hacking

23
What is Hacking? What is Hacking? Hacking is the act of breaking in to a computer Hacking is the act of breaking in to a computer system and is a criminal offence under the computer system and is a criminal offence under the computer misuse misuse Or Or The really simple definition of hacking: is gaining an unauthorized access to a computer system

Upload: mayank1293

Post on 15-Jul-2015

2.214 views

Category:

Education


0 download

TRANSCRIPT

What is Hacking?What is Hacking?

• Hacking is the act of breaking in to a computer Hacking is the act of breaking in to a computer system and is a criminal offence under the computer system and is a criminal offence under the computer

misusemisuse

OrOr• The really simple definition of hacking: is gaining an

unauthorized access to a computer system

Who is Hacker ?Who is Hacker ?

The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a Hacker

HACKER CATEGORIESHACKER CATEGORIES1. Semi-Professional Hacking. Performed part-time and does not

provide an income. They fit the classical hacker characteristics.. they work and play on the edge of society, have a gang mentality, strong negative responses to threats against his/her self-esteem, can have narcissistic personality disorders.

2. Inter-City Hacking. Inner-city residence (any race, color, religion, creed, etc,), exhibits anger at social condition, exhibits no social conscience, jail is not a deterrent. Hacking gives them a sense of power and allows them to make their own rules.

3. Euro hacking. More worldly , enlightened then US hackers and are generally motivated by philosophical or political concerns. Generally thought of as a way of life and not a crime, thinks hacking is treating technology without respect; thinks its great sport to spin up intelligence communities.

4. Professional Hacking. This encompasses any for profit activity such as spies, industrial espionage, Narco terrorist, White Collar criminals, etc.

• White hat

• Black hat

• Grey hat

• Elite hacker

• Script kiddie

• Neophyte

• Blue hat

Type of hackerType of hacker

White-hat HackersWhite-hat Hackers• The good guys

who identify the security weakness of the system or network and inform the owner about them

Black Hat HackersBlack Hat Hackers

A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.

Also known as ‘cracker’.

Grey hat HackersGrey hat Hackers

• A grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers

Why do Hackers Attack?Why do Hackers Attack? • Because they can• A large fraction of

hacker attacks have been pranks

• Financial Gain• Espionage • Venting anger at a

company or organization

• Terrorism

• To make security stronger ( Ethical Hacking )

• Just for fun• Show off• Hack other systems secretly• Notify many people their

thought• Steal important information• Destroy enemy’s computer

network

Hacking started because people realized that there were flaws with security. For example, this month people realized there was a major security flaw with internet explorer 7. Save PC user knew they could access others information without them knowing. Hacking also started because user were concerned about vulnerabilities.

Why did hacking start?Why did hacking start?

Type of hackingType of hacking

• Ethical hacking Ethical hacking or a ethical hacker are terms that

describe hacking performed to help a company or individual identify potential threats on the computer or network. An ethical hacker attempts to hack their way past the system security, finding any weak points in the security that could be exploited by other hackers. The organization uses what the ethical hacker finds to improve the system security, in an effort to minimize, if not eliminate, any potential hacker attacks.

Who are Ethical Hackers?Who are Ethical Hackers?

• “One of the best ways to evaluate the intruder threat is to have an independent computer security professionals attempt to break their computer systems”

• Successful ethical hackers possess a variety of skills. First and foremost, they must be completely trustworthy.

• Ethical hackers typically have very strong programming and computer networking skills.

• They are also adept at installing and maintaining systems that use the more popular operating systems (e.g., Linux or Windows 2000) used on target systems.

• These base skills are augmented with detailed knowledge of the hardware and software provided by the more popular computer and networking hardware vendors.

What is Ethical Hacking?What is Ethical Hacking?

• Ethical hacking – defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.”

• With the growth of the Internet, computer security has become a major concern for businesses and governments.

• In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.

Types of Hacker AttackTypes of Hacker Attack

Active AttacksActive Attacks Passive AttacksPassive Attacks

Active AttacksDenial of Service

Breaking into a site

Intelligence Gathering

Resource Usage

Deception

Passive AttacksSniffing

Passwords

Network Traffic

Sensitive Information

Information Gathering

• Routers:Routers: knowledge of routers, routing protocols, and access control lists knowledge of routers, routing protocols, and access control lists• Microsoft:Microsoft: skills in operation, configuration and management. skills in operation, configuration and management.• Linux:Linux: knowledge of Linux/Unix; security setting, configuration, and services. knowledge of Linux/Unix; security setting, configuration, and services.• Firewalls:Firewalls: configurations, and operation of intrusion detection systems. configurations, and operation of intrusion detection systems.• MainframesMainframes• Network Protocols:Network Protocols: TCP/IP; how they function and can be manipulated. TCP/IP; how they function and can be manipulated.• Project Management:Project Management: knowledge of leading, planning, organizing, and knowledge of leading, planning, organizing, and

controlling a penetration testing team.controlling a penetration testing team.

Skill of a hackerSkill of a hacker

1 Gary McKinnon• top 10 hackers gary in world Gary

McKinnon, 40, accused of mounting the largest ever hack of United States.

government computer networks — including Army, Air Force, Navy and NASA systems The court has recommended

that McKinnon be extradited to the United States to face charges of illegally accessing 97 computers,

causing US$700,000 (400,000 pounds; euro 588,000) in damage.

