computer hacking - an introduction
DESCRIPTION
TRANSCRIPT
![Page 1: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/1.jpg)
HACKINGAn introduction
by Jayaseelan Vejayon
![Page 2: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/2.jpg)
So…what is hacking?• Hacking is the practice of modifying the features of a
system, in order to accomplish a goal outside of the creator's original purpose.
(http://whatishacking.org/)
• Computer hacking – is the practice of modifying computer hardware and
software to accomplish a goal outside of the creator’s original purpose.
– is most common among teenagers and young adults(http://www.wisegeek.org/what-is-computer-hacking.htm)
![Page 3: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/3.jpg)
Why hack?
• Profit– Information can be sold– Information can be used to steal
• Protest– Eg. Hactivism: a hacktivist is someone whom utilizes
technology to announce a social, ideological, religious, or political message
• Challenge– Fun, problem-solving skill, the thrill of power
![Page 4: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/4.jpg)
Why hack? Some examples…
• Hackers want to
– use the victim’s computer to store illicit materials i.e pirated software, pornography, etc.
– steal the victim’s personal information in order to access accounts or the accounts of the website visitors. The data can be used to gain access to important databases; billing, merchant accounts, etc.
![Page 5: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/5.jpg)
Why hack? Some examples…
• Hackers want to
– set-up fake ecommerce sites to access credit card details; gain entry to servers that contain credit card details and other forms of credit card fraud
– spy on friends, family, co-workers for personal reasons
– revenge
(http://www.website-guardian.com/why-do-hackers-hack-websites-va-5.html)
![Page 6: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/6.jpg)
Effects of hacking
• Damage to information
• Theft of information– Credit card details, social security numbers, identity fraud,
email addresses
• Compromise/damage of systems
• Use of victim machines as “zombies”
Hacking attacks cost large businesses an average of about $2.2 million per year (Symantec 2010 State of Enterprise Security Study)
![Page 7: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/7.jpg)
Effects of hacking• Businesses may suffer from damaged reputations
and lawsuits
• Business secrets could be stolen and sold to competitors
• Computing system/infrastructure could suffer from performance degrading as the resources used for malicious activities
In an education institution, hacking can cause damage to the institution’s credibility/reputation ie. If examination system is compromised and sensitive data tampered
![Page 8: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/8.jpg)
A hacker…Can fall into one of these types:
• Black hatsIndividuals with good computing knowledge, abilities and
expertise but with the intentions and conducts to cause damage on the systems they attack
Also known as crackers
• White hatsIndividuals with good hacking skillsThey perform defensive activities against hackingAlso known as security analysts
![Page 9: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/9.jpg)
A hacker…• Gray hats
Individuals that perform both offensive and defensive hacking activities
• Suicide hackersIndividuals whom want to fail a computing system for a
personal ‘reason’ or ‘cause’Not worried about the serious consequences that they may
have to face as a result of their damaging activities i.e being jailed for many years
![Page 10: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/10.jpg)
Types of attacks …
• DoS/DDoS Attacks• Password Guessing Attacks• Man-in-the-Middle Attacks• Identity Spoofing• Interception• Eavesdropping• Backdoor Attacks… and many more!
![Page 11: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/11.jpg)
How to hack?…Many of the hacking tools and guides are available on the Internet
BackTrack is a Linux distro with many tools; Metasploit, Aircrack-ng, Nmap, Ophcrack, Wireshark, Hydra and many many more!
The real reasons for BackTrack development are for digital forensics and penetration testing
![Page 12: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/12.jpg)
How to hack?…some examples
System Hacking; Keyloggers, password cracking
TrojansVirusesSniffersSocial EngineeringDenial of ServiceSQL Injection
![Page 13: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/13.jpg)
How to hack?…some examples
Password cracking - dictionary attacks, brute forcing attacks, hybrid attacks, syllable attacks and rule-based attacks
Other types of password cracking attacks – shoulder surfing, social engineering, dumpster diving, wire sniffing, Man-in-the-Middle, password guessing, keylogger
![Page 14: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/14.jpg)
Passwords…
Enforce complexity so that passwords are difficult to break; use combination of letters, numbers, special characters
![Page 15: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/15.jpg)
How to hack?…some examples
Password cracking - dictionary attacks, brute forcing attacks, hybrid attacks, syllable attacks and rule-based attacks
Other types of attacks – shoulder surfing, social engineering, dumpster diving, wire sniffing, Man-in-the-Middle, password guessing, keylogger
![Page 16: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/16.jpg)
How to hack?LIVE DEMO
Keylogger SniffingWeb-cloningGoogle HackingNTFS StreamsDNS Spoofing
![Page 17: Computer Hacking - An Introduction](https://reader033.vdocuments.net/reader033/viewer/2022061218/54b5ec1c4a79591a7f8b47c0/html5/thumbnails/17.jpg)
Thank youhttp://jayitsecurity.blogspot.com