Introduction to Hacking, Hackers & Hacktivism
Upcoming SlideShare
Loading in...5
×
 

Introduction to Hacking, Hackers & Hacktivism

on

  • 685 views

Brief Introduction to Hacking, Hackers & Hacktivism

Brief Introduction to Hacking, Hackers & Hacktivism

Statistics

Views

Total Views
685
Views on SlideShare
684
Embed Views
1

Actions

Likes
1
Downloads
45
Comments
0

1 Embed 1

http://www.slideee.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Introduction to Hacking, Hackers & Hacktivism Introduction to Hacking, Hackers & Hacktivism Presentation Transcript

  • HACKING, HACKERS & HACKTIVISM • Ankit Singh Baliyan (1109713018)
  • TOPICS COVERED IN THIS PRESENTATION  DEFINITIONS OF HACKING  TYPES OF HACKING  EFFECT OF HACKING  PURPOSE OF HACKING  DEFINITION OF HACKER  HACKERS AND CRACKERS  HACKTIVISM  CONCLUSION
  • What is the meaning of Hack/Hacking?  Dictionary – To cut, notch, slice, chop, or sever (something) with or as with heavy, irregular blows (often followed by up or down ): to hack meat; to hack down trees.  Computing Dictionary – Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.
  • Definition of Hacking :  Authorized or unauthorized attempts to bypass the security mechanisms of an information system or network.  Stealing of the data and information from someone else’s computer or network without the prior permission of the owner.  Breaking into someone else’s Computer System, Often on a network.  Bypasses password or licenses in computer program.
  • Types of Hacking  Website Hacking.  E-mail Hacking.  Network Hacking.  Password Hacking.  Online Banking Hacking.  Computer Hacking.
  • Website Hacking..
  • SQL Injection Attacks –  Using SQL injections, attackers can:  Add new data to the database  Could be embarrassing to find yourself selling politically incorrect items on an eCommerce site  Username  – 1’ or ‘1’=‘1 Password - 1’ or ‘1’=‘1 Modify data currently in the database  Could be very costly to have an expensive item suddenly be deeply ‘discounted’  Perform an UPDATE in the injected SQL
  • E-mail Hacking…
  • Network Hacking...
  • Password Cracking….
  • Online Banking Hacking..
  • Computer Hacking..
  • Who is a “HACKER” ?
  • INTRODUCTION • A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers. • Hacker is a person who access computer system and network without authorization. • There are 3 types of hacker which are white hat, black hat and grey hat
  • Types of Hackers
  • White-hat Hackers  The good guys who identify the security weakness of the system or network and inform the owner about them.
  • Black Hat Hackers A black hat hacker is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.
  • Grey hat Hackers A grey hat hacker, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.
  • The difference of Hacking and Cracking  Hack A hacker is a person who is proficient with computers and/or programming to an elite level where they know all of the in's and out's of a system.  Crack A cracker is a hacker who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses etc.
  • World’s Most Famous Hacker Kevin Mitnick Stephen Wozniak Tsutomu Shimomura At the time of his arrest, he was the most-wanted computer criminal in the United States.
  • PURPOSE OF HACKING • To steal  Money  Important data / information • To test their knowledge in understanding network and computer system • To harm someone’s privacy • To become a cyber warrior • To espionage other people
  • • Data loss • Increasing maintenance cost • Negative reputation
  • Hacktivism
  • HACKTIVISM The act of hacking, or breaking into computer system, for a political or socially motivated purpose. The individual who performs an act of Hacktivism is said to be a Hacktivist. They uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause.
  • Hacktivism (The war on…)
  • What is Hacktivism?
  • What is Hacktivism Well it’s a portmanteau of…
  • What is Hacktivism Well it’s a portmanteau of… Hacking…
  • What is Hacktivism Well it’s a portmanteau of… Hacking… and activism.
  • So what is hacking?
  • Not This.
  • Learning and Sharing the Knowledge Information wants to be free!
  • Hacking + Activism =
  • Hacking + Activism =
  • Expecting this…
  • So what is hacktivism? Involves… 1. Repurposing of Technology
