SlideShare ist ein Scribd-Unternehmen logo
1 von 21
53[|_||2!7„ & #@[|<!/V6 - 101
Runcy Oommen
http://runcy.me
Today’s Agenda
Brief intro to security & hacking
Resources to get started
Tools & software
Demo
Live “ETHICAL” hacking (if time permits)
Let’s define SECURITY
“Do what is required and only what is required”
There are different hats, but what do they mean?
BLACK HATS
 The bad guys (and girls) in the computer world
 Responsible for writing malware to gain access to the systems
 Motive – personal or financial gain, cyber espionage, protest or
perhaps just addicted to the thrill of cyber crime
 They range from amateurs (getting their feet wet by spreading
malware) to experienced hackers (stealing data specifically financial
or PII)
WHITE HATS
 Choose to use their powers for good than evil a.k.a “ethical hackers”
 Could be paid employees or contractors in companies to find security
holes/vulnerabilities
 Use the same methods as black hats, but with permission
 They perform what is known as penetration testing (pen tests)
GREY HATS
 As in life, there are grey areas - blend of both black hat and white
hat activities
 Grey hats look for vulnerabilities w/o owner’s permission
 If issue is found, report it but with a small fee to fix the issue
 If owner does not comply, post the exploit for the world to see
 They’re not inherently malicious with their intentions, but just
looking to get something out of their discoveries
How/Where do I begin?
 Talk to your two friends and about “Ethical Hacking”
 Tons and tons of videos on
 Follow topics about security & hacking on
 Make it a habit & keep visiting
 Join a mailing list –
 Train and certify for either (or both) –
 Familiarize and practice for Top 10
“
”
ALL YOU NEED IS “KALI”
What all do I need to begin with?
Questions on everyone’s mind now:
 Why did I not know that hacking was a religious affair?
 How many times should I perform pooja?
 What’s the average appeasement time before being blessed?
I’m serious, but it’s “KALI LINUX”
Always Remember

Hacking Myths!
Myth 1: You become a hacker after wearing a hoodie
Ans: Wearing a hoodie will not enhance your skills.
Wear it when feeling cold or to cover your ugliness
Myth 2: Hackers are maladjusted young people who live
in their mothers’ basements
Ans: Many of them are not teens, have a day job and
have steady relationships with peers and families
Ans: Predominantly male dominated, but that doesn’t
mean there are female hackers
Myth 3: Hacking is a boys only club
Myth 4: All hacking is bad
Ans: Hacking is not always about compromising data, but about
understanding the underlying nature of the technology
WHAT’S THE DEMO?
Brute force a website login using Hydra & Burpsuite (from Kali Linux)
THINGS YOU NEED
 Kali Linux (actually any *nix will do)
 DVWA (Damn Vulnerable Web Application)
 Hydra
 Burpsuite
 Web Browser
 Username/password Lists
Security & Hacking 101

Weitere Àhnliche Inhalte

Was ist angesagt? (9)

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy Quiz
 

Ähnlich wie Security & Hacking 101

BruCON 0x09 Building Security Awareness Programs That Don't Suck
BruCON 0x09 Building Security Awareness Programs That Don't SuckBruCON 0x09 Building Security Awareness Programs That Don't Suck
BruCON 0x09 Building Security Awareness Programs That Don't Suck
Vlad Styran
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
ayerssaa
 

Ähnlich wie Security & Hacking 101 (20)

BruCON 0x09 Building Security Awareness Programs That Don't Suck
BruCON 0x09 Building Security Awareness Programs That Don't SuckBruCON 0x09 Building Security Awareness Programs That Don't Suck
BruCON 0x09 Building Security Awareness Programs That Don't Suck
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Ethical Hacking
Ethical Hacking Ethical Hacking
Ethical Hacking
 
Seductive security - Art of seduction
Seductive security - Art of seductionSeductive security - Art of seduction
Seductive security - Art of seduction
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Learn Hacking
Learn HackingLearn Hacking
Learn Hacking
 
Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
 
Arya
AryaArya
Arya
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Hackers
HackersHackers
Hackers
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Programming by Heart
Programming by HeartProgramming by Heart
Programming by Heart
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 

Mehr von Runcy Oommen

Mehr von Runcy Oommen (20)

Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Security enhancements for popular GCP services
Security enhancements for popular GCP servicesSecurity enhancements for popular GCP services
Security enhancements for popular GCP services
 
Designing A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemDesigning A Platform Agnostic HA System
Designing A Platform Agnostic HA System
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloads
 
Serverless solution architecture in AWS
Serverless solution architecture in AWSServerless solution architecture in AWS
Serverless solution architecture in AWS
 
Europe Cloud Summit - Security hardening of public cloud services
Europe Cloud Summit - Security hardening of public cloud servicesEurope Cloud Summit - Security hardening of public cloud services
Europe Cloud Summit - Security hardening of public cloud services
 
Cloud & GCP 101
Cloud & GCP 101Cloud & GCP 101
Cloud & GCP 101
 
Serverless security for multi cloud workloads
Serverless security for multi cloud workloadsServerless security for multi cloud workloads
Serverless security for multi cloud workloads
 
Building AWS native serverless website
Building AWS native serverless websiteBuilding AWS native serverless website
Building AWS native serverless website
 
Security hardening of core AWS services
Security hardening of core AWS servicesSecurity hardening of core AWS services
Security hardening of core AWS services
 
Get to know Git
Get to know GitGet to know Git
Get to know Git
 
GCDC Bengaluru - Community Growth Hacking
GCDC Bengaluru - Community Growth HackingGCDC Bengaluru - Community Growth Hacking
GCDC Bengaluru - Community Growth Hacking
 
Earth Engine on Google Cloud Platform (GCP)
Earth Engine on Google Cloud Platform (GCP)Earth Engine on Google Cloud Platform (GCP)
Earth Engine on Google Cloud Platform (GCP)
 
Get your Git on GitHub
Get your Git on GitHubGet your Git on GitHub
Get your Git on GitHub
 
Run C++ as serverless with GCP Cloud Functions
Run C++ as serverless with GCP Cloud FunctionsRun C++ as serverless with GCP Cloud Functions
Run C++ as serverless with GCP Cloud Functions
 
Effective Tech Community Engagement - Best Practices
Effective Tech Community Engagement - Best PracticesEffective Tech Community Engagement - Best Practices
Effective Tech Community Engagement - Best Practices
 
Rajasthan IT Day Hackathon Finals
Rajasthan IT Day Hackathon FinalsRajasthan IT Day Hackathon Finals
Rajasthan IT Day Hackathon Finals
 
Arvind Brands - Hackathon - Solution Idea
Arvind Brands - Hackathon - Solution IdeaArvind Brands - Hackathon - Solution Idea
Arvind Brands - Hackathon - Solution Idea
 
Intro to Virtualization - 10000 feet view
Intro to Virtualization - 10000 feet viewIntro to Virtualization - 10000 feet view
Intro to Virtualization - 10000 feet view
 
Docker Introductory workshop
Docker Introductory workshopDocker Introductory workshop
Docker Introductory workshop
 

KĂŒrzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

KĂŒrzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Security & Hacking 101

  • 1. 53[|_||2!7„ & #@[|<!/V6 - 101 Runcy Oommen http://runcy.me
  • 2. Today’s Agenda Brief intro to security & hacking Resources to get started Tools & software Demo Live “ETHICAL” hacking (if time permits)
  • 3.
  • 4. Let’s define SECURITY “Do what is required and only what is required”
  • 5. There are different hats, but what do they mean?
  • 6. BLACK HATS  The bad guys (and girls) in the computer world  Responsible for writing malware to gain access to the systems  Motive – personal or financial gain, cyber espionage, protest or perhaps just addicted to the thrill of cyber crime  They range from amateurs (getting their feet wet by spreading malware) to experienced hackers (stealing data specifically financial or PII)
  • 7. WHITE HATS  Choose to use their powers for good than evil a.k.a “ethical hackers”  Could be paid employees or contractors in companies to find security holes/vulnerabilities  Use the same methods as black hats, but with permission  They perform what is known as penetration testing (pen tests)
  • 8. GREY HATS  As in life, there are grey areas - blend of both black hat and white hat activities  Grey hats look for vulnerabilities w/o owner’s permission  If issue is found, report it but with a small fee to fix the issue  If owner does not comply, post the exploit for the world to see  They’re not inherently malicious with their intentions, but just looking to get something out of their discoveries
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. How/Where do I begin?  Talk to your two friends and about “Ethical Hacking”  Tons and tons of videos on  Follow topics about security & hacking on  Make it a habit & keep visiting  Join a mailing list –  Train and certify for either (or both) –  Familiarize and practice for Top 10
  • 14. “ ” ALL YOU NEED IS “KALI” What all do I need to begin with?
  • 15. Questions on everyone’s mind now:  Why did I not know that hacking was a religious affair?  How many times should I perform pooja?  What’s the average appeasement time before being blessed?
  • 16. I’m serious, but it’s “KALI LINUX”
  • 18. Hacking Myths! Myth 1: You become a hacker after wearing a hoodie Ans: Wearing a hoodie will not enhance your skills. Wear it when feeling cold or to cover your ugliness Myth 2: Hackers are maladjusted young people who live in their mothers’ basements Ans: Many of them are not teens, have a day job and have steady relationships with peers and families Ans: Predominantly male dominated, but that doesn’t mean there are female hackers Myth 3: Hacking is a boys only club Myth 4: All hacking is bad Ans: Hacking is not always about compromising data, but about understanding the underlying nature of the technology
  • 19.
  • 20. WHAT’S THE DEMO? Brute force a website login using Hydra & Burpsuite (from Kali Linux) THINGS YOU NEED  Kali Linux (actually any *nix will do)  DVWA (Damn Vulnerable Web Application)  Hydra  Burpsuite  Web Browser  Username/password Lists