SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Hacking
By: Chris Piccirilli, Carolyn Choi, John Malick,
and Tom Croonquist
What comes to mind when you think of
hacking?
What is hacking?
-While there are many definitions of hacking, a general
definition is to modify something to make it work for you.
-For computers, hacking includes fixing programs until they
work. Also, hacking includes modifying the computer
hardware to make it work better or tuned to the person's
wishes.
-The type of hacking that the media discusses includes
breaking into secure systems to determine their weaknesses
and to explore them. However, the media only points out the
malicious uses for breaking into systems.
http://www.youtube.com/watch?v=hzC6BONJgsQ
So as you can see, hacking is not always bad.....We can now get into
the types of hacking.....
Types of Hacking
-"White hats"
-security experts who try to find the vulnerabilities in programs and systems, and report them to the
manufacturers
-"ethical hackers" because they either have authorization to break into the system or program, or they do
so with the intent of assisting the manufacturer in securing them.
-"Black Hats"
-ones who are trying to find those same vulnerabilities and exploit them.
- "Cracker"
-Black Hat hackers, usually referring to the creation of software cracks to bypass anti-piracy methods.
-"Phreaker"
-person who hacks into telecommunications services.
A Common Misconception
-MOST hackers work for security professions or hack to improve their personal
experience.
-Most white hats only hack their own systems in order to tweak them to the fullest extent
that they can. Most of the "white hat" hackers are working behind the scenes or in the
shadows. The media hardly, if ever, discusses them or their work.
-Through movies, and sound-bites, the media has jumped on the "hackers are bad"
bandwagon-- totally overlooking the people who are trying to make their (and our) lives
better through their hacking.
http://www.youtube.com/watch?v=vAf9mUnafcQ
The First "Hacks"
1903 - Nevil Maskelyn
-The stage magician wrecked a public demo of Marconi's wireless telegraph in 1903 by sending insults in Morse code down the
wire.
1932 - Polish cryptologists Marian Rejewski, Henryk Zygalski and Jerzy Różycki
-broke the Enigma machine code
-gave the Allies a competitive advantage in reading Morse code
-Eisenhower considered this hack to be a pivotal factor in their victory in World War II.
1965 - William Matthews from MIT
-found a vulnerability in a Multics CTSS running on a IBM7094 .
-This flaw discloses the contents of the password file.
The First "Hacks"
1971- John T. Draper (Captain Crunch)
-Hacks long distance phone calling system
-Used the toy whistle found in a cereal box to generate a signal to make free long distance calls
1983 - The Warelords forms in The United States
    -founded by Black Bart (cracker of Dung Beetles in 1982) in St. Louis, Missouri.
    -Composed of many teenage hackers, phreakers, coders, and largely black hat-style underground computer geeks.
    -Triggered many more hacker groups to form later
Terminology
Open Source Software
• Source codes are freely available for anyone to inspect and 
study
o  No payment required/ No obstacles
• Several thousand languages used
o  C+, C++, Java
• Without the source code it is difficult to modify
• Can't redistribute copies with your changes 
• Has licenses that protect the author's integrity of the code
• Does not guarentee its users the additional freedoms that free 
software guarantees
 
Terminology
Free Software
• everyone has the right to inspect and study the source 
code
o also to use it for any desired purpose 
 making as many copies 
 installing on as many computers 
 modify and redistribute in its original or modified 
form. 
o without monetary or other restrictions
• Free software is always also open source
Terminology
Back Door
• a.k.a. "trap door"
• a hole in the system that the 
designers deliberately leave
• hackers may create these in order 
to to make sure they can 
return later on
Banner Grabbing
• Obtaining logon banners from a 
target system
Buffer Overflow
• Occurs when you try to stuff more 
data into a buffer than it can 
handle
Terminology
Chipping
•  configuring processors 
or other computer chips 
so that they contain 
some unexpected 
functions
DoS Attack
• Denial of Service
o attempt to shut down 
access to a particular 
system or network
o targets high-profile 
web sites
Terminology
DDoS
• Distributed Denial of 
Service
o DoS attack with a 
number of hosts who 
direct their attacks to a 
single target at the 
same time
Trojan Horse
• code fragment that hides 
inside a program and 
performs a disguised 
function
Terminology
Virus
• code fragment that copies itself into a
larger program, replicates, and infects
Worm
• independent program that reproduces
by copying itself from one computer to
another over a network
o does not modify other programs
Logic Bomb
• type of Trojan horse, used to release a
virus, worm, or other system attack
Terminology
Spoofing
• impersonating another host on a
network by using the hosts IP or MAC
address
o helps mask an attack
Session Hijacking
• when an attacker takes over an existing
connection between client and server
Post Redirection
• Redirecting network traffic from one IP
address/ports to another.
o circumvent firewalls or secure ports
Terminology
Red Book
• "Trusted Network Interpretation"
• the security requirements and rating
structure of TNI are extended to networks
of computers
• local area networks to wide area networks
Orange Book
• "Trusted Computer System Evaluation
Criteria"
o presents security requirements that a
host must meet in order to be
considered by the DoD a trusted system
Famous Individuals- BLACK HAT
Jonathan James- c0mrade-
- First juvenile sent to prison for hacking at 16
- Interested in challenges
- Targeted high profile organizations such as DTRA
-Defense Threat Reduction Agency
- Sniffer, captures 3000 data streams to control NASA
- suicide
Adrian Lamo- Dubbed as "homeless hacker"
-Used coffee shops, libraries, etc., to perform intrusions
- NY Times
- Penetration Testing
- A method of evaluating the security of a
computer system or network by simulating
an attack from malicious outsiders.
- expert to view personal info and CC
Famous Individuals- WHITE HAT
Stephen Wozniak - The "other Steve"
- National Medal of Technology
- National Inventors Hall of Fame
Tim Berners Lee- Who is he? 1989 22 Years Merge Personal/Global
- Caught hacking at Oxford University
-CERN: European nuclear research organization
Famous Hacking Groups
Masters of Deception: Mastered Credit Card hacking
: Hacked phone companies in order to get CC#'s
: Julia Roberts
Red Hacker Alliance: 80,000
: Began with strong oppostion Indonesian riots
: Mostly chinese against imperial US
MilitarianismJapan
: Honker Union
Recent Harmful Hacks
Zappos: January 16, 2012
http://online.wsj.com/article/BT-CO-20120116-706917.html
- CEO Tony Hsieh
- 12 years of developing a strong reputation
- Credit Card and Payment Data fortunately unaffected
Insurgent Hacks: December 19, 2009
http://online.wsj.com/article/SB126102247889095011.html
- $26 software purchased off the internet
- Provide info needed to help invade/monitor US Operations
- Allowed for possible strategic advantages
Modern Use
- Computer Security Purposes
- Discovering security faults, not doing any harm
- Programming
- Designing software, and building programs
- Home Use
- Hobby
Top Motivations for Hacking
- Money
- Obtaining money, bank information, modifying data
- Freedom
- Belief of accessibility
- Love
- Find cheaters
- Fun and Curiosity
- Having fun, learning the basics, gain recognition
THE END

Weitere ähnliche Inhalte

Was ist angesagt?

Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesLearningwithRayYT
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in TeluguSravani Reddy
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringPrem Lamsal
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 

Was ist angesagt? (20)

Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
HACKING
HACKINGHACKING
HACKING
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Hacking
HackingHacking
Hacking
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Hacking
HackingHacking
Hacking
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking
HackingHacking
Hacking
 

Andere mochten auch

10 rahasia sukses orang jepang
10 rahasia sukses orang jepang10 rahasia sukses orang jepang
10 rahasia sukses orang jepangKamilia Oktaviani
 
Greek Gods
Greek GodsGreek Gods
Greek Gods4siszl
 
Introduction to Open Access
Introduction to Open AccessIntroduction to Open Access
Introduction to Open AccessSuzy Kozaitis
 
Aboriginal Beliefs by Rachel and Tess
Aboriginal Beliefs by Rachel and TessAboriginal Beliefs by Rachel and Tess
Aboriginal Beliefs by Rachel and Tess4siszl
 
1 konsep dasar dan gagasan persamaan dif. orde 1
1   konsep dasar dan gagasan persamaan dif. orde 11   konsep dasar dan gagasan persamaan dif. orde 1
1 konsep dasar dan gagasan persamaan dif. orde 1Ariy Anto
 
Tips for Finding an Event Sponsor
Tips for Finding an Event SponsorTips for Finding an Event Sponsor
Tips for Finding an Event SponsorAndrew Reid
 
Presentación1
Presentación1Presentación1
Presentación1MAMENABAD
 
Sit presentation
Sit presentationSit presentation
Sit presentationcchoi02
 
Who we are 26.01.12
Who we are 26.01.12Who we are 26.01.12
Who we are 26.01.124siszl
 
Presentación en inglés contra la violencia de genero
Presentación en inglés contra la violencia de genero Presentación en inglés contra la violencia de genero
Presentación en inglés contra la violencia de genero Cristina Montiel García
 
Big combo 9 frame
Big combo 9 frameBig combo 9 frame
Big combo 9 frameevondobson
 
Klp 1 metode numerik lanjut
Klp 1  metode numerik lanjutKlp 1  metode numerik lanjut
Klp 1 metode numerik lanjutAriy Anto
 

Andere mochten auch (16)

10 rahasia sukses orang jepang
10 rahasia sukses orang jepang10 rahasia sukses orang jepang
10 rahasia sukses orang jepang
 
The commonwealth
The commonwealthThe commonwealth
The commonwealth
 
Greek Gods
Greek GodsGreek Gods
Greek Gods
 
Introduction to Open Access
Introduction to Open AccessIntroduction to Open Access
Introduction to Open Access
 
Aboriginal Beliefs by Rachel and Tess
Aboriginal Beliefs by Rachel and TessAboriginal Beliefs by Rachel and Tess
Aboriginal Beliefs by Rachel and Tess
 
1 konsep dasar dan gagasan persamaan dif. orde 1
1   konsep dasar dan gagasan persamaan dif. orde 11   konsep dasar dan gagasan persamaan dif. orde 1
1 konsep dasar dan gagasan persamaan dif. orde 1
 
Tips for Finding an Event Sponsor
Tips for Finding an Event SponsorTips for Finding an Event Sponsor
Tips for Finding an Event Sponsor
 
Presentación1
Presentación1Presentación1
Presentación1
 
EFT knocks the rocks off
EFT knocks the rocks offEFT knocks the rocks off
EFT knocks the rocks off
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Who we are 26.01.12
Who we are 26.01.12Who we are 26.01.12
Who we are 26.01.12
 
Presentación en inglés contra la violencia de genero
Presentación en inglés contra la violencia de genero Presentación en inglés contra la violencia de genero
Presentación en inglés contra la violencia de genero
 
Big combo 9 frame
Big combo 9 frameBig combo 9 frame
Big combo 9 frame
 
Glosario alemán - español
Glosario alemán - españolGlosario alemán - español
Glosario alemán - español
 
Klp 1 metode numerik lanjut
Klp 1  metode numerik lanjutKlp 1  metode numerik lanjut
Klp 1 metode numerik lanjut
 
Transformer project
Transformer projectTransformer project
Transformer project
 

Ähnlich wie Sit presentation

Ähnlich wie Sit presentation (20)

Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hacking
HackingHacking
Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hackers final
Hackers finalHackers final
Hackers final
 
Hackers final
Hackers finalHackers final
Hackers final
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Kürzlich hochgeladen

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Kürzlich hochgeladen (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Sit presentation

  • 1. Hacking By: Chris Piccirilli, Carolyn Choi, John Malick, and Tom Croonquist
  • 2. What comes to mind when you think of hacking?
  • 3. What is hacking? -While there are many definitions of hacking, a general definition is to modify something to make it work for you. -For computers, hacking includes fixing programs until they work. Also, hacking includes modifying the computer hardware to make it work better or tuned to the person's wishes. -The type of hacking that the media discusses includes breaking into secure systems to determine their weaknesses and to explore them. However, the media only points out the malicious uses for breaking into systems. http://www.youtube.com/watch?v=hzC6BONJgsQ So as you can see, hacking is not always bad.....We can now get into the types of hacking.....
  • 4. Types of Hacking -"White hats" -security experts who try to find the vulnerabilities in programs and systems, and report them to the manufacturers -"ethical hackers" because they either have authorization to break into the system or program, or they do so with the intent of assisting the manufacturer in securing them. -"Black Hats" -ones who are trying to find those same vulnerabilities and exploit them. - "Cracker" -Black Hat hackers, usually referring to the creation of software cracks to bypass anti-piracy methods. -"Phreaker" -person who hacks into telecommunications services.
  • 5. A Common Misconception -MOST hackers work for security professions or hack to improve their personal experience. -Most white hats only hack their own systems in order to tweak them to the fullest extent that they can. Most of the "white hat" hackers are working behind the scenes or in the shadows. The media hardly, if ever, discusses them or their work. -Through movies, and sound-bites, the media has jumped on the "hackers are bad" bandwagon-- totally overlooking the people who are trying to make their (and our) lives better through their hacking. http://www.youtube.com/watch?v=vAf9mUnafcQ
  • 6. The First "Hacks" 1903 - Nevil Maskelyn -The stage magician wrecked a public demo of Marconi's wireless telegraph in 1903 by sending insults in Morse code down the wire. 1932 - Polish cryptologists Marian Rejewski, Henryk Zygalski and Jerzy Różycki -broke the Enigma machine code -gave the Allies a competitive advantage in reading Morse code -Eisenhower considered this hack to be a pivotal factor in their victory in World War II. 1965 - William Matthews from MIT -found a vulnerability in a Multics CTSS running on a IBM7094 . -This flaw discloses the contents of the password file.
  • 7. The First "Hacks" 1971- John T. Draper (Captain Crunch) -Hacks long distance phone calling system -Used the toy whistle found in a cereal box to generate a signal to make free long distance calls 1983 - The Warelords forms in The United States     -founded by Black Bart (cracker of Dung Beetles in 1982) in St. Louis, Missouri.     -Composed of many teenage hackers, phreakers, coders, and largely black hat-style underground computer geeks.     -Triggered many more hacker groups to form later
  • 8. Terminology Open Source Software • Source codes are freely available for anyone to inspect and  study o  No payment required/ No obstacles • Several thousand languages used o  C+, C++, Java • Without the source code it is difficult to modify • Can't redistribute copies with your changes  • Has licenses that protect the author's integrity of the code • Does not guarentee its users the additional freedoms that free  software guarantees  
  • 9. Terminology Free Software • everyone has the right to inspect and study the source  code o also to use it for any desired purpose   making as many copies   installing on as many computers   modify and redistribute in its original or modified  form.  o without monetary or other restrictions • Free software is always also open source
  • 10. Terminology Back Door • a.k.a. "trap door" • a hole in the system that the  designers deliberately leave • hackers may create these in order  to to make sure they can  return later on Banner Grabbing • Obtaining logon banners from a  target system Buffer Overflow • Occurs when you try to stuff more  data into a buffer than it can  handle
  • 13. Terminology Virus • code fragment that copies itself into a larger program, replicates, and infects Worm • independent program that reproduces by copying itself from one computer to another over a network o does not modify other programs Logic Bomb • type of Trojan horse, used to release a virus, worm, or other system attack
  • 14. Terminology Spoofing • impersonating another host on a network by using the hosts IP or MAC address o helps mask an attack Session Hijacking • when an attacker takes over an existing connection between client and server Post Redirection • Redirecting network traffic from one IP address/ports to another. o circumvent firewalls or secure ports
  • 15. Terminology Red Book • "Trusted Network Interpretation" • the security requirements and rating structure of TNI are extended to networks of computers • local area networks to wide area networks Orange Book • "Trusted Computer System Evaluation Criteria" o presents security requirements that a host must meet in order to be considered by the DoD a trusted system
  • 16. Famous Individuals- BLACK HAT Jonathan James- c0mrade- - First juvenile sent to prison for hacking at 16 - Interested in challenges - Targeted high profile organizations such as DTRA -Defense Threat Reduction Agency - Sniffer, captures 3000 data streams to control NASA - suicide Adrian Lamo- Dubbed as "homeless hacker" -Used coffee shops, libraries, etc., to perform intrusions - NY Times - Penetration Testing - A method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders. - expert to view personal info and CC
  • 17. Famous Individuals- WHITE HAT Stephen Wozniak - The "other Steve" - National Medal of Technology - National Inventors Hall of Fame Tim Berners Lee- Who is he? 1989 22 Years Merge Personal/Global - Caught hacking at Oxford University -CERN: European nuclear research organization
  • 18. Famous Hacking Groups Masters of Deception: Mastered Credit Card hacking : Hacked phone companies in order to get CC#'s : Julia Roberts Red Hacker Alliance: 80,000 : Began with strong oppostion Indonesian riots : Mostly chinese against imperial US MilitarianismJapan : Honker Union
  • 19. Recent Harmful Hacks Zappos: January 16, 2012 http://online.wsj.com/article/BT-CO-20120116-706917.html - CEO Tony Hsieh - 12 years of developing a strong reputation - Credit Card and Payment Data fortunately unaffected Insurgent Hacks: December 19, 2009 http://online.wsj.com/article/SB126102247889095011.html - $26 software purchased off the internet - Provide info needed to help invade/monitor US Operations - Allowed for possible strategic advantages
  • 20. Modern Use - Computer Security Purposes - Discovering security faults, not doing any harm - Programming - Designing software, and building programs - Home Use - Hobby
  • 21. Top Motivations for Hacking - Money - Obtaining money, bank information, modifying data - Freedom - Belief of accessibility - Love - Find cheaters - Fun and Curiosity - Having fun, learning the basics, gain recognition