SlideShare ist ein Scribd-Unternehmen logo
1 von 15
“We are anonymous. We are Legion. We do
not forget. We do not forgive. We do not
forget. Expect us.”
-Anonymous
Anonymous




By Thomas Griffith
Who is Anonymous?

• Anonymous is a loosely associated hacking
  organization. It was formed on “4chan” to
  represent the idea of many online and offline
  community users existing as an anarchic
  digitalized global brain.
• Anonymous strongly opposes internet censorship
  and surveillance, and have shutdown multiple
  government websites.
• Their members can be recognized by their “Guy
  Fawkes” mask in public.
How do you join Anonymous?
• It is impossible to join Anonymous as they
  have no ranks, leaders and no means of
  communication.
• You are “Anonymous” if you simply choose to
  be.
Commander X
• A person simply known as Commander X
  provides interviews and Video’s for
  Anonymous.
• He is thought to be a San Francisco
  gardener, and the leader of Anonymous.
  Command X said in his own words that he is a
  “peon” in Anonymous.
Distributed-Denial-Of-Service Attack
• Distributed-Denial-Of-
  Service attack or more
  commonly known as a
  DDOS is an attempt to
  make a machine or
  network unavailable to its
  users.
• This is usually done by
  saturating the target with
  external communications
  requests.
Low Orbit Ion Cannon
• Low Orbit Ion Cannon is
  a network stress test
  application that
  Anonymous uses to
  launch its DDOS attacks.
• Users download it and
  willing allow their
  computer to be part of
  a bot net, which is then
  launched at a target
  decided by AnonOPs.
Example of a government site hacked by Anonymous.
Anonymous members wearing “Guy Fawkes” masks.
Some “Achievements” of 2006-2007
• In 2008 Anonymous specialized in doing
  “Habbo Raids”, they would go on “Habbo
  Hotel and form swastika like formations.
• Later that year Anonymous tracked child
  predator Chris Forcand even before the police
  started investigations. Anonymous was
  responsible for Chris Forcands arrest some
  sources say.
2008
• Project Chanology was
  Anonymous’ mission to
  take out the Church Of
  Scientology. Anonymous
  sees Scientology as a lie
  and wishes to end their
  religion one way or
  another. They have
  released many videos
  about scientology from
  2009 to the present day.
2009
Anonymous Targetted
California Teen McKay
Hutch who ran the “No
Cussing Club”.
They leaked his home
address, phone number
and other personal
information on the
internet.
2010
• In 2010 Anonymous
  launched Denial-Of-
  Service attacks on
  VISA, MasterCard and
  Paypal companies for
  removing their services
  from wiki-leaks.
2011
• Aaron Barr the chief
  executive of Hbgary
  security firm announced
  that he had infiltrated
  Anonymous. In response
  Anonymous hacked his
  website, dumped 68 000
  emails, erased files, and
  took down the phone
  system.
2012
• In April
  2012, Anonymous
  launched a attack on
  485 Chinese
  Government
  websites, some more
  than once to protest
  the lack of democracy
  in the country.

Weitere ähnliche Inhalte

Was ist angesagt?

Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronakRonak Karanpuria
 
E-COMMERCE: The Dark Web
E-COMMERCE: The Dark Web E-COMMERCE: The Dark Web
E-COMMERCE: The Dark Web rardthebeast
 
The deep web
The deep webThe deep web
The deep webAGDNello
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden WebJon Kane
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep WebAmber Horsburgh
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
Security in the world wide web
Security in the world wide webSecurity in the world wide web
Security in the world wide webJoseGarcia1133
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation policeAshley Raymond
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leonDarwin de Leon
 
Sadaf ahmadi web503
Sadaf ahmadi web503Sadaf ahmadi web503
Sadaf ahmadi web503Sadaf Ahmadi
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?Jerric Lyns John
 

Was ist angesagt? (20)

Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
E-COMMERCE: The Dark Web
E-COMMERCE: The Dark Web E-COMMERCE: The Dark Web
E-COMMERCE: The Dark Web
 
The deep web
The deep webThe deep web
The deep web
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Piracy
PiracyPiracy
Piracy
 
Dark web
Dark webDark web
Dark web
 
darkweb
darkwebdarkweb
darkweb
 
5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Security in the world wide web
Security in the world wide webSecurity in the world wide web
Security in the world wide web
 
Cyber law1
Cyber law1Cyber law1
Cyber law1
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation police
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
Sadaf ahmadi web503
Sadaf ahmadi web503Sadaf ahmadi web503
Sadaf ahmadi web503
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
 
