer experts who knew everything about the way of software works
-they debug code and use trail and error methods to discover new tricks and secrets

 There is a thin line between hackers and cracker
 Cracker - nerd persons with an intention of harming others computers
- besides unauthorized entry they try to destroy others resources
TECHNIQUES:
 Cookie based technique
 SQL Injection technique
 Object based technique
COOKIE BASED
 Cookies are bits of data that a browser stores in your visitor's computer
 They are stored in file named ‘temp’
 They allow us to store data, specific to a particular user or a particular site
 Java script is the popular method in cookie based technique
Example:
 This is a simple java script to hack any web site
‘javascript: document.body.contentEditable = 'true';document.designMode = 'on'; void 0’
 By placing this JavaScript code in the address bar of your web browser and hit enter, it will become editable just as a notepad
 It is shown below
Before:
After:
SQL INJECTION
 SQL Injection involves entering SQL code into web forms
 This method mainly used in breaking password of any web application
 It works directly on database
 There are many SQL queries to break the password
Example:
 Following are some of the SQL codes used to break passwords
x‘ or 'a' = ‘a (or) 1=1—
 SELECT * FROM users WHERE username = 'admin' and PASSWORD = 'x' or 'a' = 'a‘
 Above SQL command is the full form of SQL code
 The above commands are placed in the password field to break
OBJECT BASED
 Objects are created to hack the data from ones system
 They are classes written in the Java programming language
 They are used to encapsulate many objects into a single object (the bean)
 they can be passed around as a single bean object instead of as multiple individual objects
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ethical hacking full report computer science technology 41 74,873 18-03-2016, 04:51 PM
Last Post: seminar report asees
  ETHICAL HACKING A SEMINAR REPORT Computer Science Clay 7 14,220 31-01-2013, 12:16 PM
Last Post: seminar details
  HACKING A NEW PERSPECTIVE smart paper boy 1 1,948 07-02-2012, 10:07 AM
Last Post: seminar addict
  Hacking Full Report lucky.prathibha 4 4,580 07-02-2012, 10:06 AM
Last Post: seminar addict
  hacking and security seminar class 0 1,612 01-04-2011, 02:54 PM
Last Post: seminar class
  HACKING seminar class 0 1,089 09-03-2011, 10:02 AM
Last Post: seminar class
  Hacking seminar surveyer 0 1,027 23-12-2010, 04:32 PM
Last Post: seminar surveyer
  GOOGLE HACKING science projects buddy 0 1,746 15-12-2010, 08:40 AM
Last Post: science projects buddy
  INTERNET SECURITY AGAINST HACKING SYSTEMS project topics 1 2,868 12-10-2010, 12:35 PM
Last Post: project report helper
  EMAIL – HACKING project topics 1 1,858 12-08-2010, 10:26 AM
Last Post: nnskaro

Forum Jump: