MSBTE State Level Technical Paper Presentation Competition Hacking Authors : Mr. Sunny R. Lulla Mr. Anil N. Lulla Miss. Harsha Punjabi Institute of Technology Ulhasnagar “HACKING” What Is Hacking??? Hacker is one of those terms that has a different meaning depending on who uses it. Among programmers, to be a hacker is to be a star. Hackers are programming code jockeys that can throw together bits of miraculous pieces of programming seemingly at will. They are gurus. People who modify computer and other pieces of electronic hardware are also sometimes called hackers. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it's OK. The key difference is that the ethical hacker has authorization to probe the target. Types of Hackers:1. Script Kiddies 2. White Hat Hackers 3. Black Hat Hackers 4. Gray Hat Hackers 5. Blue Hat Hackers Script kiddies Script kiddies is a pejorative term for a computer intruder with little or no skill; a person who simply follows directions or uses a cook-book approach without fully understanding the meaning of the steps they are performing. White hat A white hat hacker or ethical hacker is someone who breaks security but who does so for altruistic or at least non-malicious reasons. White hats generally have a clearly defined code of ethics, and will often attempt to work with a manufacturer or owner to improve discovered security weaknesses, although many reserve the implicit or explicit threat of public disclosure after a "reasonable" time as a prod to ensure timely response from a corporate entity. The term is also used to describe hackers who work to deliberately design and code more secure systems. To white hats, the darker the hat, the more the ethics of the activity can be considered dubious. Conversely, black hats may claim the lighter the hat, the more the ethics of the activity are lost. Black Hat A black hat hacker is someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism, credit card fraud, identity theft, intellectual property theft, or many other types of crime. This can mean taking control of a remote computer through a network, or software cracking. Gray hat A grey hat hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted. Blue Hat A blue hat hacker is someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed. The term has also been associated with a roughly annual security conference by Microsoft, the unofficial name coming from the blue color associated with Microsoft employee badges. Common methods There are several recurring tools of the trade and techniques used by computer criminals and security experts: 1. Security exploit 2. Packet Sniffer 3. Spoofing attack 4. Trojan horse 5. Virus 6. worm Security exploit A security exploit is a prepared application that takes advantage of a known weakness. Packet Sniffer packet sniffer is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transmit either within the computer or over the network. Spoofing attack A spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. Trojan horse A Trojan horse is a program designed as to seem to being or be doing one thing, such as a legitimate software, but actually being or doing another. They are not necessarily malicious programs but can be. A trojan horse can be used to set up a back door in a computer system so that the intruder can return later and gain access. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called trojan horses. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.) Virus A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. Worm Like a virus, a worm is also a self-replicating program. The difference between a virus and a worm is that a worm does not create multiple copies of itself on one system: it propagates through computer networks. After the comparison between computer viruses and biological viruses, the obvious comparison here is to a bacterium. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program. It is possible for a program to have the blunt characteristics of both a worm and a virus. Before being a Ethical Hacker or Perfect Software Designer, you should know Hacking (how Software’s are being hacked using various Tricks).Sometimes hacking is done for some important or secrete data & sometimes for money. There Are Many Tools Available, Using Them You Can Do Following Things And Many More. 1. To Crack the Software’s. 2. To Create Viruses / Worms. 3. To Get the Password Of The Administrator. 4. To Hack the Sites. 5. How To Get The Passwords Of The Users Belonging To Any Site Using Some Tricks. 1. Get Ready Made Viruses According To Your Need. This Is The Tool Which Is Used To Create Viruses According To Your Use. In This Tool You Just Have To Select the Operations to Be Performed By Your Virus Then Select the Name of Virus and also Select The Server Name Of Virus. Select the Execution Time of Virus (when should the Virus to be activated). Click on Create Virus and here Virus Will be Created. 2. Get Administrators Password. This Is the Tool Which Is Used To Get The Password Of The Any User (Even Of Administrator) You Just Enter The Name Of The User & Click On Crack. The Password Will Be In Front Of Your Eyes. Send Mails To Any One Without Giving Your Identity You can send the mails from any E-mail ID To any E-mail ID without showing Your identity or without entering any password, free of cost. Send SMS To Any One from any mobile number You Can Send SMS To Any One From Any Number You Want Without Having That Number, Free Of Cost. There are many hacking techniques like 1. SQL injection 2. Cross Site Scripting. 1. SQL Injection:SQL injection is a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands inside these parameters. The result is that the attacker can execute arbitrary SQL queries and/or commands on the backend database server through the Web application. This can allow an attacker to not only steal data from your database, but also modify and delete it. If an attacker can obtain access to these Procedures it may be possible to compromise the entire machine. Attackers commonly insert single qoutes into a URL's query string, or into a forms input field to test for SQL Injection. If an attacker receives an error message like the one below there is a good chance that the application is vulnerable to SQL Injection. Example of SQL Injection:- 1) admin'-2) ' or 0=0 -3) " or 0=0 -4) or 0=0 -5) ' or 0=0 ## 6) " or 0=0 ## 7) or 0=0 ## 8) ' or 'x'='x 9) " or "x"="x This Is the Injection Used To Enter the Site as the Administrator. The Magnitude Of The Injection Is 25% To 30%. This Is The Site Which Is Hacked Using SQL Injection. And Many More Sites Are Even Hacked By This Method. 2. Cross Site Scripting Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will most likely click on this link from another website, web board, email, or from an instant message. Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods) so the request is less suspicious looking to the user when clicked on. After the data is collected by the web application, it creates an output page for the user containing the malicious data that was originally sent to it, but in a manner to make it appear as valid content from the website. Example Of Cross Site Scripting:- The Image Above Is Looking Like Original Orkut Login But It Is A Fake Login Screen As User Entered The Login Name And The Password. And Clicked On The Sign In Button The E-mail And Password Will Be Sent To Our E-mail Id The Code Is Written On The Submit Button. Conclusion So Now We Can Say That Hacking Is Very Easy Any One Can Do This By Using Some Tools, Techniques and Small Knowledge of Programming &Networking. And Most Important “Patience” Thank You