  • So what is hacktivism? Involves… 1. Repurposing of Technology 2. Better understanding of technology (including traditional technologies)
  • So what is hacktivism? Involves… 1. Repurposing of Technology 2. Better understanding of technology (including traditional technologies) 3. Promoting education of these technologies (they should not be foreign to us).
  • So what is hacktivism? Involves… 1. Repurposing of Technology 2. Better understanding of technology (including traditional technologies) 3. Promoting education of these technologies (they should not be foreign to us). 4. Possibly with a sense of whimsy
  • So what is hacktivism? Involves… 1. Repurposing of Technology 2. Better understanding of technology (including traditional technologies) 3. Promoting education of these technologies (they should not be foreign to us). 4. Possibly with a sense of whimsy 5. Done for a social cause.
  • A brief history of Hacktivism
  • WANK Worm  According to Julian Assange, the WANK worm is the first instance of hacktivism. On Oct. 16, 1989, during the Cold War when nuclear war was an immediate possibility, hackers hit the NASA computers with the WANK Worm. Two days prior to the launch of the plutoniumfueled Galileo space probe from the Kennedy Space Station, NASA employees logged on to see a humorous yet frightening welcome screen: "Your computer has been officially WANKed. You talk of times of peace for all, and then prepare for war," and "Remember, even if you win the rat race, you're still a rat." The machines of the U.S. Department of Energy and NASA worldwide had been penetrated by the anti-nuclear WANK (WORMS AGAINST NUCLEAR KILLERS) worm.
  • The Rise of Hacktivism The Mentor
  • The Mentor 1 But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world...
  • The Mentor 2 Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike.
  • The Mentor 3 Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. That year… Julian Assange get’s his first computer Jeremy Hammond is Born
  • Electronic Disturbance Theater
  • Wikileaks  Leaking site Developed by Julian Assange  Background as a hacker  Endorses Hacktivist ethic: information wants to be free. 22:50 https://www.youtube.com/watch?v=PvmfOaZ34Pk
  • Anonymous • Suddenly emerged in 2008 • At the beginning it was composed of professionals → Now anyone can participate
  • Anonymous • GOALS: end with the oppression from governments and other organizations on the Internet o “We want to fight the powers-that-be when they overstep the lines.” • Conciousness o "I'm not under the illusion that we're going to change the world,but if we can make a big enough noise for people to notice there's a problem and scream loud enough, someone's going to take notice. That's what Anonymous is." Scottish Activist
  • Questions  How can we influence policy decisions on surveillance & protest our invasion of privacy?
  • Questions  How can we influence policy decisions on surveillance & protest our invasion of privacy? : First we have to educate our peers.
  • Questions  How can we influence policy decisions on surveillance & protest our invasion of privacy? : First we have to educate our peers. Keep Talking. Spread the word.
  • Conclusion Hacking is a good computing skill that can be used for good or bad intention. Hacking does not mean using your computing skills to do bad. Society have forgotten the difference between crackers and hackers. Learning skills of hacking is only for the greater good. The End
  • References  http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking.htm  http://whatishacking.org/  http://whatismyipaddress.com/hacking  http://dictionary.reference.com/browse/hacker?s=t  http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_cracking  http://answers.yahoo.com/question/index?qid=20071206182542AA3JzNy  http://www.huffingtonpost.co.uk/eva-blumdumontet/29c3-hacking-politics_b_2512573.html  http://answers.yahoo.com/question/index?qid=20110801131429AAFTktO  http://www.cs.berkeley.edu/~bh/hacker.html  http://www.ehow.com/about_4673738_why-do-people-hack.html  http://venturebeat.com/2011/12/28/anonymous-stratfor-hack-10-things-to-know/  http://www.slideshare.net/TerroWhite/ethical-hacking-and-it-security-training  http://www.switched.com/2011/02/24/what-to-do-email-account-hacked/ Thank You
  • Any **Queries ? **Ask@Your Own Risk