Hacking
HackingHacking
Hacking
 

Ähnlich wie Anonymous

What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSecPositive Hack Days
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Protecting your Members: Combating Online Threats (Credit Union Conference Se...
Protecting your Members: Combating Online Threats (Credit Union Conference Se...Protecting your Members: Combating Online Threats (Credit Union Conference Se...
Protecting your Members: Combating Online Threats (Credit Union Conference Se...NAFCU Services Corporation
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxCyber Security Partners
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014evacide
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
Keeping your Children Safe Online
Keeping your Children Safe OnlineKeeping your Children Safe Online
Keeping your Children Safe OnlineMatt Smith
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 
Presentation on yahoo cyber attack.pptx
Presentation on yahoo cyber attack.pptxPresentation on yahoo cyber attack.pptx
Presentation on yahoo cyber attack.pptxGajaKiller
 
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docxgilbertkpeters11344
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 

Ähnlich wie Anonymous (20)

What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Protecting your Members: Combating Online Threats (Credit Union Conference Se...
Protecting your Members: Combating Online Threats (Credit Union Conference Se...Protecting your Members: Combating Online Threats (Credit Union Conference Se...
Protecting your Members: Combating Online Threats (Credit Union Conference Se...
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
Ethics & Etiquette Online
Ethics & Etiquette OnlineEthics & Etiquette Online
Ethics & Etiquette Online
 
Keeping your Children Safe Online
Keeping your Children Safe OnlineKeeping your Children Safe Online
Keeping your Children Safe Online
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Introduction to Hacktivism
Introduction to HacktivismIntroduction to Hacktivism
Introduction to Hacktivism
 
The End Game Hoax
The End Game HoaxThe End Game Hoax
The End Game Hoax
 
Presentation on yahoo cyber attack.pptx
Presentation on yahoo cyber attack.pptxPresentation on yahoo cyber attack.pptx
Presentation on yahoo cyber attack.pptx
 
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 

Anonymous

  • 1. “We are anonymous. We are Legion. We do not forget. We do not forgive. We do not forget. Expect us.” -Anonymous
  • 3. Who is Anonymous? • Anonymous is a loosely associated hacking organization. It was formed on “4chan” to represent the idea of many online and offline community users existing as an anarchic digitalized global brain. • Anonymous strongly opposes internet censorship and surveillance, and have shutdown multiple government websites. • Their members can be recognized by their “Guy Fawkes” mask in public.
  • 4. How do you join Anonymous? • It is impossible to join Anonymous as they have no ranks, leaders and no means of communication. • You are “Anonymous” if you simply choose to be.
  • 5. Commander X • A person simply known as Commander X provides interviews and Video’s for Anonymous. • He is thought to be a San Francisco gardener, and the leader of Anonymous. Command X said in his own words that he is a “peon” in Anonymous.
  • 6. Distributed-Denial-Of-Service Attack • Distributed-Denial-Of- Service attack or more commonly known as a DDOS is an attempt to make a machine or network unavailable to its users. • This is usually done by saturating the target with external communications requests.
  • 7. Low Orbit Ion Cannon • Low Orbit Ion Cannon is a network stress test application that Anonymous uses to launch its DDOS attacks. • Users download it and willing allow their computer to be part of a bot net, which is then launched at a target decided by AnonOPs.
  • 8. Example of a government site hacked by Anonymous.
  • 9. Anonymous members wearing “Guy Fawkes” masks.
  • 10. Some “Achievements” of 2006-2007 • In 2008 Anonymous specialized in doing “Habbo Raids”, they would go on “Habbo Hotel and form swastika like formations. • Later that year Anonymous tracked child predator Chris Forcand even before the police started investigations. Anonymous was responsible for Chris Forcands arrest some sources say.
  • 11. 2008 • Project Chanology was Anonymous’ mission to take out the Church Of Scientology. Anonymous sees Scientology as a lie and wishes to end their religion one way or another. They have released many videos about scientology from 2009 to the present day.
  • 12. 2009 Anonymous Targetted California Teen McKay Hutch who ran the “No Cussing Club”. They leaked his home address, phone number and other personal information on the internet.
  • 13. 2010 • In 2010 Anonymous launched Denial-Of- Service attacks on VISA, MasterCard and Paypal companies for removing their services from wiki-leaks.
  • 14. 2011 • Aaron Barr the chief executive of Hbgary security firm announced that he had infiltrated Anonymous. In response Anonymous hacked his website, dumped 68 000 emails, erased files, and took down the phone system.
  • 15. 2012 • In April 2012, Anonymous launched a attack on 485 Chinese Government websites, some more than once to protest the lack of democracy in the country.