Hacking Full Report
#3

[attachment=11244]
What is hacking?
How to translate the hackers’ language
Who is hacker?

• Hack
– Cut with repeated irregular blows
– Examine something very minutely
• Hacker
– The person who hacks
• Cracker
– System intruder/destroyer
• Hacker means cracker nowadays
– Meaning has been changed
History of hacking
• Telephone hacking
– Use telephone freely
– It’s called phreaking
• Computer virus
– Destroy many computers
• Network hacking
– Hack the important server remotely and destroy/modify/disclose the information
Types of hacking
Hacking accidents

• Internet Worm
– Robert T. Morris made an internet worm. It spread through the internet and crashed about 6000 systems.
• Cuckoo’s Egg
– Clifford Stoll caught the hackers who are the German hackers applied by KGB
• IP Spoof
– Kevin Mitnick was caught by Tsutomu Shimomura who was security expert. Kevin Mitnick uses the IP Spoof attack in this accident
Why do hackers hack?
• Just for fun
• Show off
• Hack other systems secretly
• Notify many people their thought
• Steal important information
• Destroy enemy’s computer network during the war
What do hackers do after hacking?
• Patch security hole
– The other hackers can’t intrude
• Clear logs and hide themselves
• Install rootkit ( backdoor )
– The hacker who hacked the system can use the system later
– It contains trojan ls, ps, and so on
• Install irc related program
– identd, irc, bitchx, eggdrop, bnc
• Install scanner program
– mscan, sscan, nmap
• Install exploit program
• Install denial of service program
• Use all of installed programs silently
What do hackers know?
• Don’t know how to use vi
• Don’t know what unix is
• Don’t know what they do
• Know how to intrude the system
• Know how to crash the system
• Know where the hacking programs are
How can kid hack?
• Kid has much of time
– Kid can search for longer time than other people
• All hacking program is easy to use
• Kid doesn’t have to know how the hacking program works
• These kids are called script kiddies
Why can’t Korean kid hack?
• Almost all Korean kids don’t know English well
• Almost all hacking program manuals are written in English
– However, many hacking program manuals are being translated
How can be a real hacker?
• Study C/C++/assembly language
• Study computer architecture
• Study operating system
• Study computer network
• Examine the hacking tools for a month
• Think the problem of the computer
Why can’t defend against hackers?
• There are many unknown security hole
• Hackers need to know only one security hole to hack the system
• Admin need to know all security holes to defend the system
How can protect the system?
• Patch security hole often
• Encrypt important data
– Ex) pgp, ssh
• Do not run unused daemon
• Remove unused setuid/setgid program
• Setup loghost
• Use switch hub
• Setup firewall
– Ex) ipchains
• Setup IDS
– Ex) snort
• Check unintentional changes
– Ex) tripwire
• How can protect the system? (3)
• Backup the system often
What should do after hacked?
• Shutdown the system
– Or turn off the system
• Separate the system from network
• Restore the system with the backup
– Or reinstall all programs
• Connect the system to the network
• It can be good to call the police
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: 42476, seminar report on hacking and its types,
Popular Searches: hacking report doc, xnxx a kid bony xnxx, report on hacking pdf, project report for hacking, pathescope kid, project report on hacking, seminar report on hacking,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Hacking Full Report - by lucky.prathibha - 08-01-2011, 02:39 PM
RE: Hacking Full Report - by seminar surveyer - 14-01-2011, 04:37 PM
RE: Hacking Full Report - by seminar class - 29-03-2011, 12:38 PM
RE: Hacking Full Report - by TuTTuMoN - 23-06-2011, 04:23 PM
RE: Hacking Full Report - by seminar addict - 07-02-2012, 10:06 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 45,883 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 33,029 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 27,126 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 28,817 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 69,770 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 77,748 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 25,659 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 43,815 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 47,163 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,911 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: