GOOD AFTERNOON
A
PRESENTATION
ON
HACKINGBY
OLANREWAJUGEORGEBABATUNDE
OUTLINE:
WHAT IS HACKING?
WHO IS AN HACKER?
HISTORY OF HACKING
TYPES OF HACKING
HACKING TECHNIQUES
HACKING TOOLS
WHAT CAN BE HACKED?
CERTIFICATIONS IN HACKING
HOW HACKING ATTACK WORKS
EFFECTS OF HACKING
PREVENTION AND DETECTION OF HACKING
CONCLUSION
Hacking is an activity that is engaged in by
people who use their knowledge of the internet,
computers, firewalls and security preferences to
break into other people's computers, allowing
them to view private information, alter data and
steal files, information or programs.
In computer networking, hacking is any
technical effort to manipulate the normal
behavior of network connections and connected
systems.
WHAT IS
HACKING
WHO IS AN
HACKER
In computer security and everyday
language, a hacker is someone who
breaks into computers and computer
networks. A hacker is an individual that
attempts to take control over someone
else's computer by using viruses,
worms, and other types of Internet
attacks.
DAWN OF HACKING
M.I.T. engineers in the 1960s first
popularized the term and concept
of HACKING. The so-called "hacks"
perpetrated by these hackers were
intended to be harmless technical
experiments and fun learning
activities.
Password cracking: The process of recovering
passwords from data that has been stored in or
transmitted by a computer system.
Spoofing attack (Phishing):One program or
website successfully masquerading as another by
falsifying data and thereby being treated as a trusted
system by a user .
Rootkit: A Rootkit is designed to conceal the
compromise of a computer's security.
TYPES OF
HACKING
Trojan horses: A program which seems to be doing
one thing, but is actually doing another. A Trojan horse
can be used to set up a backdoor
Viruses: A self-replicating program that spreads by
inserting copies of itself into other executable code or
documents .Some viruses are considered malicious.
Worms: A worm is also a self-replicating program. A
worm differs from a virus in that it propagates through
computer networks without user intervention.
TYPES OF
HACKING CONT’D
LEGAL HACKERS
ILLEGAL HACKERS
TYPES OF
HACKERS
TYPES OF
HACKERS LEGAL HACKERS
White hat
Breaks security for non-malicious reasons,
for instance testing their own security
system. Also includes individuals who
perform penetration tests and vulnerability
assessments within a contractual
agreement. Often, this type of 'white hat'
hacker is called an ETHICAL HACKER.
TYPES OF
HACKERS ILLEGAL HACKERS
Black hat
Break into secure networks to destroy data or make the
network unusable for those who are authorized to use
the network.
Script kiddie
A non-expert who breaks into computer systems by
using pre-packaged automated tools written by others.
Elite hacker
A social status among hackers, elite is used to describe
the most skilled. Newly discovered exploits will circulate
among these hackers.
SOURCE:NELLY DAY, www.ehow.com
August 2012
HACKING
TECHNIQUES
DENIAL of SERVICE (DoS)
Give hackers a way to bring down a network without
gaining internal access by flooding the access routers
with bogus traffic causing the network to slow down or
shut down . Using a third party (Transmission Control
Protocol(TCP) or packets).
SOCIAL ENGINEERING
Is the act of manipulation and the skill of exploiting
human weakness, into performing actions or divulging
confidential information rather than by using technical
cracking techniques
Dictionary attack
A dictionary file is loaded into a cracking application
which is run against user accounts located by the
application.
Hybrid attack
Add numbers or symbols to the filename to crack a
password. Many people change their passwords by
simply adding a number to the end of their current
password
Brute force attack
A comprehensive form of attack, often take a long time
to work depending on the complexity of the password.
HACKING
TECHNIQUES
SOURCE:NELLY DAY, www.ehow.com
N map:(Network Mapper) A tool designed to rapidly scan
large networks, uses raw IP packets in novel ways to determine
what hosts are available on the network
Cain and Abel: A password recovery tool. It allows easy
recovery of various kind of passwords by sniffing the network,
cracking encrypted passwords.
Key loggers: A tool designed to record every keystroke on
an affected machine for later retrieval. Its purpose is usually to
allow the user of this tool to gain access to confidential
information typed on the affected machine
HACKING
TOOLS
WHAT CAN
BE HACKED
Basically anything can be hacked as long as it has
vulnerabilities examples include;
Networks
Servers
Personal computers
ATM’S
Dispenser machines
Websites
Mobile phones
Government
Organizations….etc.
CEH Certification
A CERTIFIED ETHICAL HACKER is a skilled professional who
understands and knows how to look for the weaknesses and
vulnerabilities in target systems and uses the same knowledge
and tools as a malicious hacker .To achieve the Certified Ethical
Hacker Certification, you must pass the CEH exam 312-50
CHFI Certification
COMPUTER HACKING FORENSIC INVESTIGATION is the process of
detecting hacking attacks and properly extracting evidence to
report the crime and conduct audits to prevent future attacks.
The CHFI certification is awarded after successfully passing the
exam EC0 312-49.
INTERNATIONAL COUNCIL OF ELECTRONIC COMMERCE CONSULTANTS(ICECC)
CERTIFICATIONS IN
HACKING
HACKING IN ORGANISATIONS
mcmaster.ca
SOURCE:NELLY DAY, www.ehow.com
HOW HACKING
ATTACK WORKS
The first thing an hacker does on gaining
access to you is to install a Rootkit to
facilitate durable influence on your system .
Using these to create new accounts or
networks. Then he tries to obscure his
presence, surveys the network then tries to
carry out his devious act. He then creates a
backdoor he can always use to have access
to your system. The hacker may use a third
party to hack into you .
BOTNETWORK
EFFECTS OF HACKING
Denial of Service (DoS)
Exploitation
Sales Losses
Defacement (websites)
Data Loss
Remote File Execution
Network Traffic
Loss of Control
Additional Cost
Fraud…. etc.
PREVENTION AND DETECTION
OF HACKING
SECURITY AWARENESS
Is the knowledge and attitude members of an
organization possess regarding the protection of the
physical and especially information asset of the
organization. These include the following:
Physical security
Desktop security
Networks security(Cyber security)
Password security
Antiviruses
Antispyware's
E-mail security
Firewall
Security software called intrusion
detection systems may be used in
computers to detect unusual and suspicious
activity and, in some cases, stop a variety of
harmful actions by authorized or
unauthorized persons. Abuse and misuse of
sensitive system and application programs
and data such as password, inventory,
financial, engineering, and personnel files
can be detected by these systems.
Microsoft®Encarta®2009.©
INTRUSION DETECTION SYSTEMS
CONCLUSION
The question therefore is, is Hacking a
crime?
From the afore discussion its obvious
hacking(illegal hacking) is a CRIME.
Hacking can be prevented or minimized if
proper security measures and computer
ethics are adhered to.
Therefore be careful not to get hacked
because this can be detrimental.
Thank you

my new HACKING

  • 1.
  • 2.
  • 3.
    OUTLINE: WHAT IS HACKING? WHOIS AN HACKER? HISTORY OF HACKING TYPES OF HACKING HACKING TECHNIQUES HACKING TOOLS WHAT CAN BE HACKED? CERTIFICATIONS IN HACKING HOW HACKING ATTACK WORKS EFFECTS OF HACKING PREVENTION AND DETECTION OF HACKING CONCLUSION
  • 4.
    Hacking is anactivity that is engaged in by people who use their knowledge of the internet, computers, firewalls and security preferences to break into other people's computers, allowing them to view private information, alter data and steal files, information or programs. In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. WHAT IS HACKING
  • 5.
    WHO IS AN HACKER Incomputer security and everyday language, a hacker is someone who breaks into computers and computer networks. A hacker is an individual that attempts to take control over someone else's computer by using viruses, worms, and other types of Internet attacks.
  • 6.
    DAWN OF HACKING M.I.T.engineers in the 1960s first popularized the term and concept of HACKING. The so-called "hacks" perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities.
  • 7.
    Password cracking: Theprocess of recovering passwords from data that has been stored in or transmitted by a computer system. Spoofing attack (Phishing):One program or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user . Rootkit: A Rootkit is designed to conceal the compromise of a computer's security. TYPES OF HACKING
  • 8.