World’s best hackerWorld’s best hacker

2. Jonathan JamesJonathan james world top 10 hackersThe

youth, known as “comrade” on the Internet, pleaded guilty to intercepting 3,300 email messages at one of the Defense Department’s most sensitive operations and

stealing data from 13 nasa computer including some devote to the new international space station.

Onel de Guzman, whose father was a Onel de Guzman, whose father was a fisherman, was able to create a fisherman, was able to create a

computer program that went from one computer program that went from one American coast to the other in only American coast to the other in only

twenty-fours hours. His program had twenty-fours hours. His program had the capability o damage computers in the capability o damage computers in government offices from all over the government offices from all over the world and even the Pentagon and the world and even the Pentagon and the CIA suffered from his attack. People CIA suffered from his attack. People

got an email with the subject “I LOVE got an email with the subject “I LOVE YOU: A love letter for you” that YOU: A love letter for you” that

included an attached document called included an attached document called LOVE-FOR-YOU.txt.vbs. When people LOVE-FOR-YOU.txt.vbs. When people

clicked on it, a virus entered their clicked on it, a virus entered their computers and that was the end of it.computers and that was the end of it.

• 3 . KEVIN DAVID MITNICK IS THE BEST HACKER IN THE WORLD. HE STARTED WITH HIS MINOR CYBER CRIMES WHEN HE WAS TWELVE YEARS OLD. THE FIRST THING HE DID WAS HACK THE LOS ANGELES BUS SYSTEM IN ORDER TO GET FREE BUS TICKETS. AFTER THAT HE CONTINUED HIS HACKING CAREER BY DAMAGING THE FBI, DEC, IBM, MOTOROLA, NOKIA, SUN MICROSYSTEMS AND SIEMENS. HE WAS SENT TO PRISON FOR FIVE YEARS AND EIGHT MONTHS AND WHEN HE WAS FREED HE DECIDED TO SET UP MITNICK SECURITY, WHICH IS A SAFETY CONSULTANCY COMPANY THAT OFFERS ITS SERVICES FOR MULTINATIONAL FIRMS.

Ian Murphy Kevin Mitnick Johan Helsinguis

Linus Torvalds Mark Abene Robert Morris

Ian Murphy Kevin Mitnick Johan HelsinguisIan Murphy Kevin Mitnick

Linus Torvalds

Johan HelsinguisIan Murphy Kevin Mitnick

Mark AbeneLinus Torvalds

Johan HelsinguisIan Murphy Kevin Mitnick

Robert MorrisMark AbeneLinus Torvalds

Johan HelsinguisIan Murphy Kevin Mitnick

Robert MorrisMark AbeneLinus Torvalds

Johan HelsinguisIan Murphy Kevin MitnickIan Murphy Kevin Mitnick Johan HelsinguisIan Murphy Kevin Mitnick

Linus Torvalds

Johan HelsinguisIan Murphy Kevin Mitnick

Mark AbeneLinus Torvalds

Johan HelsinguisIan Murphy Kevin Mitnick

Robert MorrisMark AbeneLinus Torvalds

Johan HelsinguisIan Murphy Kevin Mitnick

How to save computer How to save computer fromfrom hackers hackers• Protect Your Computer: Avoid Computer

Holes/Vulnerabilities

• Install only trusted software and delete unknown emails .• If you have any doubt about a piece of software's

function, do not install it. • Avoid adult web sites, a hacker's paradise.• Whether in your e-mail or online, do not click on ads. If

the ad is of interest, find the site. Be careful with what you physically put into your computer. This is especially true for shared R/W CDs, USB hard disks, or flash drives. This is an easy path for a virus to follow from computer to computer.

Anti-virus software searches for evidence of the presence of viral Anti-virus software searches for evidence of the presence of viral programs, worm, bombs, and Trojan horses by checking for the programs, worm, bombs, and Trojan horses by checking for the characteristic appearances or behaviors that is typical of these characteristic appearances or behaviors that is typical of these

programs. When found the program logs its discovery, its type, often its programs. When found the program logs its discovery, its type, often its name or an identifier, and it potential for damage. name or an identifier, and it potential for damage.

our wireless network with a router that has a built in firewall. Almost all our wireless network with a router that has a built in firewall. Almost all wireless routers are set to no security when first installed. Log into the wireless routers are set to no security when first installed. Log into the

router and at least set it to basic security with a strong password to router and at least set it to basic security with a strong password to replace the factory setting that any hacker knows. replace the factory setting that any hacker knows.

Avoid disclosing personal details like phone number, credit card details to strangers.

ADVANTAGES OF HACKINGADVANTAGES OF HACKING

• CAN BE USED TO RECOVER LOST INFORMATION WHERE THE COMPUTER PASSWORD HAS BEEN LOST.

• -TEACHES U THAT NO TECHNOLOGY IS 100% SECURE • -TO TEST HOW GOOD SECURITY IS ON YOUR OWN

NETWORK. ;) • THEY CALL IT WHITE HAT COMPUTER HACKING.• -HACKING IS GOOD WITH GAMES ESPECIALLY WHEN YOU

ARE ONLINE BUT THE ONLY PROBLEM IS IF THE GAMING SERVER FINDS OUT THAT YOU HAVE BEEN HACKING THEN YOU COULD GET CHUCKED OFF THE GAMING SERVER SO WATCH OUT