SlideShare a Scribd company logo
What is hacking?
ANAND KUMAR MISHRA
Contents (1)
• Who is hacker?
• History of hacking
• Types of hacking
• Hacking accidents
• Why do hackers hack?
• What hackers do after hacking?
• What do hackers know?
Contents (2)
• How can kid hack?
• Why can’t Korean kid hack?
• How can be a real hacker?
• Why can’t defend against hackers?
• How can protect the system?
• What should do after hacked?
Contents (3)
• How to translate the hackers’ language
Who is hacker? (1)
• Hack
– Cut with repeated irregular blows
– Examine something very minutely
• Hacker
– The person who hacks
• Cracker
– System intruder/destroyer
Who is hacker? (2)
• Hacker means cracker nowadays
– Meaning has been changed
History of hacking
• Telephone hacking
– Use telephone freely
– It’s called phreaking
• Computer virus
– Destroy many computers
• Network hacking
– Hack the important server remotely and
destroy/modify/disclose the information
Types of hacking
Normal
data transfer
Interruption Interception
Modification Fabrication
Hacking accidents (1)
• Internet Worm
– Robert T. Morris made an internet worm. It
spread through the internet and crashed
about 6000 systems.
• Cuckoo’s Egg
– Clifford Stoll caught the hackers who are
the German hackers applied by KGB
Hacking accidents (2)
• IP Spoof
– Kevin Mitnick was caught by Tsutomu
Shimomura who was security expert. Kevin
Mitnick uses the IP Spoof attack in this
accident
Why do hackers hack?
• Just for fun
• Show off
• Hack other systems secretly
• Notify many people their thought
• Steal important information
• Destroy enemy’s computer network
during the war
What do hackers do after
hacking? (1)
• Patch security hole
– The other hackers can’t intrude
• Clear logs and hide themselves
• Install rootkit ( backdoor )
– The hacker who hacked the system can
use the system later
– It contains trojan ls, ps, and so on
What do hackers do after
hacking? (2)
• Install irc related program
– identd, irc, bitchx, eggdrop, bnc
• Install scanner program
– mscan, sscan, nmap
• Install exploit program
• Install denial of service program
• Use all of installed programs silently
What do hackers know?
• Don’t know how to use vi
• Don’t know what unix is
• Don’t know what they do
• Know how to intrude the system
• Know how to crash the system
• Know where the hacking programs are
How can kid hack?
• Kid has much of time
– Kid can search for longer time than other
people
• All hacking program is easy to use
• Kid doesn’t have to know how the
hacking program works
• These kids are called script kiddies
Why can’t Korean kid hack?
• Almost all Korean kids don’t know
English well
• Almost all hacking program manuals
are written in English
– However, many hacking program manuals
are being translated
How can be a real hacker?
• Study C/C++/assembly language
• Study computer architecture
• Study operating system
• Study computer network
• Examine the hacking tools for a month
• Think the problem of the computer
Why can’t defend against
hackers?
• There are many unknown security hole
• Hackers need to know only one security
hole to hack the system
• Admin need to know all security holes
to defend the system
How can protect the system?
(1)
• Patch security hole often
• Encrypt important data
– Ex) pgp, ssh
• Do not run unused daemon
• Remove unused setuid/setgid program
• Setup loghost
How can protect the system?
(2)
• Use switch hub
• Setup firewall
– Ex) ipchains
• Setup IDS
– Ex) snort
• Check unintentional changes
– Ex) tripwire
How can protect the system?
(3)
• Backup the system often
What should do after hacked?
• Shutdown the system
– Or turn off the system
• Separate the system from network
• Restore the system with the backup
– Or reinstall all programs
• Connect the system to the network
• It can be good to call the police
How to translate the hackers’
language (1)
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
How to translate the hackers’
language (2)
• Ex)
– 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3n 1 h4ck3d 1n
– I did not hack this page, it was like this
when I hacked in

More Related Content

What's hot

Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Kevin Mitnick
Kevin Mitnick Kevin Mitnick
Kevin Mitnick
Karan Bansal
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Namrata Raiyani
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
RaviPrashant5
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
AYESHA JAVED
 
