Presentation of :
“Communication Skills”
Presented to:
Sir Asad Mobeen
Presented by:
Aniqa Javed
Farwa Abdul Hannan
Ammara...
“Hackers”
What is Hacker???
 Hacker is a term used to mean "a
clever programmer’’
Especially those in popular media, to
mean “some...
 There are many definition of hacking as
well as varying ideas of what a hacker is
or does.
 A hacker is a person of goo...
Why Do Hackers Hack?
Just for fun
Show off
Hack other systems secretly
Notify many people their own
thought
Steal imp...
How to translate the hackers’
language?
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m...
How to translate the hackers’
language?
• Example:
–1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3
th1s wh3n 1 h4ck3d 1n
–I did not...
How can be a real Hacker ?
• Study C/C++
• Study computer architecture
• Study operating system
• Study computer network
•...
Types of Hackers:
• Black hat
• White hat
• Grey hat
• Script Kiddie
• Neophyte
• Blue hat
• Hacktivist
Black Hat Hacker
1. Black hat:
Black hat hackers always do illegal work.
They work for black money.
They hack into bank websites, credit...
White hat hacker
2. White hat:
 breaks security for non-malicious reasons
 perhaps to test their own security system
 While working for ...
Gray Hat Hacker
3. Grey hat:
• A grey hat hacker is a combination of a
black hat and a white hat hacker.
• A grey hat hacker may surf the ...
Script kiddie
4. Script kiddie:
• A script kiddie is basically a non-expert hacker.
• A hacker who breaks into people's computer
systems...
Neophyte
5. Neophyte:
• A neophyte means “newcomer” or
“newbie”.
• someone who is new to hacking
• Has almost no knowledge or
exper...
Blue hat hacker
6. Blue hat:
• A blue hat hacker is someone outside
computer security consulting firms.
• Who is used to bug test a system...
Hacktivist
8. Hacktivist
• A Hacktivist is a hacker who utilizes
technology to announce a social,
ideological, religious, or politica...
By:
Farwa Abdul
Hannan
World’s some famous
Hackers and their few
attacks
Hackers
1. Albert "segvec"
Gonzalez
2. Jonathan James
3. Ian Murphy
4. Phreaker John Draper
5. Robert Tappan Morris
6. Kev...
Albert "segvec"
Gonzalez
• Born in 1981
• An American Computer Hacker &
Computer Criminal
• ShadowCrew - screen name
"Cumb...
List of sites from which I collected data
related to Albert “segvec” Gonzalez
1. http://en.wikipedia.org/wiki/Albert_Gonza...
Jonathan
James
 Born on December 12,
1983, United States of America
 c0mrade
 Hacked software of NASA
 Hacked software...
List of sites from which I collected
data related to Jonathon James
1. http://en.wikipedia.org/wiki/Jonathan_Jame
s
2. htt...
Ian Murphy
Name in Hacking World –
Captain Zap
 First Cracker
 Hacked AT&T’s
Computers (1981)
He also provided the
ins...
List of sites from which I collected
data related to Ian Murphy
1. https://twitter.com/Ian_Murphy
2. http://www.linkedin.c...
Phreaker John
Draper
 Born in 1943, also known
as Captain Crunch , Crunch
or Crunchman
 well known phone hacker/
phreake...
Tools Used by Phreaker John Draper
 A phreaking
whistle
 A Blue Box
 Discovered
these methods
in 1971
 Arrested for 2
...
List of sites from which I collected
data related to Phreaker John Draper
1. http://www.neatorama.com/2006/08/28/a-short-h...
Robert Tappan
Morris
 born on November 8,
1965
 An American computer
scientist, best known
for creating the Morris
Worm ...
List of sites from which I collected
data related to Robert Tappan Morris
1. http://en.wikipedia.org/wiki/Morris_worm
2. h...
Kevin Poulson
 Among Hackers he is known as
“Dark Dante” – born on Nov. 30
1965
 Hacked FBI’s computers & phones
& stole...
Kevin Poulson's Porsche 944 S2
List of sites from which I collected
data related to Kevin Poulson
1. https://www.facebook.com/kevin.mitnickhac
k
2. http:...
Gary McKinnon
 Born on 10 February 1966 –
a Scottishsystems administrator
and hacker
 In Hackers known as “solo”
 hack ...
List of sites from which I collected
data related to Gary McKinnon
1. http://en.wikipedia.org/wiki/Gary_McKinnon
2. http:/...
