Docstoc

HACKING A NEW PERSPECTIVE

Document Sample
HACKING A NEW PERSPECTIVE Powered By Docstoc
					TECHNICAL SEMINAR PRESENTATION
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY




                                                          HACKING A NEW
                                                           PERSPECTIVE


                                                             Advisor
                                                   Mr. Indraneel Mukhopadhyay




                                             AJIT KUMAR                ROLL# CS200118203 [1]
TECHNICAL SEMINAR PRESENTATION
                                                               INTRODUCTION
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY




                                              Hacking is the method of breaking into information system
                                              without proper authentication and permission.Hacking community
                                              is basically divided into four groups :-


                                                 1. Hackers
                                                 2. Crackers
                                                 3. Phreaks
                                                 4. Script Kiddies



                                             AJIT KUMAR                           ROLL# CS200118203 [2]
TECHNICAL SEMINAR PRESENTATION
                                                       HACKING TECHNIQUES
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY




                                                  1. Password Cracking.

                                                  2. Sniffing .

                                                  3. Spoofing.

                                                  4. Scanning.

                                                  5. Denial -of -services.




                                             AJIT KUMAR                      ROLL# CS200118203 [3]
TECHNICAL SEMINAR PRESENTATION

                                                          PASSWORD CRACKING
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY




                                                 Different password cracking method are :-

                                                 1.Dictionary Attack.
                                                 2.Brute force attack.
                                                 3.Sniffing.

                                                 Some popular password cracker :-

                                                 1. Cracker.
                                                 2. John the Ripper.
                                                 3. L0phtCrack.


                                             AJIT KUMAR                             ROLL# CS200118203 [4]
TECHNICAL SEMINAR PRESENTATION
                                                                     SNIFFER
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY




                                                Sniffer is a program or tool that captures information over
                                                computer network.Sniffer is of two types commercial and
                                                underground .

                                                COMMERCIAL SNIFFER can be used for :-
                                                1. Fault analysis to detect problems in a network.
                                                2. Performance analysis to detect network bottleneck.

                                                UNDERGROUND SNIFFER can be used for :-
                                                1. Confidential information such as e-mail message.
                                                2. Financial data such as credit card numbers.


                                             AJIT KUMAR                              ROLL# CS200118203 [5]
TECHNICAL SEMINAR PRESENTATION
                                                          HACKING WINDOWS XP
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY




                                                1. EXPLORER.EXE
                                                2. REGISTRY

                                                EXPLOIT THROUGH REGISTRY
                                                i) Secure Desktop Restriction
                                                ii) Automatic Logon to XP
                                                iii) Remove Active Desktop Options from the Settings Menu
                                                iv) Remove Run from the Start Menu
                                                v) Hide the Screen Saver Settings Page
                                                vi) Restrict Changes to User Folder Locations



                                             AJIT KUMAR                            ROLL# CS200118203 [6]
TECHNICAL SEMINAR PRESENTATION
                                                     LOOPHOLES IN WINDOWS XP
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY




                                               Win2k Boot Disc Can Bypass Windows XP Passwords


                                               Bypass the CMOS Password


                                               Absence of Firewall


                                               Absence of Antivirus



                                             AJIT KUMAR                         ROLL# CS200118203 [7]
TECHNICAL SEMINAR PRESENTATION
                                                     INTERNET HACKNIG TOOLS
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY




                                                     1. Telnet
                                                     2. Domain Name System
                                                     3. Port
                                                     4. Ping
                                                     5. Tracert
                                                     6. Netstat



                                             AJIT KUMAR                      ROLL# CS200118203 [8]
TECHNICAL SEMINAR PRESENTATION
                                                           SENDING FAKE E-MAIL
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY




                                                          1. Return – path
                                                          2. Received
                                                          3. From
                                                          4. To
                                                          5. Subject
                                                          6. Date




                                             AJIT KUMAR                      ROLL# CS200118203 [9]
TECHNICAL SEMINAR PRESENTATION
                                                               CONCLUSION
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY




                                             Windows XP is one of the most widely used Operating system in
                                             the world so it is important to learn the security and loopholes.
                                             Here we learned the different tool and techniques used for
                                             hacking.This knowledge is very much helpful for administrator
                                             who maintain the system in an organization. Using registry we can
                                             hack the Windows XP locally. The access to explorer.exe is one of
                                             the greatest loophole in windows through which we can exploit
                                             Windows XP.Apart from this we learned about hacking related to
                                             internet security. At last we learn about prevention ,one should
                                             take to overcome this flaws.



                            AJIT KUMAR                                             ROLL# CS200118203 [10]
TECHNICAL SEMINAR PRESENTATION
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY




                                             THANK YOU


                             AJIT KUMAR           ROLL# CS200118203 [11]

				
DOCUMENT INFO