HACKING
HACKINGHACKING
HACKING
D's Surti
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy
 

What's hot (20)

Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Cyber security
Cyber securityCyber security
Cyber security
 
Kevin Mitnick
Kevin Mitnick Kevin Mitnick
Kevin Mitnick
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber security
cyber securitycyber security
cyber security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
HACKING
HACKINGHACKING
HACKING
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 

Similar to Hacking Question and Answer

Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
Sravani Reddy
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rishabha Garg
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
Sainath Volam
 
Hacker
HackerHacker
Hacker
Ramasubbu .P
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
Computer Security
Computer SecurityComputer Security
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
DetSersi
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
dhirujapla
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
Ankur Kumar
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
ankit sarode
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
malikmuzammil2326
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Samip Shah
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]
SiddheshPowar
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Muzaffar Ahmad
 

Similar to Hacking Question and Answer (20)

Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Basic Introduction to hacking
Basic Introduction to hackingBasic Introduction to hacking
Basic Introduction to hacking
 
Hacker
HackerHacker
Hacker
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

More from Greater Noida Institute Of Technology

Airline Analysis of Data Using Hadoop
Airline Analysis of Data Using HadoopAirline Analysis of Data Using Hadoop
Airline Analysis of Data Using Hadoop
Greater Noida Institute Of Technology
 
College Administration Management System
College Administration Management System College Administration Management System
College Administration Management System
Greater Noida Institute Of Technology
 
Web security
Web securityWeb security
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Greater Noida Institute Of Technology
 
Viruses worms
Viruses wormsViruses worms
Spoofing
SpoofingSpoofing
Sentimental Analysis of twitter data .
Sentimental Analysis of twitter data .Sentimental Analysis of twitter data .
Sentimental Analysis of twitter data .
Greater Noida Institute Of Technology
 
Security tools
Security toolsSecurity tools
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
Greater Noida Institute Of Technology
 
BroadBand Over powerline .
BroadBand Over powerline .BroadBand Over powerline .
BroadBand Over powerline .
Greater Noida Institute Of Technology
 
Modern Networking Hacking
Modern Networking HackingModern Networking Hacking
Modern Networking Hacking
Greater Noida Institute Of Technology
 
Network security
Network securityNetwork security
Lifi Technology
Lifi TechnologyLifi Technology
Hack wireless internet connections or wifi
Hack wireless internet connections or wifiHack wireless internet connections or wifi
Hack wireless internet connections or wifi
Greater Noida Institute Of Technology
 
Hacking step (Methodology)
Hacking step (Methodology)Hacking step (Methodology)
Hacking step (Methodology)
Greater Noida Institute Of Technology
 
Hacking In Detail
Hacking In DetailHacking In Detail
Computer Security
Computer SecurityComputer Security
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
Greater Noida Institute Of Technology
 
Ethical hacking
Ethical hackingEthical hacking
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 

More from Greater Noida Institute Of Technology (20)

Airline Analysis of Data Using Hadoop
Airline Analysis of Data Using HadoopAirline Analysis of Data Using Hadoop
Airline Analysis of Data Using Hadoop
 
College Administration Management System
College Administration Management System College Administration Management System
College Administration Management System
 
Web security
Web securityWeb security
Web security
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Spoofing
SpoofingSpoofing
Spoofing
 
Sentimental Analysis of twitter data .
Sentimental Analysis of twitter data .Sentimental Analysis of twitter data .
Sentimental Analysis of twitter data .
 
Security tools
Security toolsSecurity tools
Security tools
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
BroadBand Over powerline .
BroadBand Over powerline .BroadBand Over powerline .
BroadBand Over powerline .
 
