HackingHackking
Hacking•       Hacker                           Hacker    Hacker           Security Professional                          ...
Cracker• cracker                       Hacker            password
HackerUNIX
Hacker           Cracker                        Internet•        Password Sniffers                                        ...
Hacking•      Hacker         white hat hacker)           black hat hacker)                                                ...
Hacking•      Black hat hacker      Hacker              hacker                              hacker                        ...
HackerCracker
Password Sniffers                                Log on        Password)     SpoofingInternet Address)                Root...
The Hole in the WebWorld -Wide-Web            Website                      Site
Hacker•             Network                 OS ) UNIX          OS    UNIX                           Interactive time shari...
Hacking•    Hacker   Cracker
Hacking•    Hacker   Cracker
1.Robert Tappan Morris•                   -                  rtm                             National Computer Security   ...
2. Kevin Mitnick•                       -           Condor                     crack           North American    Aerospace...
3. Adrian Lamo•                 -                The homeless hacker’                      laptop,•               -       ...
4. Gary McKinnon -                    Solo•            -                    US Government    U.S. Department of Defense,  ...
5.Raphael Gray -             Curador•      -         e-commerce•          -      The saint(of e-commerce)
6 .John Draper –           Cap’n Crunch•               -        crack           phone phreaking)                          ...
7. Kevin Poulsen –           Dark Dante•      -                                     FBI           -               Pacific ...
8. Dmitri Galushkevich•               -   hacker         hack          internet gridlock”–   ATM,                         ...
9. Jonathan James -             c0mrade•               -    BellSouth                        DTRA                         ...
10.The Deceptive Duo -                                       Benjamin Stark                   c]t Robert Lyttle•          ...
•   Hacker
•    hacker
1.Tsutomu Shimomura•       -          John Markoff             FBI                              Kevin Mitnick             ...
2.Stephen Wozniak•               -                 Apple Computer           -              Wozniak              Esquire ( ...
3.Tim Berners-Lee•                 -                  www        Lee                                   Convey     Mary    ...
4.Richard Stallman•            -                  MIT    StaffComputer                    Stallman                        ...
Social Engineering•                Dumpster Diving)    Phishing•
Password Guessing• Password Password Password    Password Password           Password             Password
Denial of Service (DOS)• Denial of Service (      Denial of Service      Firewall    IDS                  Update      Soft...
Decryption•                        Key    Algorithm                       Decryption                                    Ke...
Birthday Attacks••    Random Key         Random Key                 Key
Man in the middle Attacks•                Active                         Passive                                   Replay ...
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
Upcoming SlideShare
Loading in …5
×

โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา

266 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
266
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา

  1. 1. HackingHackking
  2. 2. Hacking• Hacker Hacker Hacker Security Professional Hacker Ethical Hacker White Hat Hacker Cracker Black
  3. 3. Cracker• cracker Hacker password
  4. 4. HackerUNIX
  5. 5. Hacker Cracker Internet• Password Sniffers Log on Password) Spooling Internet Address) Root) Sniffers Back Door The Hole in the Web World -Wide-Web (WWW ) Website Site
  6. 6. Hacking• Hacker white hat hacker) black hat hacker) Grey hat hacker) Yellow hat hacker) White hat hacker Hacker bug web site bug ethical hacker Hacker bug
  7. 7. Hacking• Black hat hacker Hacker hacker hacker web site web site virus script ad Aare spy ware software key logger link software web site link• Grey hat hacker web site web site web site web site• Yellow hat hacker hack
  8. 8. HackerCracker
  9. 9. Password Sniffers Log on Password) SpoofingInternet Address) Root) Sniffers Back Door
  10. 10. The Hole in the WebWorld -Wide-Web Website Site
  11. 11. Hacker• Network OS ) UNIX OS UNIX Interactive time sharing OS C UNIX OS Free ware product Hacker Idea UNIX Version Version USENET Hacker Newgroup Newgroup HOST Server Internet Web browser USENET Newgroup Enduser www technic computer Netware
  12. 12. Hacking• Hacker Cracker
  13. 13. Hacking• Hacker Cracker
  14. 14. 1.Robert Tappan Morris• - rtm National Computer Security Center NSA(National Security Agency– No Such Agency Dan Brown SuperUser Belle Lab - worm Cornell worm MorrisWorm) worm replicate - Ph.D Harvard MIT
  15. 15. 2. Kevin Mitnick• - Condor crack North American Aerospace Defence Command Punch Card Los Angeles BusSystem• - Digital Equibment Corperation software Nokia Motorolla - hack Tsutomu Shiomura Shiomura FBI Shiomura White hat - hacker
  16. 16. 3. Adrian Lamo• - The homeless hacker’ laptop,• - The New York Times The New York Times LexisNexis The New York Times Microsoft ,Yahoo , Bank of America CitiGroup - Hacker
  17. 17. 4. Gary McKinnon - Solo• - US Government U.S. Department of Defense, -
  18. 18. 5.Raphael Gray - Curador• - e-commerce• - The saint(of e-commerce)
  19. 19. 6 .John Draper – Cap’n Crunch• - crack phone phreaking) PC Draper - crack Draper (!?!)– Cap’n Crunch cereal whistle Hz Bluebox
  20. 20. 7. Kevin Poulsen – Dark Dante• - FBI - Pacific Bell KIIS-FM LA Porche!!! - Wired News BlackHat
  21. 21. 8. Dmitri Galushkevich• - hacker hack internet gridlock”– ATM, Martin Luther King
  22. 22. 9. Jonathan James - c0mrade• - BellSouth DTRA Hack Backdoor Nasa Nasa Nasa - James C
  23. 23. 10.The Deceptive Duo - Benjamin Stark c]t Robert Lyttle• - FAA(
  24. 24. • Hacker
  25. 25. • hacker
  26. 26. 1.Tsutomu Shimomura• - John Markoff FBI Kevin Mitnick - Osamu Shimomura TakeDown KevinMitnick TakeDown
  27. 27. 2.Stephen Wozniak• - Apple Computer - Wozniak Esquire ( Esquire Steve Jobs BlueBox Steve Wozniak BlueBox Henry Kissinger
  28. 28. 3.Tim Berners-Lee• - www Lee Convey Mary Berners-Lee Manchester Mark 1 Tim Berners-Lee FreeLance CERN ( Hypertext) TCP DNS www Welcome to info.cern.ch Tim Berners-Lee hacker- hack acess code) Oxford
  29. 29. 4.Richard Stallman• - MIT StaffComputer Stallman hack Printer - GNU Copyleft
  30. 30. Social Engineering• Dumpster Diving) Phishing•
  31. 31. Password Guessing• Password Password Password Password Password Password Password
  32. 32. Denial of Service (DOS)• Denial of Service ( Denial of Service Firewall IDS Update Software Distributed Denial of Service (DDOS)[7]
  33. 33. Decryption• Key Algorithm Decryption Key Weak Key Key Key bit Key
  34. 34. Birthday Attacks•• Random Key Random Key Key
  35. 35. Man in the middle Attacks• Active Passive Replay Attack• Digital Signature

×