Monday 10 August 2009

Group 23 Task 2: Hacking

Group 23
NAVEEN VANAM
BHANU ANANTHUNI
PHANI ANNAM


Ethical Hacking:
'HACKER': A person who enjoys learning the details of computer systems and how to stretch their capabilities--as opposed to most users of computers, who prefer to learn only the minimum amount necessary.”
Taken From: Ethical Hacking, Palmer, C.C., IBM Systems Journal 2001, ISSN: 00188670 on 10-08-09.

What is ethical hacking:
Hackers want to be able to take advantage of the Internet for electronic commerce, advertising, information distribution and access, and other pursuits, but they are worried about the possibility of being "hacked".
Taken From: Ethical Hacking, Palmer, C.C., IBM Systems Journal 2001, ISSN: 00188670 on 10-08-09.

Who are ethical hackers?
Ethical hackers typically have very strong programming and computer networking skills and have been in the computer and networking business for several years. They are also adept at installing and maintaining systems that use the more popular operating systems (e.g., UNIX (**) or Windows NT (**)) used on target systems. These base skills are augmented with detailed knowledge of the hardware and software provided by the more popular computer and networking hardware vendors.
Taken From: Ethical Hacking, Palmer, C.C., IBM Systems Journal 2001, ISSN: 00188670 on 10-08-09.

What do ethical Hackers do?
An ethical hacker's evaluation of a system's security seeks answers to three basic questions:
• What can an intruder see on the target systems?
• What can an intruder do with that information?
• Does anyone at the target notice the intruder's attempts or successes?
The discussion begins with the client's answers to questions similar to those posed by Garfinkel and Spafford:
1. What are you trying to protect?
2. What are you trying to protect against?
3. How much time, effort, and money are you willing to expend to obtain adequate protection?
Taken From: Ethical Hacking, Palmer, C.C., IBM Systems Journal 2001, ISSN: 00188670 on 10-08-09.

THE ETHICAL HACK ITSELF:
Once the contractual agreement is in place, the testing may begin as defined in the agreement. It should be noted that the testing itself poses some risk to the client, since a criminal hacker monitoring the transmissions of the ethical hackers could learn the same information. The best approach to this dilemma is to maintain several addresses around the Internet from which the ethical hacker's transmissions will emanate, and to switch origin addresses often. Complete logs of the tests performed by the ethical hackers are always maintained, both for the final report and in the event that something unusual occurs. For example, an employee might want to try out some of the techniques for himself or herself. He or she might choose to test the company's systems, possibly annoying system administrators or even inadvertently hiding a real attack. The employee might also choose to test the systems of another organization, which is a felony in the United States when done without permission.
Taken From: Ethical Hacking, Palmer, C.C., IBM Systems Journal 2001, ISSN: 00188670 on 10-08-09.

Conclusion:
With the growth of the Internet, computer security has become a major concern for businesses and governments. As Roger Schell observed nearly 30 years ago, from a practical standpoint the security problem will remain as long as manufacturers remain committed to current system architectures, produced without a firm requirement for security. As long as there is support for ad hoc fixes and security packages for these inadequate designs and as long as the illusory results of penetration teams are accepted as demonstrations of a computer system security, proper security will not be a reality.

Group 14 Task 2: Hacking

Group 14
Chandrashekar Kalleda
Bharat Thota
Anil Kumar Reddy Kampally
Nageshwar Rao Nunna
Abhilash Raja
Ravi Kumar Gurram



What is hacking?
Hacking is word that to do some complex hardware and software programming and computers the programme is called hacker. These hackers are experts in the field of computing and have achieved a certain elite status within their field the other commonly know meaning of the word is someone breaks in to computer networks for his or her own purposes.

Traditionally, hackers were computer geeks who knew almost everything about computers both in hardware and software and were widely respected for their wide array of knowledge. In recent years the reputation of hackers has been steadily going down. At this time hackers are feared by most people and are looked upon as icons representing the underground community in the world.

