Professional Practices in Information Technology
CSC 110
ProfessionalPracticesin
Information Technology
HandBook
COMSATS Institute of Information
Technology
(Virtual Campus)
Islamabad, Pakistan
Professional Practices in Information Technology
CSC 110
Lecture 18
Hacking (Continued)
18.1 Why Do People Hack?
– Just for fun.
– Show of their knowledge
– Hack other system secretly.
– Destroy enemy’s computer network during the war.
– For profit people pays a cracker.
– Crack for sake of curiosity.
The Psychology of Hackers
– All information should be free.
– Access to computer should be unlimited and free.
– It can change life for better.
– It can create beauty on computer.
Professional Practices in Information Technology
CSC 110
18.2 Types of hacking
There are many types of hacking like:
– Password hacking
– Software hacking
– Net hacking
Password hacking
There are two types for password hacking. Brute force and dictionary based.
Brute force
– In that case hackers try out all the combination of all keyboard letters .it has greater success
but it takes long time
Dictionary based
– In that they are use predefine password. It is unsuccessful method
Software hacking
– In that hackers changes the look & execution way of that software
– Change the demo version into full version by decoding the source code
IP address
– IP address is the address of your computer in the internet. It is unique. Like:
Professional Practices in Information Technology
CSC 110
– 192.168.23.45
Port
It is not physical port but it is logical port in your computer. It is just like hole onto the system
through hacker can enter. There are thousands of ports into computer. The particular service is
running on particular port. Like:
Port 21: ftp
Port 23: telnet
Port 80: http
Port 25: mail
Hacking tools
There are many tools are available
– Scanners
– Telnet
– FTP
– LAN watch
Scanners
It is not a photo scanner. Scanner is program that automatically detects security weakness in
remote host. Port scanners are used in hacking. Port scanner can give the whole list of open port
on that system and which service is running on that. It can use almost all operating system.
ex. SATAN, NMAP
Telnet
Professional Practices in Information Technology
CSC 110
Telnet is ultimate hacking tool. It is terminal emulation program that allows us to connect to
remote system. You have to follow this step to use telnet.
C:\windows\telnet [ ip address] port
Ftp
FTP is one type of protocol but some time it is used as hacking tool, port 21 for the ftp. For
connecting ftp we need some ftp s/w known as ftp client. For connecting ftp server you have to
hammer that server.
Command: c:\windows\ftp [ip address]