Wednesday, July 14, 2010

HACKING
















Hacking in simple terms is unauthorized and unlawful access to a network or a computer,with a goal to steal information(s).








































































Basically,there are two ways to hack in to a system, for example, if one has to access some kind of safe(suppose for a while) we hav possibly 2-way of doing that-







  • steal the key-deals with ignorance and knowledgelessnesss of your(the users), this method require enough knowledge,talent and a little-bit of luck.



  • use dynamite to burst the lock-deals with use of viruses,trojans,spyware programs etc.;This method doesn't require much talent,as these tools are freely available on diffrent sites which even a "kiddle hacker" (mostly highschool students with little or no knowledge of the subject)can easily excess easily,this arose the situation even more dangerous..

    Now,one can say that "i don't do anything except reading my mail suchthings are not likely to happen to me?"





Then,my friend you are mistaken...





ok,tell me how many of you have file\printer sharing turned on ?,i will tell you how can u be hacked in even less the 15sec...,




Proceeds as the steps below:




  • click start>run


  • click run and type "winipcfg"



  • hit the enter key



a window will appear..



choose PPP Adapter,if you are dial-up user ;OR




PCI Busmaster or SMC Adapter etc if you have dedicated access.




  • Note down your IP-ADDRESS and close the window.



  • Again click start>run


  • Type "cmd".


a black screen(dos-screen) will appear.





  • Type the following "Netstat -A IP-ADDRESS" over there.



IP-ADDRESS:Type the ip-address you got from above step.








  • This will give you a "NET-BIOS" remote machine name table:




NAME TYPE STATUS


J-1 <00> UNIQUE registered
WORK <00> UNIQUE registered


J-1 <20> UNIQUE registered








  • look for 20hex in the 2nd column ,in between angular braces(as we have last one in above table).The value 20hex means your file\printer sharing is turned on and any-one (even a kiddle hacker) can hack into your computer as follows:




  • They will scan on a range of ip-addresses for the system with "file and printer sharing" turned on. Once found what has been shared.




  • "Netuse X:\\\temp" command is used for example, if "temp" directory of yours is found to be shared.If every-thing is alright ,hacker can access your computer through this directory.




This type of attack is called"NETBIOS ATTACK".






Now,tell me how much time is needed for such a attack?







PREVENTION STEPS:

















  • Look for any shared directory-



.click start and scroll for shared programs(shared files look like someone holding a folder in hand)









  • Open the folder in specific drive .


  • At right click of mouse button you will find a option "share with" and click on it.




  • Now, mark it as read only and give a password if you share file or printer otherwise,directly turn off the sharing by clicking on "not shared" option and then click on "ok" button.







NOW,you are protected to "NET-BIOS" attack.





Conclusion: With the development of sophisticated tools and advanced technique hacking became so easy that even a kid can accompnish it.No software or antivirus can keep the pace with the development in the field of hacking.perhaps, a awre user(you) can tackle.


REFRENCES BOOKS:








































































































































































































































































































No comments:

Post a Comment