Hackers know everything about the way software or an application works. Hackers have this uncanny ability of finding out ways of doing the impossible. “Recently a 13 year old hacker in the US who with his other hacker friend used to relish programming and hacking. These two people always enjoy breaking in to each other systems and proving their superiority. They both were imppensely intelligent and had the perfect mind needed for business.”

Types of Hackers:
• White hat hacker
• Gray or brown hat hacker
• Black hat hacker

White hat hacker: A person who is ethically opposed to the abuse of computer systems. Generally white hat focuses on securing IT Systems.

Black hat hacker: A person who will wish to secure his own machine and would like to break in to them. A Black hat refers to a person that maintains the knowledge of the vulnerabilities and exploits they find as secret for private advantage not revealing them either to the general public or manufacturer for correction. Many black hats promote individual freedom and accessibility over privacy and security.

Gray or brown hat hacker:
This type of hacker is a skilled hacker who sometimes acts legal in good will and sometimes not. This type of hackers is called hybrid hackers between White hat and black hat. There is no profit or personal gain and do not have malicious intensions but they may commit crimes in their actions.

All the loss in the world can’t and will not discourage computer criminals hackers are getting real smart these days and it is becoming increasingly easier for them to break in to a system, create a malicious and escape without living any trace behind. Laws are absolutely useless when system administrators themselves are becoming ignorant of computer security and are dismissing all hackers as people belonging to the dark side of society.

It has become absolutely necessarily to explain people as to how hackers are and how hacking is executed and how to protect computer systems from hackers. If above mention problems are not done as soon as possible then the hackers will get way ahead in the security ways.

If users are able to learn and can understand how someone break in our system then users would be in a better position to fix a security loop hole at the right time.

Group 9 Task 2: Hacking

Group 9
DILIP KUMAR VOLAM
RAVI KANTH SAMA
RAJASHEKAR MUSKU
RAGHUMA REDDY VAKITI



Hacking :
Hacking use of computer and networking resources. Hacking often is based on software bugs that a hacker can use to give him or her super user status. Hacking is a process of improving knowledge without any permission of users either it may be computer or computer network. Hacking is the breach of security system, usually pertains to someone gaining access to servers or database of any users. Hacking has taken a bit of a negative connotation, concerning people using backdoors, Trojans, etc. Hacker is a person who specializes in work with the security mechanisms form computer and network systems.

Types of hackers attack:
1. Viruses – most common form of attack
2. Denial of service attacks
3. Trojans
4. Brute force and social engineering password attacks
5. Port scanning and spoofing
6. Phishing
7. Ransomware

Effects of Hacking:
Computer hacking is a breach of computer security. Hackers may even delete sensitive information on gaining access to it. Delete or manipulation of sensitive data with intent to achieve personal gain is another effect of computer hacking. A user whose computer has been hacked is at the risk of losing all the data stored on his/her computer. Manipulation of sensitive user data is a grave consequence of hacking. Hacking can be used to convert computers into zombies that is internet enabled computers that are compromised by hackers or computer viruses. Some hackers are not harmful; they just want to prove themselves or to prove a point, but they won’t steal or destroy anything. Others are extremely dangerous they hack system even if it is bank, or online job, they might stealing money, credit card numbers, accounts.

Group 17 Task 2: Hacking

Group 17
Suresh Gopal
Krishna Mohan Gundavarapu
Jayesh Narani
Sudheer Pola



Hackers are highly skilled computer gurus who break into computer systems for a variety of reasons, from financial gain to just for the fun of a challenge. Despite these activities being illegal, the hacker community has maintained momentum for decades and shows no signs of slowing down.

Function: Hacking is an activity that is engaged in by people who use their knowledge of the internet, computers, firewalls and security preferences to break into other people's computers, allowing them to view private information, alter data and steal files, information or programs. MySpace pages, software applications and email accounts are the most common programs that are hacked into. Hackers typically look for passwords or credit card information. Some will simply hack into these programs in order to change information, such as a screen name, password or other content that is written by the owner.

