14. WHAT IS HACKING? The meaning associated to the word 'hacking' is a positive one, and it mainly refers to the ability and desire to understand the inner mechanisms through which different components in the ICT world (typically computer programs) work. For this reason, even regular computer programmers are sometimes referred to as hackers. HACKERS WHITE HAT GREY HAT BLACK HAT
15. METHODS Brute Force Dictionary Attack Social Engineering Forgot Password Attack Phishing Denial of Service Attack(DOS) SQL Injection Attack ARP Poison Routing Attack using Tools
16. PHISHING GET THE SPOOF/FAKE PAGE .PHP SEARCH THE “ACTION =” FOR LOGIN ASSIGN “.PHP” FILE TO IT .HTML UPLOAD THE FILES TO WEB SPACE GET THE LINK OF THE HTML FILE SEND THE LINK TO VICTIM & WAIT FOR THE LOG FILE
17. TOOLS KEYLOGGERS MAIL BOMBER RATS CRYPTERS BINDERS JOINERS CAIN & ABEL SNIFFERS SUPER PHISHER ICON CHANGER SQLiHELPER V 2.7 VIRUS GENERATOR .BAT TO .EXE CONVERTER SANDBOXIE
26. VIRUS A virus is an entity that uses the resources of the host to spread and reproduce itself, usually without informed operator action. Let us stress here the word “informed”. A virus cannot run completely of its own volition. The computer user must always take some action , even if it is only to turn the computer on. This is the major strength of a virus: it uses normal computer operations to do its dirty work, and so there is no single unique characteristic that can be used to identify a previously unknown viral program. VIRUS INFECTION PAYLOAD TRIGGER
27. REMOTE ADMISTRATION TOOLS A Remote Administration Tool (known more commonly on the Internet as a RAT) is used to remotely connect and manage a single or multiple computers with a variety of tools, such as: Screen/camera capture or control File management (download/upload/execute/etc.) Shell control (usually piped from command prompt) Computer control (power off/on/log off) Registry management (query/add/delete/modify) Other product-specific function
28. FULLY UNDETECABLE When a system is to be attacked by a Trojan or R.A.T then the server part of it is made fully undectable by a crypter with the recent stub so that it can not be detected by the antivirus of the victim.By doing this the server of the trojan or R.A.T can escape from the antivirus and can be runned at the background. After accomplishing this one can check the authencity with the help of multiple antivirus engine ie. www.novirusthanks.com
29. CONCLUSION Hacking has a positive sense as compared to cracking.Knowing the tricks of hacking not only make one equiped with it but also make make the user maintain his/her security when working online.The hacking triks described above are for educational purpose not to harm anyone.