Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
HACKING
What is hacking?Hacking refers to an array of activities which are done to intrude some one else’s personal information s...
Brief History:o Started in 1878, when Alexander Grahambell busted a few school boys trying to figureout how the telephone ...
o1971- Cap n Cruch phone exploit discoveredo1988- Morris Internet worm crashes 6,000 serverso1994- $10 million transfered ...
Types of Hackers :White Hat     Non-malicious reasons, enjoy learning (ex. testing     their own security system)Grey Ha...
Famous Hackers :• Kevin Mitnick  ~hacking into the telephone systems of the  Pentagon and Pacific Bell, among other  gover...
• Kevin Poulsen  ~hacked a radio stations phone lines in order  to win a call-in contest whose prize was a  Porsche. He ev...
• Tsutomu Shimomura  ~decided to take his own revenge by using his  hacking skills to assist the FBI in tracking and  loca...
• Stephen Wozniak  ~Woz got his start in hacking making blue  boxes, devices that bypass telephone-  switching mechanisms ...
• Adrian Lamo  ~"the homeless hacker" because he sometimes  took up residence in abandoned buildings.  ~As a hacker, Lamo ...
The Hacker Attitude Boredom and drudgery are evil.  Hackers (and creative people in general) should  never be bored or ha...
 The world is full of fascinating problems waiting to be  solved   Being a hacker is lots of fun, but its a kind of fun  ...
Basic Hacking Skill  Learn how to program.  This, of course, is the fundamental hacking skill. If you dont   know any com...
2 types of hacking: 1. Email or the user information     a. Phishing     b. Brute Forcing     c. Keylogging     d. Trojans...
Forbidding Hacking:• There are several laws that forbid hacking in the United  States. One, 18 U.S.C. 1029, deals with mak...
What is ethical hacking? defined “methodology adopted by ethical hackers todiscover the vulnerabilities existing in infor...
Upcoming SlideShare
Loading in …5
×

Hacking (cs192 report )

4,040 views

Published on

Published in: Education

Hacking (cs192 report )

  1. 1. HACKING
  2. 2. What is hacking?Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes.Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
  3. 3. Brief History:o Started in 1878, when Alexander Grahambell busted a few school boys trying to figureout how the telephone worked.o In the late 1950s and Early 1960s~originally, "hacker" was a positive term for aperson with a mastery of computers whocould push programs beyond what they weredesigned to do.
  4. 4. o1971- Cap n Cruch phone exploit discoveredo1988- Morris Internet worm crashes 6,000 serverso1994- $10 million transfered from CitiBank accountso1995- Kevin Mitnick sentences to 5 years in jailo1969- Unix hacked togethero2000- Major websites succumb to DDoSo2000- 15,700 credit and debit card numbers stolen fromoWestern Union (hacked while web database was undergoing maintainance)o2001- Code Red exploited bug in MS IIS to penetrate & spread probes random IPs for system running IIS hadotrigger time for denial-of-service attacko2nd wave infected 360000 servers in 14 hoursoCode Red 2- had backdoor installed to allow remote control
  5. 5. Types of Hackers :White Hat Non-malicious reasons, enjoy learning (ex. testing their own security system)Grey Hat Beyond the point of a malicious intendBlack Hat/Cracker Malicious reasons, uses technology for a wrong end, linked to illegal activityScript kiddie Non-expert, uses automated tools by other creators
  6. 6. Famous Hackers :• Kevin Mitnick ~hacking into the telephone systems of the Pentagon and Pacific Bell, among other government agencies and for-profit organizations. Not only did he hack phones, he also gained access to countless credit card numbers. ~black hat hacker
  7. 7. • Kevin Poulsen ~hacked a radio stations phone lines in order to win a call-in contest whose prize was a Porsche. He eventually earned the distinction of being the first hacker charged with espionage after he allegedly stole classified information from the Air Force ~black hat hacker
  8. 8. • Tsutomu Shimomura ~decided to take his own revenge by using his hacking skills to assist the FBI in tracking and locating Mitnick. With Shimomuras help, they were successful, and Mitnick was arrested. ~white hat hacker
  9. 9. • Stephen Wozniak ~Woz got his start in hacking making blue boxes, devices that bypass telephone- switching mechanisms to make free long- distance calls ~white hat hacker
  10. 10. • Adrian Lamo ~"the homeless hacker" because he sometimes took up residence in abandoned buildings. ~As a hacker, Lamo broke into the networks of a number of major companies -- Excite@Home, MCI WorldCom, Yahoo, Microsoft and Google -- but he often contacted the companies and told them about the security holes. ~grey hat hacker
  11. 11. The Hacker Attitude Boredom and drudgery are evil. Hackers (and creative people in general) should never be bored or have to drudge at stupid repetitive work Freedom is good Hackers are naturally anti-authoritarian. Anyone who can give you orders can stop you from solving whatever problem youre being fascinated by Becoming a hacker will take intelligence, practice, dedication, and hard work.
  12. 12.  The world is full of fascinating problems waiting to be solved Being a hacker is lots of fun, but its a kind of fun that takes lots of effort. The effort takes motivation. To be a hacker you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence. Nobody should ever have to solve a problem twice Creative brains are a valuable, limited resource. To behave like a hacker, you have to believe that the thinking time of other hackers is precious -- so much so that its almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.
  13. 13. Basic Hacking Skill  Learn how to program. This, of course, is the fundamental hacking skill. If you dont know any computer languages, you cant do hacking.  Get one of the open-source Unixs and learn to use and run it The single most important step any newbie can take towards acquiring hacker skills is to get a copy of Linux or one of the BSD-Unix’s, install it on a personal machine, and run it.  Learn how to use the World Wide Web and write HTML. To be worthwhile, your page must have content -- it must be interesting and/or useful to other hackers.
  14. 14. 2 types of hacking: 1. Email or the user information a. Phishing b. Brute Forcing c. Keylogging d. Trojans 2. Web based hacking. a. SQL Injection b. XSS c. Shells d. RFI
  15. 15. Forbidding Hacking:• There are several laws that forbid hacking in the United States. One, 18 U.S.C. 1029, deals with making and using devices and programs to gain unauthorized access to secure computer systems. Since the law specifies that there must be intent to defraud, however, hackers can often claim that they were only doing harmless personal research. Another law, 18 U.S.C. 1030, prohibits access to government computers to anyone without authorization [Source: U.S. Department of Justice]. Hackers who are convicted of crimes that violate these laws may be required to pay fines, be placed on probation, or serve jail time, depending on the severity of the damages.
  16. 16. What is ethical hacking? defined “methodology adopted by ethical hackers todiscover the vulnerabilities existing in information systems’operating environments.”With the growth of the Internet, computer security hasbecome a major concern for businesses and governments.In their search for a way to approach the problem,organizations came to realize that one of the best ways toevaluate the intruder threat to their interests would be tohave independent computer security professionals attempt tobreak into their computer systems.

×