logging in or signing up Hacking and Cracking ammulu.nani Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 1206 Category: Science & Tech.. License: All Rights Reserved Like it (1) Dislike it (0) Added: September 18, 2012 This Presentation is Public Favorites: 0 Presentation Description its the best for cracking the windoe=ws passwords Comments Posting comment... Premium member Presentation Transcript HACKING AND CRACKING: HACKING AND CRACKING BY: G.Jaya Krishna B.Amarnath M.AchyuthAnand Yadav S.Farooq BashaObjectives of Hacking and Cracking: Objectives of Hacking and Cracking What is Hacking? Difference between Hacking and cracking Types of Hackers Types of Hacking Techniques Preventive measures Some Cracking Examples HACKING : HACKING Authorized or Unauthorized attempts to bypass the security mechanisms of an information systems or network In simple words Hacking means finding out weaknesses in a computer or computer networkPowerPoint Presentation: Understand the difference of hacking and cracking Hacking builds things Cracking breaks them Why do people hack ?: Why do people hack ? Just for fun Hack other systems secretly Notify many people their thought Steal important information Destroy enemy ’ s computer networkLiteral Definitions: Literal Definitions Hacker : Someone who uses hacks. Cracker : some one who destructs things. Hacks : A different approach with some significant advantage over the current approach Types of Hackers: Types of HackersWhite-hat Hackers: White-hat Hackers The good guys who identify the security weakness of the system or network and inform the owner about them Black Hat Hackers: Black Hat Hackers A black hat is the villain or bad guy , who crash into victim’s security to steal information and destroy the victims security network. Grey hat Hackers: Grey hat Hackers A grey hat , in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackersPowerPoint Presentation: TYPES OF HACKING TECHNIQUES Pretexting PhishingPowerPoint Presentation: Pretexting: Pretexting is the act of creating and using an invented scenario to persuade a target to release information (e.g. date of birth, Social Security Number, last bill amt.) Phishing: Phishing is an e-mail fraud method in which the perpetrator sends out email in an attempt to gather personal and financial information from recipients. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details . Ebay and PayPal are two of the most targeted companies, and online banks are also common targets Language of hackers: Language of hackers 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l |\| -> n |\/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> xPowerPoint Presentation: Example: 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|\| 1 h4ck3d 1n I did not hack this page, it was like this when I hacked in . World famous hackers: World famous hackers Stephen Wozniac Tsutomu ShimomuraPowerPoint Presentation: Kevin Mitnick Kevin Poulsen Random Fact !!!!: Random Fact !!!! The average age group of hackers are aged between 14-24 yrs. …Did you know ?: Did you know ? Social networking sites like ‘FACEBOOK’, ’GMAIL’, ’YAHOO” comprised of 60% of direct or indirect hacking incidents. Most popular virus: Most popular virus Links involving private pictures of celebrities. Links showing pictures of famous personalities like videos of Osama Bin Laden’s killing. Another popular scam : Another popular scam Facebook lottery scam. Preventive measures : Preventive measures Install a strong anti-virus Always run a anti-virus check before you download a program or a file from the internet. Avoid disclosing personal details like phone number, credit card details to strangers. A good firewall ( Sygate personal) A good spy ware / Trojan buster. Use of genuine softwareHow to become Hacker: How to become Hacker The best approach is to gain as much knowledge about stuff as you can. Good command over C / C++ / Perl will definitely help. But above all you need a good logical brain.Some Examples of Cracking: Some Examples of Cracking Windows Cracking 1). BIOS Password Breaking 2). Windows Logon Password BreakingBios password breaking : Bios password breaking We can break BIOS password in any one of the following ways: Trying default password Hardware approachTrying default passwords: Trying default passwords some default BIOS passwords Lkwpeter AMI cmos j262 Award AMI!SW1 AWARD_SW bios AMI? SW1 AWARD_PW BIOS password Biostar setup hewittrand ‘j262’ opens most version of Award bios; it works about 80 per cent of the timeHardware approach: Hardware approach If the default passwords did not work, then try to reset the Bios to its default settings so that it asks for no password at all. Procedure for hardware approach is as follows First, we have to open the computer and then look for a round lithium battery, it probably looks like a silver coin. So, remove the battery and after 30 seconds or so put it back.Window log on password breaking : Window log on password breaking To hack windows login password, reboot and wait for the message: When we see the boot menu on the screen, press F2 or F12 before “Starting Windows 9x…” . The boot menu will come up. Select option to boot into DOS . C:\>cd windows C:\windows> ren *.pwl *.xyz // RENAME Or delete them by typing C:\windows>del *.pwl *.xyz //DELETEPowerPoint Presentation: Easy and Simple approach On many computers a series of keystrokes may crash the password program. keep pressing ESC 15 to 20 times . This will result in the crashing of the password program and the computer will continue booting . BY BOOTING We can break into a computer by using live tools like conboot live cd which are readly available on internet .The live cd can be used to make a bootable pen drive and then we can break into any computer.PowerPoint Presentation: ANY QUERIES ? You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.