• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Hacking Is Not Always a Crime
 

Hacking Is Not Always a Crime

on

  • 2,123 views

Seminar Nasional UNAND Padang

Seminar Nasional UNAND Padang

Statistics

Views

Total Views
2,123
Views on SlideShare
2,122
Embed Views
1

Actions

Likes
1
Downloads
109
Comments
0

1 Embed 1

http://www.slashdocs.com 1

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Hacking Is Not Always a Crime Hacking Is Not Always a Crime Presentation Transcript

    • Hacking is not a crime Novizul Evendi karuwak@tlab.co.idHat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • What Is a Hacker? Hacker (computer security), who accesses a computer system by circumventing its security system Hacker (programmer subculture), who shares an anti-authoritarian approach to software development now associated with the free software movemen Hacker (hobbyist), who makes innovative customizations or combinations of retail electronic and computer equipmentHat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Basic Hacking Skills  Learn how to program  Get one of the open-source Unixes (learn to use and run it)  Learn how to use the World Wide Web  If you dont have functional English, learn it!!Hat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Status in the Hacker Culture  Write open-source software  Help test and debug open-source software  Publish useful information  Help keep the infrastructure working  Serve the hacker culture itselfHat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Types of Hackers Professional hackers  Black Hats – the Bad Guys  White Hats – Professional Security Experts Criminal Hackers  Real criminals, are in it for whatever they can get no matter who it hurts Disgruntled Employees  Most dangerous to an enterprise as they are “insiders”Hat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Phase HackingHat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Phase Hacking #1 Reconnaissance hackers first perform routine and detailed reconnaissance. Methods of reconnaissance include Dumpster Diving, Social Engineering, Google Searching & Google Hacking, and work their way up to more insidious methods such as infiltrating your employees environments from coffee shops to simply walking in and setting up in a  cubicle and asking a lot of questions.Hat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Phase Hacking #2 Scanning can reveal vulnerabilities that create a hit list, or triage list, for hackers to work through. Typically, hackers perform port scans and port mapping, while attempting to discover what services and versions of services are actively available on any open or available ports.Hat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Phase Hacking #3 Gaining Access Open ports can lead to a hacker gaining direct access to services and possibly to internal network connections. Whether the hacker is successful attacking an internal system has much to do with how vulnerable the specific system is, which is related to system configurations and architecture.Hat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Phase Hacking #4Maintain Access Hackers may choose to continue attacking and exploiting the target system, or to explore deeper into the target network and look for more systems and services Hackers can continue to sniff your network looking for more information to use against you. Hacking is not a crime Padang, 3 May 2012 | UNAND
    • Phase Hacking #5 Covering Tracks Most hackers will attempt to cover their footprints and tracks as carefully as possible. Gaining root level access and administrative access is a big part of covering one’s tracks as the hacker can remove log entries and do so as a privileged administrator as opposed to an unknown hacker.Hat Secure © 2012http://hatsecure.com
    • Modes of Hacker Attack  Over Internet  Over LAN  Locally  Offline  TheftHat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Cyber CrimeHat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Is Computer Hacking a Crime? Computer hacking is broadly defined as any action that results in unauthorized interference with a computer, computer system or network. Computer hacking includes breaking into a computer with the intent to steal, damage, modify or monitor data or settings within the system.Hat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Cyber crime Criminal activity where a computer or computer network is source ,tool , target, or place of a crime.  • Computer is a target.  • Computer is a tool of crime  • Computer is incidental to crimeHat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Cyber Criminals  Children and adolescents (between the age group of 6 – 22 years)  Organised hackers  Professional hackers / crackers  Discontented employees Capacity to store data in small space Easy to access Negligence Loss of evidenceHat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • DEMO #0x01 Wifi Hacking #0x02 Network Hacking #0x03 Web HackingHat Secure © 2012 Hacking is not a crimehttp://hatsecure.com Padang, 3 May 2012 | UNAND
    • Question?