are you secure

18
--By Anindya Roy Sr. Manager – Tech Research CyberMedia Labs Are you Secure?

Post on 19-Oct-2014

461 views

Category:

Documents


0 download

DESCRIPTION

how hacking works

TRANSCRIPT

Page 1: Are you Secure

--By Anindya RoySr. Manager – Tech Research

CyberMedia Labs

Are you Secure?

Page 2: Are you Secure

HackA Hack is usually a technique used to subvert,

misuse or cleverly change a program, gadget or mechanism in such a way as to change, or add to, its functionality.

Hack has several meanings in the technology and computer science fields: a clever or quick fix to a computer program problem; a clumsy or inelegant solution to a problem; or a modification of a program or device to give the user access to features that were otherwise unavailable to them.

• From Wikipedia

Page 3: Are you Secure

HackingUnauthorized use, or attempts to

circumvent or bypass the security mechanisms of an information system or network

Page 4: Are you Secure

AgendaDDoSSniffingSpoofingPhishing/Spamming Brute-force/Dictionary AttacksPhysical Security

Page 5: Are you Secure

DDoSA denial-of-service attack (DoS attack) or

distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the intensive, malicious efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

Page 6: Are you Secure
Page 7: Are you Secure

Sniffing

Promiscuous Sniffing: An Ethernet sniffer or wireless sniffer is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and eventually decodes and analyzes its content according to the appropriate RFC or other specifications.

Page 8: Are you Secure

How Sniffing works

Page 9: Are you Secure

How Sniffing works

Page 10: Are you Secure

SpoofingMonkey in the Middle: is an attack in

which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept messages going between the two victims.

Page 11: Are you Secure

Switches IP-ARP Cache TableMac1: 192.168.0.1 -- 00:00:00:00:00:11Mac2: 192.168.0.2 -- 00:00:00:00:00:22Mac3: 192.168.0.3 -- 00:00:00:00:00:33

Mac 3

Mac 1 Mac 2

Switch

How Spoofing works

Page 12: Are you Secure

Mac 1 Mac 2

Switch

How Spoofing works

Mac 3

Switches IP-ARP Cache TableMac1: 192.168.0.1 -- 00:00:00:00:00:11Mac2: 192.168.0.2 -- 00:00:00:00:00:33Mac3: 192.168.0.3 -- 00:00:00:00:00:22

Page 13: Are you Secure

PhishingThe human Flaw: In computing, phishing

is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. eBay, PayPal and online banks are common targets. Phishing is typically carried out by email or instant messaging

Page 14: Are you Secure

I Am the next MS CIO! AM I?

Page 15: Are you Secure

Physical Security

Page 16: Are you Secure

Physical Security

Page 17: Are you Secure

Questions