“PREVENTION FROM HACKERS”
Ammarah Khalid
Some common ways to prevent your device
from being hacked are:
1) OS Updates
2) Software Updates
3) Installing Anti-Virus ...
Operating System Updates:
Hackers attack:
• Where they find weakness.
• A system ( not updated ) has flaws.
• So update yo...
Software Updates:
Get the latest fixes or versions of :
• Applications installed on your computer
• Web based software
Installing Anti-Virus Software:
Install anti-virus software as soon as you can, and always
confirm if its virus definition...
Installing Anti-Spyware Software:
A type of intrusion that:
• Slows down your computer
• Put advertisements
• Put pop-ups ...
Stop using Hacker Controlled Websites:
In World Wide Web, avoid from:
1) Sites containing free downloads.
2) Online games....
Continue..
For ensuring a secure website:
• Check site-lock sign on Title bar
• https:// is written in caption below the t...
Use Firewall:
Firewalls forbids:
• Outside threats (i.e. from hackers)
• Viruses from gaining access to your system.
• Con...
Continue.. (FIREWALL)
Data Backup:
The sensitive bits of
information can be wiped
clean from your hard
drive in the blink of an
eye..
“So it's b...
Avoid Spam Emails:
Never click on an emailed link that looks
questionable. Delete them!
Password Policies:
Use:
• Multiple, intricate passwords
• Combinations of letters and numbers
• Make sure that your passwo...
Clear the Cookies:
Do not forget to
clear the cookies
and cache before
you leave!
Don’t use generic user names:
Do not use usernames such as:
• admin
• administrator
• Site Owner
Try to use unlimited rang...
Keep your Identity Safe
1) Do not use official email ID to subscribe
to the public groups.
2) Do not share and post profes...
1. http://www.blogussion.c
om/blogging-tips/ten-
tips-to-prevent-hackers/
2. http://www.secpoint.co
m/Top-10-Ways-to-
Prot...
Hacking and Hackers
Hacking and Hackers
Hacking and Hackers
Hacking and Hackers
Hacking and Hackers
Upcoming SlideShare
Loading in...5
×

Hacking and Hackers

573

Published on

Information about hacking and hackers

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
573
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
27
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Hacking and Hackers

  1. 1. Presentation of : “Communication Skills” Presented to: Sir Asad Mobeen Presented by: Aniqa Javed Farwa Abdul Hannan Ammarah Khalid
  2. 2. “Hackers”
  3. 3. What is Hacker???  Hacker is a term used to mean "a clever programmer’’ Especially those in popular media, to mean “someone who tries to break into computer systems”.
  4. 4.  There are many definition of hacking as well as varying ideas of what a hacker is or does.  A hacker is a person of good taste. People who hack computers are known as hackers.
  5. 5. Why Do Hackers Hack? Just for fun Show off Hack other systems secretly Notify many people their own thought Steal important information Destroy enemy’s computer network
  6. 6. How to translate the hackers’ language? 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x
  7. 7. How to translate the hackers’ language? • Example: –1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1 h4ck3d 1n –I did not hack this page, it was like this when I hacked in
  8. 8. How can be a real Hacker ? • Study C/C++ • Study computer architecture • Study operating system • Study computer network • Examine the hacking tools • Think the problem of the computer
  9. 9. Types of Hackers: • Black hat • White hat • Grey hat • Script Kiddie • Neophyte • Blue hat • Hacktivist
  10. 10. Black Hat Hacker
  11. 11. 1. Black hat: Black hat hackers always do illegal work. They work for black money. They hack into bank websites, credit card websites and stole money from account in bank websites. They are professionals in their fields. They use their knowledge for illegal purpose. A black hat hacker is the bad guy.
  12. 12. White hat hacker
  13. 13. 2. White hat:  breaks security for non-malicious reasons  perhaps to test their own security system  While working for a security company which makes security software.  In fact, a large number of white hat hackers are security experts themselves who want to push the boundaries of their own IT security.  In fact, the National Security Agency (NSA) offers certifications to these hackers.
  14. 14. Gray Hat Hacker
  15. 15. 3. Grey hat: • A grey hat hacker is a combination of a black hat and a white hat hacker. • A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect.
