Your SlideShare is downloading. ×
  • Like
Professional Hackers
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Professional Hackers


Presented at IDSECCONF2009

Presented at IDSECCONF2009

Published in Technology , News & Politics
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. professional hackersjim geovediinformation security troublemaker, professional script kiddy
  • 2. hackers
  • 3. are hackers gettingpaid now, like a pro?
  • 4. professional hackers
  • 5. corporate hackers
  • 6. corporate hackersprogrammer deals with programming operating systems or applications
  • 7. corporate hackersadministrator responsible for running special equipment or whole infrastructures
  • 8. corporate hackersoperator sitting in front of a monitor (or several) all days and evaluating output of logs and system messages
  • 9. corporate hackerssecurity officer writing the security policies and procedures for the company decides what to do when security incident is happening defining security and access roles
  • 10. corporate hackersit auditor independent organ within the organisation which ensures the adequateness of it controls
  • 11. corporate hackersconsultant works for a consultant company (general consultant companies, it consultant companies, or it security companies)
  • 12. corporate hackershacker check security of networks, review source code, etc. hired to show to customers or press the company employ cool person
  • 13. independent hackers
  • 14. independent hackersoperating system/software hacker develop and improve system based on personal interest
  • 15. independent hackersintrusion specialist concentrate primarily on how to break- in the system or network
  • 16. independent hackersvulnerability researcher discovering the vulnerability and how to take advantage of it
  • 17. independent hackersbotnet owner take control of thousands of hosts rent the botnet for ddos, anonymous proxy, spam, phising etc.
  • 18. independent hackersrootkit/trojan/virus writer sometime work together with intrusion specialists and botnet owner
  • 19. independent hackersspammer/fraudster intend to result in financial or personal gain
  • 20. local hacking scene
  • 21. local hacking scene how many professional hackers in indonesia? a question of ethics: hackers behaviour real hackers vs. media whores
  • 22. local hacking scene skill development certification for professional hackers valuing our own skills
  • 23. fin.