Significance: Hackers are sometimes motivated by greed and steal personal information in order to take on someone's identity for their own gain, or in politics, where they try to exploit, blackmail or otherwise expose someone in power, or even just for entertainment, where hackers simply want to see what they are capable of doing. These types of hackers usually brag about their conquests on message boards or instant messaging programs, competing with fellow hackers as to who is the best among them.

History: The first case of hacking occurred in the 1960s when a group of students at the Massachusetts Institute of Technology (MIT) tried to access the school's main computing systems. In the 1970s, "phone phreaks" hacked into telephone networks and made toll-free calls. Mainstream computer hacking as we know it today gained momentum in the 1980s when hackers broke into what would now be considered message boards. Congress passed the Computer Fraud and Abuse Act in 1986, which made it illegal for anyone to break into anyone else's computer system. Despite the law, the 1990s saw the invention of the Trojan Horse, which allowed hackers to access any computer that downloaded the program. Many companies were hacked into as well, such as AOL, Yahoo!, Amazon and eBay.

Types: There are at least five main types of hackers. A hacktivist uses his hacker skills in order to broadcast a political message on the Internet. A cyberterrorist commits acts out of a desire to wreak havoc and cause harm to groups who he feels oppose him and his beliefs. A black hat typically breaks into a network in order to obtain information that will allow him to commit fraud or theft. A white hat may commit the same hacking acts as other hackers, but is not motivated by a malicious intent. A script kiddie uses hacking software in order to break into someone else's computer system. This software is usually obtained from another hacker who has figured out how to corrupt that specific program's system.

Features: Most hackers are talented computer programmers. They know how to write software and how to remove the kinks from other programs that are written by the hacking community. The most important feature of someone who hacks, however, is the "hacker mindset," a set of beliefs that the hacker community has established. The core belief is that it is OK to hack into someone else's computer and to obtain, distribute or otherwise exploit any information that may be found in the process. Hackers usually strongly believe in their First Amendment rights and believe that hacking falls under this umbrella.

Friday 24 July 2009

Group 7 Task 2: Hacking

Group 7:
UMADURGA KALVAKOLANU
BABU ALAPATI
DHARMENDRA BOGIREDDI
VENUMADHAV DUSA
PREETHI ADDLA
SUNITHA RAVI


HACKERS
“Hacker is a term used by some to mean "a clever programmer" and by others,
especially those in popular media, to mean "someone who tries to break into
computer systems.”

The term “hacker” tends to carry a mystique about it that ranges in definition
from anti-social computer genius to malicious virus writer. Thus, modern
hackers as defined in media stories tend to attack networks for identity theft,
to steal credit cards, extort banks , or launch denial-of -service attacks.
Brief definition of hackers A hacker is someone who gains unauthorized access to
a computer system. Many hackers just like the challenge of breaking through a
computer security system but not all hackers are harmless. It must also be said
that not all hackers are bad. Government and huge companies use hackers to
maintain their security systems. People normally confuse hackers with crackers.
While hackers crack the code of passwords to hack into a security system,
crackers crack the code of software to bypass its security mechanisms like
copyright protection etc. Hacking and cracking are two different methods, but
hackers normally possess cracking skills and crackers, hackings skills. Also
note that not all hackers are humans. You also get computerized hackers, but
they are developed by humans of course.
There are basically three types of hackers: Coders, Admins, and
script kiddies. This characterization is based upon overall competence and
ability to compromise computer technology, networks, protocols, and systems.

CODERS
Coders are programmers who have the ability to find unique vulnerabilities in
existing software and to create working exploit codes. These hackers, as a
whole, are not seeking publicity and are rarely part of front-page news
stories. As a result, they are known only to the security community for the
programs they write and the exploits they have uncovered.

Coders are individuals with a deep understanding of the OSI model and the TCP
stack. Coding is more than just a hobby, and they dedicate a great deal of time
and energy to it. They are committed to keeping their technical knowledge and
skills current. Not all coders are malicious. In fact, some are actively
involved in developing technologies that can be used to improve overall network
security, such as hackers from the ISS X-force, the Bind view Razor Team, and
the AXENT SWAT team.