  16. 16. Script kiddie
  17. 17. 4. Script kiddie: • A script kiddie is basically a non-expert hacker. • A hacker who breaks into people's computer systems not through his knowledge in IT security. • Mostly kids/students • User tools created by black hats • To get free stuff • Impress their peers • Not get caught
  18. 18. Neophyte
  19. 19. 5. Neophyte: • A neophyte means “newcomer” or “newbie”. • someone who is new to hacking • Has almost no knowledge or experience of the workings of technology and hacking.
  20. 20. Blue hat hacker
  21. 21. 6. Blue hat: • A blue hat hacker is someone outside computer security consulting firms. • Who is used to bug test a system former to its launch, looking for exploits so they can be closed. • Microsoft also uses the term Blue Hat to represent a series of security briefing events.
  22. 22. Hacktivist
  23. 23. 8. Hacktivist • A Hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. • They use the same tools and techniques as a hacker. • They does so in order to disrupt services and bring attention to a political and social causes.
  24. 24. By: Farwa Abdul Hannan
  25. 25. World’s some famous Hackers and their few attacks
  26. 26. Hackers 1. Albert "segvec" Gonzalez 2. Jonathan James 3. Ian Murphy 4. Phreaker John Draper 5. Robert Tappan Morris 6. Kevin Poulson 7. Gary McKinnon
  27. 27. Albert "segvec" Gonzalez • Born in 1981 • An American Computer Hacker & Computer Criminal • ShadowCrew - screen name "CumbaJohnny" Trafficked stolen credit and ATM card numbers • Hacked the databases of TJX Companies - 45.6 million credit and debit card numbers • Heartland Payment Systems, Citibank • Hacked computer systems of the government of India • Arrested on May 7, 2008 - was sentenced to prison for 20 years
  28. 28. List of sites from which I collected data related to Albert “segvec” Gonzalez 1. http://en.wikipedia.org/wiki/Albert_Gonzalez 2. http://www.time.com/time/business/article/0,8599,1 917345,00.html 3. http://www.wired.com/science/discoveries/news/200 1/02/41630 4. http://en.wikipedia.org/wiki/Code_injection http://en.wikipedia.org/wiki/Backdoor_(computing) 5. http://www.neatorama.com/2006/08/28/a-short- history-of-hacking/
  29. 29. Jonathan James  Born on December 12, 1983, United States of America  c0mrade  Hacked software of NASA  Hacked software of DOD - Between August 23, 1999, and October 27, 1999  Arrested and sentenced to six months  Died on May 18, 2008
  30. 30. List of sites from which I collected data related to Jonathon James 1. http://en.wikipedia.org/wiki/Jonathan_Jame s 2. http://www.jonathanjames.com/ 3. https://www.facebook.com/pages/Jonathan- james-hacker/268732283193175 4. http://www.linkedin.com/in/jonathankjames
  31. 31. Ian Murphy Name in Hacking World – Captain Zap  First Cracker  Hacked AT&T’s Computers (1981) He also provided the inspiration for the 1992 film "Sneakers."  now the chairman of Secure Data System (SDS) - A data security Company
  32. 32. List of sites from which I collected data related to Ian Murphy 1. https://twitter.com/Ian_Murphy 2. http://www.linkedin.com/pub/ian-murphy/25/88a/499 3. http://www.neatorama.com/2006/08/28/a-short-history- of-hacking/ 4. http://hackstory.net/Captain_Zap 5. http://attrition.org/errata/charlatan/ian_murphy/threat_p rofile/
  33. 33. Phreaker John Draper  Born in 1943, also known as Captain Crunch , Crunch or Crunchman  well known phone hacker/ phreaker  How he hacked?  Continued…
  34. 34. Tools Used by Phreaker John Draper  A phreaking whistle  A Blue Box  Discovered these methods in 1971  Arrested for 2 times – in 1972, 1976
  35. 35. List of sites from which I collected data related to Phreaker John Draper 1. http://www.neatorama.com/2006/08/28/a-short-history- of-hacking/ 2. http://www.wired.com/science/discoveries/news/2001/0 2/41630 3. http://en.wikipedia.org/wiki/John_Draper 4. http://mentalfloss.com/article/19484/true-crime-john- draper-original-whistle-blower 5. http://www.infostruction.com/2011/09/12/10-hackers- who-made-history/ 6. http://www.livinginternet.com/i/ia_hackers_draper.htm 7. http://en.wikipedia.org/wiki/Blue_box
  36. 36. Robert Tappan Morris  born on November 8, 1965  An American computer scientist, best known for creating the Morris Worm in 1988  About Worm – The Morris Worm  Lives in United States – Age 48 years
  37. 37. List of sites from which I collected data related to Robert Tappan Morris 1. http://en.wikipedia.org/wiki/Morris_worm 2. http://en.wikipedia.org/wiki/Robert_Tappan _Morris
  38. 38. Kevin Poulson  Among Hackers he is known as “Dark Dante” – born on Nov. 30 1965  Hacked FBI’s computers & phones & stole Documents  hacked all phone lines running into Los Angeles radio station  In April 1991, he was arrested  Released after paying more than $50,000 (5,182,500 Rs) and serving 51 months in prison . Today, he is the senior editor of Wired magazine.
