Windows Hacking
Windows Hacking
Windows Hacking
Topic:
Presented By:
What is Hacking?
History of Hacking
Hacking has been around for more than a century. In the 1870s, several
teenagers were flung off the countrys brand new phone system by enraged
authorities. Heres a peek at how busy hackers have been in the past 35 years.
Early 1960s
Early 1970s
John Draper makes a long-distance call for free by blowing a precise tone into
a telephone that tells the phone system to open a line. Draper discovered the whistle
as a give-away in a box of childrens cereal. Draper, who later earns the handle
Captain Crunch, is arrested repeatedly for phone tampering throughout the 1970s.
John Draper
Early 1980s
In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s
(named after the local area code) after members are accused of 60 computer
break-ins ranging from Memorial Sloan-Kettering Cancer Center to Los Alamos
National Laboratory.
Two hacker groups form, the Legion of Doom in the United States and the
Chaos Computer Club in Germany.
Late 1980s
At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and
Digital Equipment security officials. He is convicted of damaging computers and
stealing software and is sentenced to one year in prison.
An Indiana hacker known as Fry Guy so named for hacking McDonalds
is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of
Doom hackers known by the handles Prophet, Leftist and Urvile.
Early 1990s
Hackers break into Griffith Air Force Base, then pewwwte computers at NASA
and the Korean Atomic Research Institute. Scotland Yard nabs Data Stream, a
16-year-old British teenager who curls up in the fetal position when seized.
Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after
he is tracked down via computer by Tsutomu Shimomura at the San
Diego Supercomputer Center.
Late 1990s
A Canadian hacker group called the Brotherhood, angry at hackers being falsely
accused of electronically stalking a Canadian family, break into the Canadian
Broadcasting Corp. Web site and leave message: The media are liars. Familys
own 15-year-old son eventually is identified as stalking culprit.
Hackers pierce security in Microsofts NT operating system to illustrate its
weaknesses.
1997
Popular Internet search engine Yahoo! is hit by hackers claiming a logic bomb
will go off in the PCs of Yahoo!s users on Christmas Day 1997 unless Kevin Mitnick
is released from prison. There is no virus, Yahoo! spokeswoman Diane Hunt said.
1998
Hackers claim to have broken into a Pentagon network and stolen software for
a military satellite system. They threaten to sell the software to terrorists.
Hacker group L0pht, in testimony before Congress, warns it could shut down
nationwide access to the Internet in less than 30 minutes. The group urges stronger
security measures.
2000
Hackers break into Microsofts corporate network and access source code for
the latest versions of Windows and Office.
2001
Microsoft becomes the prominent victim of a new type of hack that attacks the
domain name server. In these denial-of-service attacks, the DNS paths that take
users to Microsofts Web sites are corrupted. The hack is detected within a few
hours, but prevents millions of users from reaching Microsoft Web pages for two
days.
Types of Hacking
Password Hacking
Hacking in the server may change the server database. Hacking is as if the
person gets a right to access the machine without any interruption.
Data Thefting
Accessing the remote machine may cause the thieving of data from that
machine.
Unauthorized Access
Types of Hackers
Those hackers make any kind of loss of hacked machine and a problem for
general people, are called as black hat hackers.
White Hacker
Those hackers are registered and help the persons only by searching the
weakness of a system, are called white hackers.
Disadvantages of Hacking
Advantages of Hacking
Patching
Patch is a fix for a software program where the actual binary executable and
related files are modified. Often this is used to repair a software bug.
Cracking
Thefting
Thefting is generally the stealing of password.
Updration of Hacking
Fishing
The name fishing has come to know as if the hackers catches the fish from the
network stream. Generally secret data are stolen from the network data stream.
Tools of Hacking
Spyware
Spyware is computer software that collects personal information about users without
their informed consent. The term, coined in 1995 but not widely used for another
five years, is often used interchangeably with adware and malware (software designed
to infiltrate and damage a computer).
Adware
Malware
Trojan-horse
The other type is a standalone program that masquerades as something else, like a
game or image file, in order to trick the user into some misdirected complicity that is
needed to carry out the programs objectives.
Prevention of Hacking
To prevent hacking, we have to be concious about the usage and every step
we do. A wrong step may hack the system and when it will be done, we will be full
hopeless. There nothing be left.
Conclusion
We cannot take a end in the conclusion, because the hacking is still going on.
It was running from the past and will run for hundreds of years. As everything have
a negative side, the computing system has also a negative side and through it some
black hat hackers trespass. So the main thing is to detect the way and seal these
way. This may draw a conclusion in hacking history,