Hacking Tutorial in Telugu

SravaniReddy27 13,939 views 24 slides Jul 04, 2015
Slide 1
Slide 1 of 24
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24

About This Presentation

learn hacking tutorial in telugu, learn ethical hacking in telugu, free hacking tutorial in telugu


Slide Content

What is hacking?
BY
WWW.TIMECOMPUTERS.IN

Contents (1)
Who is hacker?
History of hacking
Types of hacking
Hacking accidents
Why do hackers hack?
What hackers do after hacking?
What do hackers know?

Contents (2)
How can kid hack?
Why can’t Korean kid hack?
How can be a real hacker?
Why can’t defend against hackers?
How can protect the system?
What should do after hacked?

Contents (3)
How to translate the hackers’ language

Who is hacker? (1)
Hack
Cut with repeated irregular blows
Examine something very minutely
Hacker
The person who hacks
Cracker
System intruder/destroyer

Who is hacker? (2)
Hacker means cracker nowadays
Meaning has been changed

History of hacking
Telephone hacking
Use telephone freely
It’s called phreaking
Computer virus
Destroy many computers
Network hacking
Hack the important server remotely and
destroy/modify/disclose the information

Types of hacking
Normal
data transfer
Interruption Interception
Modification Fabrication

Hacking accidents (1)
Internet Worm
Robert T. Morris made an internet worm. It spread
through the internet and crashed about 6000 systems.
Cuckoo’s Egg
Clifford Stoll caught the hackers who are the German
hackers applied by KGB

Hacking accidents (2)
IP Spoof
Kevin Mitnick was caught by Tsutomu Shimomura who
was security expert. Kevin Mitnick uses the IP Spoof
attack in this accident

Why do hackers hack?
Just for fun
Show off
Hack other systems secretly
Notify many people their thought
Steal important information
Destroy enemy’s computer network during the war

What do hackers do after
hacking? (1)
Patch security hole
The other hackers can’t intrude
Clear logs and hide themselves
Install rootkit ( backdoor )
The hacker who hacked the system can use the system
later
It contains trojan ls, ps, and so on

What do hackers do after
hacking? (2)
Install irc related program
identd, irc, bitchx, eggdrop, bnc
Install scanner program
mscan, sscan, nmap
Install exploit program
Install denial of service program
Use all of installed programs silently

What do hackers know?
Don’t know how to use vi
Don’t know what unix is
Don’t know what they do
Know how to intrude the system
Know how to crash the system
Know where the hacking programs are

How can kid hack?
Kid has much of time
Kid can search for longer time than other people
All hacking program is easy to use
Kid doesn’t have to know how the hacking program
works
These kids are called script kiddies

Why can’t Korean kid hack?
Almost all Korean kids don’t know English well
Almost all hacking program manuals are written in
English
However, many hacking program manuals are being
translated

How can be a real hacker?
Study C/C++/assembly language
Study computer architecture
Study operating system
Study computer network
Examine the hacking tools for a month
Think the problem of the computer

Why can’t defend against
hackers?
There are many unknown security hole
Hackers need to know only one security hole to
hack the system
Admin need to know all security holes to defend the
system

How can protect the system?
(1)
Patch security hole often
Encrypt important data
Ex) pgp, ssh
Do not run unused daemon
Remove unused setuid/setgid program
Setup loghost

How can protect the system?
(2)
Use switch hub
Setup firewall
Ex) ipchains
Setup IDS
Ex) snort
Check unintentional changes
Ex) tripwire

How can protect the system?
(3)
Backup the system often

What should do after hacked?
Shutdown the system
Or turn off the system
Separate the system from network
Restore the system with the backup
Or reinstall all programs
Connect the system to the network
It can be good to call the police

How to translate the hackers’
language (1)
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|\| -> n
|\/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x

How to translate the hackers’
language (2)
Ex)
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1
h4ck3d 1n
I did not hack this page, it was like this when I hacked
in