Download - Hacker
![Page 2: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/2.jpg)
Who is hacker? History of hacking Types of hacking Hacking accidents Why do hackers hack? What hackers do after hacking? What do hackers know?
![Page 3: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/3.jpg)
How can kid hack? Why can’t Korean kid hack? How can be a real hacker? Why can’t defend against hackers? How can protect the system? What should do after hacked?
![Page 4: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/4.jpg)
How to translate the hackers’ language
![Page 5: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/5.jpg)
HackCut with repeated irregular blowsExamine something very minutely
HackerThe person who hacks
CrackerSystem intruder/destroyer
![Page 6: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/6.jpg)
Hacker means cracker nowadaysMeaning has been changed
![Page 7: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/7.jpg)
Telephone hackingUse telephone freely It’s called phreaking
Computer virusDestroy many computers
Network hackingHack the important server remotely and
destroy/modify/disclose the information
![Page 8: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/8.jpg)
Normal
data transfer
Interruption Interception
Modification Fabrication
![Page 9: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/9.jpg)
Internet WormRobert T. Morris made an internet worm. It
spread through the internet and crashed about 6000 systems.
Cuckoo’s EggClifford Stoll caught the hackers who are
the German hackers applied by KGB
![Page 10: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/10.jpg)
IP SpoofKevin Mitnick was caught by Tsutomu
Shimomura who was security expert. Kevin Mitnick uses the IP Spoof attack in this accident
![Page 11: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/11.jpg)
Just for fun Show off Hack other systems secretly Notify many people their thought Steal important information Destroy enemy’s computer network
during the war
![Page 12: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/12.jpg)
Patch security holeThe other hackers can’t intrude
Clear logs and hide themselves Install rootkit ( backdoor )
The hacker who hacked the system can use the system later
It contains trojan ls, ps, and so on
![Page 13: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/13.jpg)
Install irc related program identd, irc, bitchx, eggdrop, bnc
Install scanner programmscan, sscan, nmap
Install exploit program Install denial of service program Use all of installed programs silently
![Page 14: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/14.jpg)
Don’t know how to use vi Don’t know what unix is Don’t know what they do Know how to intrude the system Know how to crash the system Know where the hacking programs are
![Page 15: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/15.jpg)
Kid has much of timeKid can search for longer time than other
people All hacking program is easy to use Kid doesn’t have to know how the
hacking program works These kids are called script kiddies
![Page 16: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/16.jpg)
Almost all Korean kids don’t know English well
Almost all hacking program manuals are written in EnglishHowever, many hacking program manuals
are being translated
![Page 17: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/17.jpg)
Study C/C++/assembly language Study computer architecture Study operating system Study computer network Examine the hacking tools for a month Think the problem of the computer
![Page 18: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/18.jpg)
There are many unknown security hole Hackers need to know only one security
hole to hack the system Admin need to know all security holes to
defend the system
![Page 19: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/19.jpg)
Patch security hole often Encrypt important data
Ex) pgp, ssh Do not run unused daemon Remove unused setuid/setgid program Setup loghost
![Page 20: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/20.jpg)
Use switch hub Setup firewall
Ex) ipchains Setup IDS
Ex) snort Check unintentional changes
Ex) tripwire
![Page 21: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/21.jpg)
Backup the system often
![Page 22: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/22.jpg)
Shutdown the systemOr turn off the system
Separate the system from network Restore the system with the backup
Or reinstall all programs Connect the system to the network It can be good to call the police
![Page 23: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/23.jpg)
1 -> i or l3 -> e4 -> a7 -> t9 -> g0 -> o$ -> s| -> i or l
|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x
![Page 24: Hacker](https://reader036.vdocument.in/reader036/viewer/2022070316/555a28abd8b42a900d8b4a31/html5/thumbnails/24.jpg)
Ex)1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3n 1 h4ck3d 1n
I did not hack this page, it was like this when I hacked in