Modern Networking Hacking
Modern Networking HackingModern Networking Hacking
Modern Networking Hacking
 
Network security
Network securityNetwork security
Network security
 
Lifi Technology
Lifi TechnologyLifi Technology
Lifi Technology
 
Hack wireless internet connections or wifi
Hack wireless internet connections or wifiHack wireless internet connections or wifi
Hack wireless internet connections or wifi
 
Hacking step (Methodology)
Hacking step (Methodology)Hacking step (Methodology)
Hacking step (Methodology)
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Recently uploaded

Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 

Recently uploaded (20)

Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 

Hacking Question and Answer

  • 1. What is hacking? ANAND KUMAR MISHRA
  • 2. Contents (1) • Who is hacker? • History of hacking • Types of hacking • Hacking accidents • Why do hackers hack? • What hackers do after hacking? • What do hackers know?
  • 3. Contents (2) • How can kid hack? • Why can’t Korean kid hack? • How can be a real hacker? • Why can’t defend against hackers? • How can protect the system? • What should do after hacked?
  • 4. Contents (3) • How to translate the hackers’ language
  • 5. Who is hacker? (1) • Hack – Cut with repeated irregular blows – Examine something very minutely • Hacker – The person who hacks • Cracker – System intruder/destroyer
  • 6. Who is hacker? (2) • Hacker means cracker nowadays – Meaning has been changed
  • 7. History of hacking • Telephone hacking – Use telephone freely – It’s called phreaking • Computer virus – Destroy many computers • Network hacking – Hack the important server remotely and destroy/modify/disclose the information
  • 8. Types of hacking Normal data transfer Interruption Interception Modification Fabrication
  • 9. Hacking accidents (1) • Internet Worm – Robert T. Morris made an internet worm. It spread through the internet and crashed about 6000 systems. • Cuckoo’s Egg – Clifford Stoll caught the hackers who are the German hackers applied by KGB
  • 10. Hacking accidents (2) • IP Spoof – Kevin Mitnick was caught by Tsutomu Shimomura who was security expert. Kevin Mitnick uses the IP Spoof attack in this accident
  • 11. Why do hackers hack? • Just for fun • Show off • Hack other systems secretly • Notify many people their thought • Steal important information • Destroy enemy’s computer network during the war
  • 12. What do hackers do after hacking? (1) • Patch security hole – The other hackers can’t intrude • Clear logs and hide themselves • Install rootkit ( backdoor ) – The hacker who hacked the system can use the system later – It contains trojan ls, ps, and so on
  • 13. What do hackers do after hacking? (2) • Install irc related program – identd, irc, bitchx, eggdrop, bnc • Install scanner program – mscan, sscan, nmap • Install exploit program • Install denial of service program • Use all of installed programs silently
  • 14. What do hackers know? • Don’t know how to use vi • Don’t know what unix is • Don’t know what they do • Know how to intrude the system • Know how to crash the system • Know where the hacking programs are
  • 15. How can kid hack? • Kid has much of time – Kid can search for longer time than other people • All hacking program is easy to use • Kid doesn’t have to know how the hacking program works • These kids are called script kiddies
  • 16. Why can’t Korean kid hack? • Almost all Korean kids don’t know English well • Almost all hacking program manuals are written in English – However, many hacking program manuals are being translated
  • 17. How can be a real hacker? • Study C/C++/assembly language • Study computer architecture • Study operating system • Study computer network • Examine the hacking tools for a month • Think the problem of the computer
  • 18. Why can’t defend against hackers? • There are many unknown security hole • Hackers need to know only one security hole to hack the system • Admin need to know all security holes to defend the system
  • 19. How can protect the system? (1) • Patch security hole often • Encrypt important data – Ex) pgp, ssh • Do not run unused daemon • Remove unused setuid/setgid program • Setup loghost
  • 20. How can protect the system? (2) • Use switch hub • Setup firewall – Ex) ipchains • Setup IDS – Ex) snort • Check unintentional changes – Ex) tripwire
  • 21. How can protect the system? (3) • Backup the system often
  • 22. What should do after hacked? • Shutdown the system – Or turn off the system • Separate the system from network • Restore the system with the backup – Or reinstall all programs • Connect the system to the network • It can be good to call the police
  • 23. How to translate the hackers’ language (1) 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l || -> n |/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x
  • 24. How to translate the hackers’ language (2) • Ex) – 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3n 1 h4ck3d 1n – I did not hack this page, it was like this when I hacked in