Coders can work independently or through a network of hacking teams that run
exploits from a variety of locations, making it difficult to trace the
activities back to their source. These teams can be developed in Internet Relay
Chat (IRC) channels, in conferences such as DefCon, or in small groups of
computer savvy friends. Often coders create the programs and other members of
the team run them against target networks. This creates a reputation for the
group rather than a single individual.

ADMINS
Admins are far more common than Coders and may have experience with several
operating systems, understand TCP/IP, and know how to exploit several
vulnerabilities. They generally have less depth of knowledge but possibly
greater breadth than Coders. This level of hacker would be part of a security
team in a large organization. Some level of programming or scripting ability is
required. For example, they should be able to port a tool form on flavour of
Unix to another.

A majority of security consultants fall into this group. Admins have worked with
computers for most of their computer careers and understand how they work. They
have an extensive collection of tools, a reliable methodology, and ability, but
they generally rely on other people to identify and code most exploits due t
lack of time to specialize in a particular technology.

Admins like to play with new tools as soon as they come out and are often
beta-testers and part-time developers for freeware and open-source security
tools. They also found as regular contributors to security mailing lists or
post news articles online.

SCRIPT KIDDIES
The lowest and most populated part of the hacker pyramid is the Script kiddie.
Their name comes from the fact that members of this group generally rely on
previously coded scripts and pre-packaged hacking tools downloaded from the
Internet to do their hacking. Script kiddies are usually individuals who are
intrigued by the notion of gaining unauthorized access and a reopen to using
untested pieces of code, especially while others (target networks and users)
are at risk.

For this reason, script kiddies get the least respect but are often the most
annoying and dangerous. Script kiddies can cause big problems against networks
without truly understanding what the scripts do and what the consequences may
be. This combination of irresponsible experimentation and incomplete knowledge
often leads to disaster, such as the unintended loss of information.

Script kiddies do not necessarily have computer related professions. In fact,
given that they are often younger people on the Internet, they may still be in
high school. They run the code they find on the Internet on their office, home,
or school network. Script kiddies are generally precipitants of security mailing
lists, though they may not be regular contributors, and are often vocal in
hacker IRC channels. They spend most of their time surfing the Internet in
search of the latest and greatest automated hacker tools. Curiosity about how
the tools work and what information might be obtained leads to an unauthorized
security breech.

Sunday 19 July 2009

Group 19 Task 2: Hacking

Group No: 19
Salikuti Sandeepkumar Reddy
Nanada Kishore Sirugumalle
Murali Bhooma


Hacking:
Unauthorised use of computers and network resources is known as hacking. Gaining access to a computer or computer network without legal authorization. The goal of attacker would be complete system control. Firstly hacker attacks easy target and then by hiding his/her traces launches attacks on more secure sites and brings or gains complete control of the system. Hacker gains access to super-user account which allows availability to hide and also maximum access by which we can edit, install, delete or can execute any file in user’s directory.

The term” hacker” originally means a very gifted performer and hacking is defined as one who is proficient in programming a computer or using it; a computer buff. But in recent years by gaining easier access to multiple systems it now has negative implications which mean crackers which mean "One who uses programming skills to gain illegal access to a computer network or file."

There is lot of difference between hackers and crackers. Hackers are people who try to make things and crackers are a person who breaks things. Internet which is today is made by hackers who program or develop websites and they don’t harm them and work others done. But in today’s society hacker is popular in use as a cracker in thought and are using both hacking and cracking as methods of cracking. Hacking is a skill and not a very simple sequence of commands or either a simple operation. Approach of hackers must be changed and adopted depending on obstacles which come across. By harming people, their websites and work crackers get kick but real hackers get kick out of programming, helping and improving web. Crackers break software in order to distribute them for free. They do this to prove that they can do it.

There are different types of hacking:
1. Hacking hidden or password protected pages in a website.
2. Hacking other people's computers while they are online.
3. Hacking company servers to distribute viruses or read important information.