  39. 39. Kevin Poulson's Porsche 944 S2
  40. 40. List of sites from which I collected data related to Kevin Poulson 1. https://www.facebook.com/kevin.mitnickhac k 2. http://www.takedown.com/bio/mitnick.html 3. http://en.wikipedia.org/wiki/Kevin_Poulsen 4. http://hackstory.net/Kevin_L._Poulsen 5. http://en.wikipedia.org/wiki/Wired_(magazi ne)
  41. 41. Gary McKinnon  Born on 10 February 1966 – a Scottishsystems administrator and hacker  In Hackers known as “solo”  hack military computers  Illegally gained access to 97 computers - 13-month period from February 2001 to March 2002.  He deleted a number of critical files, over 300 computers and resulting in over $700,000(72,555,001 Rs) in damages.
  42. 42. List of sites from which I collected data related to Gary McKinnon 1. http://en.wikipedia.org/wiki/Gary_McKinnon 2. http://freegary.org.uk/ 3. http://www.theguardian.com/world/gary- mckinnon
  43. 43. “PREVENTION FROM HACKERS” Ammarah Khalid
  44. 44. Some common ways to prevent your device from being hacked are: 1) OS Updates 2) Software Updates 3) Installing Anti-Virus Software 4) Installing Anti-Spyware Software 5) Stop using Hacker Controlled Websites 6) Use Firewall 7) Data Backup 8) Avoid Spam Emails 9) Password Policies 10) Clear the Cookies 11) Don’t use generic user names 12) Keep your identity safe
  45. 45. Operating System Updates: Hackers attack: • Where they find weakness. • A system ( not updated ) has flaws. • So update your system regularly.
  46. 46. Software Updates: Get the latest fixes or versions of : • Applications installed on your computer • Web based software
  47. 47. Installing Anti-Virus Software: Install anti-virus software as soon as you can, and always confirm if its virus definitions are regularly updated.
  48. 48. Installing Anti-Spyware Software: A type of intrusion that: • Slows down your computer • Put advertisements • Put pop-ups on the screen • And can lead to identity theft • So install anti-spyware as soon as possible!
  49. 49. Stop using Hacker Controlled Websites: In World Wide Web, avoid from: 1) Sites containing free downloads. 2) Online games. “They are mostly controlled by hackers!”
  50. 50. Continue.. For ensuring a secure website: • Check site-lock sign on Title bar • https:// is written in caption below the title bar instead of http://
  51. 51. Use Firewall: Firewalls forbids: • Outside threats (i.e. from hackers) • Viruses from gaining access to your system. • Control the traffic across connection • Personalize your firewall settings • Update it regularly
  52. 52. Continue.. (FIREWALL)
  53. 53. Data Backup: The sensitive bits of information can be wiped clean from your hard drive in the blink of an eye.. “So it's best to always have a backup at hand”.
  54. 54. Avoid Spam Emails: Never click on an emailed link that looks questionable. Delete them!
  55. 55. Password Policies: Use: • Multiple, intricate passwords • Combinations of letters and numbers • Make sure that your password is not too difficult for you to remember it!
  56. 56. Clear the Cookies: Do not forget to clear the cookies and cache before you leave!
  57. 57. Don’t use generic user names: Do not use usernames such as: • admin • administrator • Site Owner Try to use unlimited range of combinations for names.
  58. 58. Keep your Identity Safe 1) Do not use official email ID to subscribe to the public groups. 2) Do not share and post professional information on Social networks. “Learn new technologies and techniques for protection against hackers and keep aware! “
  59. 59. 1. http://www.blogussion.c om/blogging-tips/ten- tips-to-prevent-hackers/ 2. http://www.secpoint.co m/Top-10-Ways-to- Protect-Your- Computer.html#ixzz2cRJt wVdo 3. http://www.wikihow.com /Prevent-Hacking
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×