    Trojan horses: Aprogram which seems to be doing one thing, but is actually doing another. A Trojan horse can be used to set up a backdoor Viruses: A self-replicating program that spreads by inserting copies of itself into other executable code or documents .Some viruses are considered malicious. Worms: A worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. TYPES OF HACKING CONT’D
  • 9.
  • 10.
    TYPES OF HACKERS LEGALHACKERS White hat Breaks security for non-malicious reasons, for instance testing their own security system. Also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. Often, this type of 'white hat' hacker is called an ETHICAL HACKER.
  • 11.
    TYPES OF HACKERS ILLEGALHACKERS Black hat Break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. Script kiddie A non-expert who breaks into computer systems by using pre-packaged automated tools written by others. Elite hacker A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers.
  • 12.
  • 13.
    HACKING TECHNIQUES DENIAL of SERVICE(DoS) Give hackers a way to bring down a network without gaining internal access by flooding the access routers with bogus traffic causing the network to slow down or shut down . Using a third party (Transmission Control Protocol(TCP) or packets). SOCIAL ENGINEERING Is the act of manipulation and the skill of exploiting human weakness, into performing actions or divulging confidential information rather than by using technical cracking techniques
  • 14.
    Dictionary attack A dictionaryfile is loaded into a cracking application which is run against user accounts located by the application. Hybrid attack Add numbers or symbols to the filename to crack a password. Many people change their passwords by simply adding a number to the end of their current password Brute force attack A comprehensive form of attack, often take a long time to work depending on the complexity of the password. HACKING TECHNIQUES
  • 15.
  • 16.
    N map:(Network Mapper)A tool designed to rapidly scan large networks, uses raw IP packets in novel ways to determine what hosts are available on the network Cain and Abel: A password recovery tool. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords. Key loggers: A tool designed to record every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine HACKING TOOLS
  • 17.
    WHAT CAN BE HACKED Basicallyanything can be hacked as long as it has vulnerabilities examples include; Networks Servers Personal computers ATM’S Dispenser machines Websites Mobile phones Government Organizations….etc.
  • 18.
    CEH Certification A CERTIFIEDETHICAL HACKER is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker .To achieve the Certified Ethical Hacker Certification, you must pass the CEH exam 312-50 CHFI Certification COMPUTER HACKING FORENSIC INVESTIGATION is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. The CHFI certification is awarded after successfully passing the exam EC0 312-49. INTERNATIONAL COUNCIL OF ELECTRONIC COMMERCE CONSULTANTS(ICECC) CERTIFICATIONS IN HACKING
  • 19.
  • 20.
  • 21.
    HOW HACKING ATTACK WORKS Thefirst thing an hacker does on gaining access to you is to install a Rootkit to facilitate durable influence on your system . Using these to create new accounts or networks. Then he tries to obscure his presence, surveys the network then tries to carry out his devious act. He then creates a backdoor he can always use to have access to your system. The hacker may use a third party to hack into you .
  • 22.
  • 23.
    EFFECTS OF HACKING Denialof Service (DoS) Exploitation Sales Losses Defacement (websites) Data Loss Remote File Execution Network Traffic Loss of Control Additional Cost Fraud…. etc.
  • 25.
    PREVENTION AND DETECTION OFHACKING SECURITY AWARENESS Is the knowledge and attitude members of an organization possess regarding the protection of the physical and especially information asset of the organization. These include the following: Physical security Desktop security Networks security(Cyber security) Password security Antiviruses Antispyware's E-mail security Firewall
  • 26.
    Security software calledintrusion detection systems may be used in computers to detect unusual and suspicious activity and, in some cases, stop a variety of harmful actions by authorized or unauthorized persons. Abuse and misuse of sensitive system and application programs and data such as password, inventory, financial, engineering, and personnel files can be detected by these systems. Microsoft®Encarta®2009.© INTRUSION DETECTION SYSTEMS
  • 27.
    CONCLUSION The question thereforeis, is Hacking a crime? From the afore discussion its obvious hacking(illegal hacking) is a CRIME. Hacking can be prevented or minimized if proper security measures and computer ethics are adhered to. Therefore be careful not to get hacked because this can be detrimental.
  • 28.