In all the above types in hacking least serious and easy thing is hacking hidden or password protected pages in a website. Although it is illegal some areas are legal. Many tools are available on internet which encourages this practice. When we create our own website the section protect your website will be of our own interest.

Hacking is illegal in most of the countries because it leads to piracy and damage. Damage can be either manually or through viruses. Computer can be made useless by deleting specific files. There are few counties which consider hacking as another advance in computer technology. Even where hacking is considered as legal the company, website or individual is based in country must abide the international rules.

Hackers spread viruses and destroy companies’ computers just for enjoyment. There is no reason for their spreading of viruses and they do merely because to show that they can do. Around the world there are many hacking tournaments every year. During tournaments companies monitor the systems 24 hours. There was a hacker’s challenge recently which lasted for 6 hours. It is easier to hack windows than Linux. And it is easier to hack with Linux as it is designed such that it allows users to issue any commands they want to. Companies’ installs virus filters and firewalls to prevent hackers from breaking into company files.

Saturday 18 July 2009

Group 13 Task 2: Hacking

Group 13
Anil Kumar Bheema
Venkata Ramana Chennoju


Computer Misuse
The Computer Misuse Act 1990 was designed to deter hackers -- see Ayres (1999).
There are several types of offence covered by this act, including:
• Hacking- breaking into computer systems without authorization
• Cracking- breaking or removing copy-protection on software
• Phreaking- exploring communications (telephone) networks to gain free access, calls or information. But with all computer misuse, the general rule is that prevention is better than cure--secure computer systems, passwords and cryptography provide a better solution than after-the-event laws and punishments, which should be considered only as a last resort.

Computer Crime and Legislation
Where the Internet is concerned, legislation is often the weakest form of protection. Since international boundaries are relatively meaningless, there are difficulties in defining the jurisdiction of courts.

What is Hacking?
Hacking is unauthorized use of computer and network resources. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it's OK. The key difference is that the ethical hacker has authorization to probe the target.

According to the Computer Crime Research Center, They said we work with IBM Consulting and its customers to design and execute thorough evaluations of their computer and network security. Depending on the evaluation they request which ranges from Web server probes to all-out attacks, we gather as much information as they can about the target from publicly available sources. As we learn more about the target, its subsidiaries and network connectivity, we begin to probe for weaknesses.

Examples of weaknesses:
Includes poor configuration of Web servers, old or unpatched software, disabled security controls, and poorly chosen or default passwords. As we find and exploit vulnerabilities, we document if and how we gained access, as well as if anyone at the organization noticed. In nearly all the cases, the Information Systems department is not informed of these planned attacks. Then we work with the customer to address the issues we've discovered.

The number of really gifted hackers in the world is very small, but there are lots of wannabes.... When we do an ethical hack, we could be holding the keys to that company once we gain access. It's too great a risk for our customers to be put in a compromising position. With access to so many systems and so much information, the temptation for a former hacker could be too great -- like a kid in an unattended candy store.

Types of Hacking

• Inside Jobs - Most security breaches originate inside the network that is under attack. Inside jobs include stealing passwords which hackers then use or sell, performing industrial espionage, causing harm as disgruntled employees, or committing simple misuse. Sound policy enforcement and observant employees who guard their passwords and PCs can thwart many of these security breaches.
• Rogue Access Points - Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. Local hackers often advertise rogue APs to each other. Rogue APs are most often connected by well-meaning but ignorant employees.
• Back Doors - Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in your network.
• Viruses and Worms - Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.
• Trojan Horses - Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus, password gobbler, or remote-control SW that gives the hacker control of the PC.
• Denial of Service - DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).
Distributed DoSs (DDoS5) is coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.
• Anarchists, Crackers, and Kiddies - Who are these people, and why are they attacking network?
- Anarchists are people who just like to break stuff. They usually exploit any target of opportunity.
- Crackers are hobbyists or professionals who break passwords and develop Trojan horses or other SW (called warez). They either use the SW themselves (for bragging rights) or sell it for profit.
- Script kiddies are hacker wannabes. They have no real hacker skills, so they buy or download warez, which they launch.
Other attackers include disgruntled employees, terrorists, political operatives, or anyone else who feels slighted, exploited, ripped off, or unloved.
• Sniffing and Spoofing - Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister. Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.

