computer hacking

15
Presentation on computer hacking S y b com Shreyas dani

Upload: shreyas-dani

Post on 14-Apr-2017

8.216 views

Category:

Technology


0 download

TRANSCRIPT

Presentation on computer hacking

• S y b com• Shreyas dani

introduction

• Hacking is the process of illegally corrupting or extracting private information from a computer system or network. They are generally of malicious intent, wishing to render networks unable to function by overloading their systems with traffic and causing them to crash, or steal data such as credit card details and security numbers. As such, Hacking is considered a very serious crime.

• Computer hacking involves some degree of infringment on privacy of others to damage the computer based properties such as files, software, etc.

Hacking history• 1971 - Cap ‘n Crunch phone exploit discovered• 1988 - Morris Internet worm crashes 6,000 servers• 1994 - $10 million transferred from CitiBank accounts• 1995 - Kevin Mitnick sentenced to 5 years in jail• 1969 - Unix ‘hacked’ together• 2000 - Major websites succumb to DDoS• 2000 - 15,700 credit and debit card numbers stolen from

Western Union (hacked while web database was undergoing maintenance)

• 2001 Code Red exploited bug in MS IIS to penetrate & spread probes random IPs for systems running IIS had trigger time for denial-of-service attack

• 2nd wave infected 360000 servers in 14 hours• Code Red 2 - had backdoor installed to allow remote control

HACKER ?

• A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.

• One who programs enthusiastically or who enjoys programming rather than simply theorizing about programming.

Types of hackers• Professional hackers

– Black Hats – the Bad Guys– White Hats – Professional Security Experts

• Underemployed Adult Hackers – Former Script Kiddies

• Can’t get employment in the field• Want recognition in hacker community

• Ideological Hackers– hack as a mechanism to promote some political or ideological purpose– Usually coincide with political events

• Criminal Hackers– Real criminals, are in it for whatever they can get no matter who it

hurts• Disgruntled Employees

– Most dangerous to an enterprise as they are “insiders”– Since many companies subcontract their network services a

disgruntled vendor could be very dangerous to the host enterprise

Types of hackers

Basic needs of hackers• Everyone has heard of one

individual or another that was caught while hacking computers that belonged to this or that organization. Because hacking into computers is highly illegal, it should be mentioned that this article will not mention any real specifics about the subject, and this author would rather gladly encourage you to become a real hacker – professionally.

• A hacker who want to hack any information from any computer or from any data source, he want some very important information which might cause any incidence.

Types of Attacks

• Internal – like Technical attacks

• External – like Social Engineering

Hackers motivation• Desire to embarrass• Experimentation• Self Gratification• Problem Solving• Exposing System Weakness• Fun• Profit• Extortion• Technical Reputation• Scorekeeping• Revenge/maliciousness

Intellectual

Computer hacking tools• Tweak Manager 2.12 • Panda Security Demo 3.0.2.0• PC Activity Monitor Standard 7.7.1 • Word Extractor - a binary to text convertor

2.1 • Arctor File Repository Free 3.5.1.3 • Invisible Secrets Encryption Software 4.6 • Geek Superhero 1.3 • FolderAccess 2.0 • DataSafe PS Net 3.0• PC Activity Monitor Pro 6.5.1• NetPeeker 2.83• MailMonitor 1.6.3• SpyRemover Pro 3.05 • Spam Nullifier 3.4.0.1• BestCrypt Corporate 1.12

Is computer hacking is a crime?Computer hacking is broadly defined as any action that results in

unauthorized interference with a computer, computer system or network. Computer hacking includes breaking into a computer with the intent to steal, damage, modify or monitor data or settings within the system.

SignificanceComputer hacking is considered a crime in all 50 states; it is also a

crime under federal and international law. Because a computer may be accessed from anywhere, a person may be charged with computer hacking on the state, federal and international level.

TypesHacking often involves more than just unauthorized access to a

computer. Computer hackers may access a computer in order to: steal financial information such as credit card access numbers; steal personal information (identity theft); harass (swatting); vandalize; gain access to other computers; launch computer attacks; or place malicious software (malware).

ConsiderationsHacktivism is when computer hacking is used to

promote a political, religious or cultural cause or agenda. When an individual or group uses computer hacking to make a politically motivated attack it is called cyberterrorism. When one country uses computer hacking to disrupt, destroy or damage another country's computers, it is called cyberwarfare.

Famous TiesOn January 12, 2010, Google announced that it would

no longer censor its search results in China. One of the reasons for Google's decision was that it found evidence that Chinese hackers had broken into its email servers in an effort to get information from the email accounts of Chinese human rights advocates.

Ways to prevent hacking 1- implement a Frewall.

2- Develope corporate security policy3- Install antivirus software4- Keep operating systems up to date.5- Do not give out any information to unreliable sources.6- do not open spam emails.7- Do not give out personal information

conclusionThe word "hacker" carries weight. People strongly disagree

as to what a hacker is. Hacking may be defined as legal or illegal, ethical or unethical. The media’s portrayal of hacking has boosted one version of discourse. The conflict between discourses is important for our understanding of computer hacking subculture. Also, the outcome of the conflict may prove critical in deciding whether or not our society and institutions remain in the control of a small elite or we move towards a radical democracy It is my hope that the hackers of the future will move beyond their limitations and become hacktivists. They need to work with non-technologically based and technology-borrowing social movements in the struggle for global justice.