MES PILLAI COLLEGE OF EDUCATION AND RESEARCH CHEMBUR NAKA. HACKAHOLIC – S.Y.B.ED (2016-17)

HACKING

Origin of hacking

It all began in the 1960s at MIT, ple who sat locked in a room all day origin of the term “”, where programming nonstop, hours on extremely skilled individuals prac- end. No one seemed to mind hack- ticed hard-core programming in ers back in the 1960s when this was FORTRAN and other older lan- the most widely excepted reputa- guages. Some may ignorantly dub tion. In fact, most people had no them “nerds” or “geeks” but these idea what hacking was. individuals were, by far, the most intelligent, individual, and intellectu- The term hacker was accepted as a ally advanced people who happen positive label slapped onto comput- to be the pioneers and forefathers of er gurus who could push computer the talented individuals that are to- systems beyond the defined limits. day the true . Hackers emerged out of the artificial intelligence labs at MIT in the The true hackers amongst our soci- 1960s. eties have an unquenchable thirst for knowledge. Boredom is never an A network known as ARPANET was object of challenge for hackers. founded by the Department of Defense as They have an almost anomalous a means to link government offices. In ability to absorb, retain, and exert time, ARPANET evolved into what is to- vast amounts of knowledge with day known as the Internet... regard to intricate details Hackers used to be viewed as peo-

INTRODUCTION

A hacker is an individual who hackers probe them on a never nerabilities in computer systems uses computer, network or ending mission to make compu- which, if not found, could re- other skills to overcome tech- ting more secure when hacking main secret and one day lead to nical problem. first originated, the urge to hack the downfall of our increasingly Hackers have developed meth- into computer systems was based computer dependant civilization. purely on curiosity. ods to exploit security holes in Hackers come up with useful various computer systems. As Hackers find and release the vul- new computer systems and protocols become updated,

What’s inside? Hacking team ORIGIN AND INTODUCTION 1  Anusha Devi Sekar– (01) TYPES OF HACKING 2  Roshini Maria Joseph -(22) HOW DO PEOPLE HACK 3

WHAT MOTIVATES A HACKER 3  Sivaranjani Ganeshan- (32)

PHIISHING ATTACK - [NEW TREND] 3  Shilpa waghe (39)

BEST HACKERS IN INDIA 4

STATISTICAL DATA 5

HOW TO PROTECT FROM HACKING 5

FUNZONE AND CONCLUSION 6 MES PILLAI COLLEGE OF EDUCATION AND RESEARCH

TYPES OF HACKERS

Hackers can be classified into differ-  This type of hack-  Black hats also ent categories such as white hat, er uses his or her try to break into black hat, and grey hat, based on skills to steal computer sys- their intent of hacking a system. money or data, tems to steal These different terms come from old knock a computer credit card infor- Spaghetti Westerns, where the bad system offline, or mation and possi- guy wears a black cowboy hat and even destroy bly steal valuable the good guy wears a white hat . them. information to sell on the black mar-  Some of these ket. Black hat hackers love to see their work  The black hat hackers and name in the works outside of news, so they the law.  The black hat hacker is the would try to target  They work alone one who hacks for malicious big name organi- wolf, or with a intent - he is the bad guy. zations and com- panies. team.

White hat organization that malicious hacking has hired them attempts in the hackers future.  White hat hackers  White hat hacker’s use their are usually seen  For the most part, skills to improve security by as hackers who the term is synon- exposing vulnerabilities be- use their skills to ymous with fore malicious hackers can benefit society. "ethical hacker. detect and exploit them  An organization  Although the methods used can hire these are similar, if not identical, to consultants to do those employed by mali- tests and imple- cious hackers, white hat ment best practic- hackers have permission to es that make them employ them against the less vulnerable to

Grey hat hackers

completely above play a role in the  A grey hat hacker board, but are security environ- is someone who often operating ment. may violate ethi- for the common cal standards or good.  One of the most principles, but common exam- without the mali-  Many people see ples given of a cious intent as- the world of IT grey hat hacker is cribed to black security as a someone who hat hackers. black-and-white exploits security world. vulnerability in  Grey hat hackers order to spread may engage in  However, grey public awareness. practices that hat hacking does seem less than HOW DO PEOPLE HACK

 Part 1 chine first 1. Before you hack  Use various tricks  Test the target  Learn a programming  Create back  Determine the oper- language doors ating system  Know your target  Find the path or Part 2 open port in the sys- tem 2. Hacking  Crack the password  Use a nix terminal for or authentication commands process  Secure your ma-  Get super user privi- leges

WHAT MOTIVATES A HACKER

Understanding the mo-  Political Gain child crimes tives of potential attack- ers has long been a  Moral Disagree-  Intellectual prop- problem for many peo- ment erty and trade theft ple. While there are infi-  Cultural and Reli- nite possible motives, Its gious believe it’s most im- portant to understand  Revenge and that no matter the situa- Defamation tion, there is always something that another  Thrill and Enter- wants, an agenda that tainment someone wants to fur- ther, or a belief that  Nation state someone disagrees with.  Abduction and

PHISHING ATTACK– THE NEW TREND

Phishing attacks often  Emails threating to use email as a vehicle,  Emails from peo- harm recipients sending email messag- ple you know unless sums in the es to users that appear claiming stranded thousands of dol- to be from an institution in a foreign coun- lars are paid or company that the try, asking you to individual conducts wire money so  Emails claiming to business with, such as that they can trav- be a confirmation a banking or financial el home of complaints filed by the recipients. institution, or a web  Emails claiming service through which The links and at- to be from reputa- tachments, of the individual has an ble news organi- account. course ,contain sation capitalizing malicious code on trending news MES PILLAI COLLEGE OF EDUCATION AND RESEARCH

Well known hackers in India

 Rahul tyagi Aside from being an expert on breaking and entering computers Rahul tyagi is also an author and a talented actor

 Pranav mistry This hacker extraordinaire is also famous for the invention of sixth sense a technology that is used by NASA and also invisible computer mouse Its impossi- ble` said pride Its risky said experi-  Ankit fadia ences. Writing a book titled “unofficial guide to ethical hacking at the Its pointless age of 15 is a far cry from playing football at the tender said rea- age and the rest is history son. when it come to world re- nowned Indian ethical hacker If you really are hacker!  Vivek ramachandran Then give it Having won many awards including one from both Mi- a try crosoft and cisco.

 Jayant krishnamurthy This real hacker has interest Ranging from information extraction to knowledge rep- resentation and common sense reasoning in artificial intelligence. He is also a computer theorist and re- searcher. Statistical data

HOW TO PROTECT YOURSELF FROM BEEN HACKING

Part 1 Read privacy policies Part 3 carefully  Keeping your  Keeping your accounts secure Logout accounts once done computer secure Create complex pass- Backup your data fre- Part 2 words quently Use password manager  Keeping your Avoid clicking suspicious Phone secure Don't give out your pass- links words Use touch id Install or activate firewall Change your password Change phone passcode often often

Fun zone...

Conclusion As technology has improved our lives have become easi- er in many ways, but with this blossoming industry new types of criminals have also been created. A criminal does now not even need to leave the house in order to steal money, but can do so simply by hacking into their victim’s computer and accessing confidential data.

Hacking is not always illegal though, and this has also looked at the ways in which there is an increasing demand for computer experts to become ethical hackers in order to further promote and protect . This introduction to the world of hacking has revealed that hacking is not a simple activity but a huge spectrum of different behav- iors that involve a wide range of techniques and motiva- tions .