Hacker?
The term “hacker” can also mean just someone who programs in a particular way, or who just enjoys tinkering with computers; in some circles I'd describe myself as a hacker, though I don't attempt to break into computer systems (except my own!). Many hackers have campaigned for the term “cracker” to be used universally for anyone involved in illegitimate activity involving computers. I list the terms as above since that's how the Computer Misuse Act defined them.
There are three types of hackers
- White hat
- Grey hat
- Black hat
White hat hacker:
It finds a fault in a security system i.e. a website then they will inform the owner immediately.
Grey hat hacker:
It finds a fault he will do what he feels like at the time i.e. exploiting the site OR informing the owner.
Black hat hacker:
If they find a fault will immediately exploit the site for their own beneficial gain i.e. advertising and infecting other computers with "viruses" to gain access to more sites.
So a hacker can be many things from protecting systems by informing the owners or Exploiting and stealing data. The most common name for the destructive type of "hacker" is a "cracker" I always tries to refer to a bad hacker as a cracker to avoid confusion.

Ethical Issues of the Internet Revolution:
Society currently understands hacking to be a form of unlawful behavior and a medium for creative innovation. Hacking has become an activity that holds two positions and is therefore both solemnized for its insightful inventiveness and defamed for its devious acts.

The ethics behind hacking and the actions taken by hackers constitute a philosophical manifest that transcends our understanding of this art. Hackers argue that actions promote a means for tighter security by way of detecting flaws and patches for systems and software. However, these very actions are viewed as violations of rights to privacy and security for both individuals and organizations. Consequently, this establishes a cautionary attitude toward ethical issues such as, privacy, security and the future of the World Wide Web.

In order to comprehend the ethical and the moral principles underling the meaning of hacking one has to understand has t the roof f hacking. In hackers the heroes of the computer revolution, Steven levy traces the root of hacking to MIT in the late 1950s, where students devoted much time and effort to building and programming MIT’s early mainframes. These programmers, who later became known as “Hackers” produced and debugged computer code at an astonishing rate.

They developed hardware and software for existing computer functions and invented novel applications and algorithms that were later incorporated into subsequent generations of computers. The code written by hackers came to symbolize their freedom and their love for programming, which was distributed freely across bulletin board systems(BBS) and cross the unconquered terrain of the internet. Eventually, this freedom of code gave rise to the concept that software should be free.

Another argument supported by the hacker ethic s that break-ins elucidate security problems to those who can do something about them. Hacker instructions into systems surpass the traditional systems surpass the traditional understanding of violating the laws of trespassing. Hacking involves the exploitation, or as discussed by members of the computer hacker underground, the manipulation of a bug, or a backdoor that is inherently present within the system. Emmanuel Goldstein, editor of 2600, a magazine recognized as the "Hacker's quarterly," states, "Hackers have become scapegoats. We discover the gaping holes in the system and then get blamed for the flaws". This statement suggests that cracking down on hacking activity is simply a way of putting blame on the messenger. In this view, hacking is not a threat against the integrity of the system being exploited, but instead is a means of implementing corrections and enforcing tighter security.

The ethical stand supporting hacker activities are proven by this discussion to be mainly unethical. Even though hacking undoubtedly has led to productive improvement in computers and software security, it has in effect created many disruptive problems online and offline. Hacking is an activity that introduces a method of analysis that targets and works on various components. Hacking has the potential to cause harm and to violate legitimate privacy and property rights. By ethical standards hacking does introduce crucial security fixes, but does so at the expense of violating privacy and the security of individuals. Furthermore, hacking activities lead to disruptive and dangerous problems for society, which tend to be difficult to eradicate.