Kevin mitnick

1,413 views

Published on

Published in: Technology, Travel
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,413
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Kevin mitnick

  1. 1. The Era of Kevin Mitnick Seminar on IT Acts by: Rahul Saingathia
  2. 2. KevinDavidMitnick (BornAugust 6, 1963)
  3. 3. CONFIRMED ATTACKS BY MITNICKO HACKING MOTOROLA, NEC, SUN MICROSYSTEMS AND FUJITSU SYSTEMS.O Using the Los Angeles bus transfer system to get free rides.O Hacking into DEC system(s) to view VMS source code (DEC reportedly spent $160,000 in cleanup costs)
  4. 4. ALLEGED ATTACKS BY MITNICK Stole computer manuals from a Pacific Bell telephone switching center in Los Angeles Read the e-mail of computer security officials at MCI Communications and Digital Wiretapped the California DMV Made free cell phone calls Hacked Santa Cruz Operation, Pacific Bell, FBI, Pentagon, Novell, California Department of Motor Vehicles, University of Southern California and Los Angeles Unified School District systems.
  5. 5. How did He did it?
  6. 6. IP SPOOFING
  7. 7. What is IP Spoofing? Victim - SunilDinesh Hello I am Hello I am Sunil Dinesh Attacker –Rahul
  8. 8. TYPES OF SPOOFING ATTACKSO Session Hijack and Man In the MiddleO Dos(Denial of Service)O DDos(Denial of Service)
  9. 9. SESSION HIJACK/MAN IN THE MIDDLE ATTACK
  10. 10. SESSION HIJACK/MAN IN THE MIDDLE ATTACK 1. Rahul assumes a man-in-the-middle position through some mechanism. For example, Rahul could use Arp Poisoning, social engineering, router hacking etc... Dinesh Sunil MAC:00-B1- MAC: 00-B0- D0-86-BB-F7 D0-86-BA-F7 Hello I’m Sunil and Hello I’m Dinesh and changed changed my Mac to my mac address toMAC:00-B0-D0-86-BB-F7 MAC :00-B0-D0-86-BB-F7 Rahul
  11. 11. Denial of Service Flood of Requests from Server Attacker Service Requests Interweb Server queue full, legitimate requests get dropped Service Requests Fake IPsAttacker Legitimate Users
  12. 12. Distributed Denial of Service
  13. 13. How To Protect against IP SpoofingO Packet FilteringO Encryption
  14. 14. PACKET FILTERING
  15. 15. Encryption
  16. 16. Encryption
  17. 17. Practical Examples

×