is hacking good or bad

25
IS HACKING GOOD OR BAD? BY ASHISH CHANDURKAR

Upload: ashish-chandurkar

Post on 10-Aug-2015

268 views

Category:

Education


4 download

TRANSCRIPT

IS HACKING GOOD OR BAD?BY ASHISH CHANDURKAR

OUTLINES

What’s HackingHistory of HackingHackerTypes Of HackerWhite HackerBlack Hat HackerConclusion

WHAT’S HACKING

Currently most widely used definition is:

To gain illegal or unauthorized access to a file, computer, or network.

Hacking is not limited to computers. The real meaning of hacking is to expand the capabilities of any electronic device; to use them beyond the original intentions of the manufacturer.

Hacking is the use of one's skills (computer, networking, etc.) to try and find vulnerabilities in a network infrastructure. ”

HISTORY OF HACKING

In 1960s . The first computer hackers emerge at MIT there occurred the first hacking incident an victims were electric trains.

In 1970’s • Phreaking : John Draper Hacked the AT&T’s long distance Calling for free .• Phone hackers break into regional and international phone networks to make free calls.

HISTORY

In 1980’s Phone phreaks begin to move into the area of computer hacking.

• Bill Landreth(the Cracker)Hacked most secure networks.

• (Choas C.Club) Hacked Nuclear secrets in Germany.

HISTORY

In 1990’s• The Internet begins to take off as a new browser, Netscape Navigator, makes information on

the Web more accessible. Hackers take to the new venue quickly, moving all their information and hacking programs to new hacker Web sites.

HISTORY

1995-till date• The hacking group Cult of the Dead Cow releases its Trojan horse program, a powerful

hacking tool--at Def Con. Once a hacker installs the Trojan horse on a machine running Windows 95 or Windows 98, the program allows unauthorized remote access of the machine!

• Microsoft becomes the prominent victim of a new type of hack that attacks the domain name server.

HISTORY In 2000

• In one of the biggest denial-of-service attacks , hackers launch attacks against eBay, Yahoo!, CNN.com., Amazon and others.

WHO IS A HACKER?

Some one who bypasses the system’s control by taking advantage of security weaknesses left in the system by developers !

One who is both knowledgeable and skilled at computer programming and have it’s own philosophy and code of ethics !

TYPES OF HACKER

White hat hacker

Black hat hacker.

Grey hat hacker.

Elite hacker.

Script kiddie.

WHITE HAT HACKER

They use their skills for good purposes. They work for organizations to stop the illegal activities through black hat hackers.

A white hat hacker breaks security for non-malicious reasons, perhapsto test their own security system. The term "white hat" in Internet slang refers to an Ethical Hacker.

BLACK HAT HACKER

A Black Hat Hacker is a hacker who violates computer security for little reason beyond maliciousness or for personal gain.

Black Hat hackers always do illegal work.

GREY HAT HACKER

Grey Hat hackers have both qualities like black hat hackers and white hat hackers .

They use their knowledge for bad purposes and good purposes too.

ELITE HACKER

A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers.

SCRIPT KIDDIE HACKER

A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, hence the term script kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature),usually with little understanding of the underlying concept.

Script kiddies hacks into computer or websites using the tools available on the internet .

They don’t have knowledge of programming .

WHITE HAT HACKER

Linus Torvalds(Creator of Linux)Linus Torvalds is the creator of Linux, a family of operating systems that brought the

flexibility and security of Unix-based systems to the public in an easy-to-digest manner.

In 1991, he created the first version of the Linux kernel using the Minix operating system as his source of inspiration.

WHITE HAT HACKER

Steve Wozniak(C0-Founder of Apple)Before Apple existed, Wozniak began his computer career by creating something called blue

boxes, a device that could bypass traditional telephone switch mechanisms in order to make free long-distance calls.

Wozniak and Steve Jobs built these boxes together and ended up selling them to their college classmates.

Bluebox

BLU

WHITE HAT HACKER

Tim Berners-Lee(Creator of Internet)He is the creator of the actual system that we all use to navigate the Internet in order to

access particular files, folders, and websites.

Later, he worked with CERN and developed an inhouse system that allowed researchers to share and update information quickly.

This would be the seedling idea that eventually grew into the hypertext protocol for the World Wide Web.

WHITE HAT HACKERJulian Assange (Founder of Wikileaks Website)Julian Assange is a computer programmer and journalist who is best known for founding

WikiLeaks, a website that publishes documents provided by people who disclose information regarding allegedly illegal or dishonest activities within a government department.

At the age of 16, Assange began to hack using the handle “Mendax”

He operated under a self-imposed code that included: 1) not harming systems that he broke into, 2) not altering information in systems that he broke into, and 3) sharing information whenever possible.

Mendax

BLACK HAT HACKER

Jonathan James16 year old black hat hacker Jonathan James, became the first imprisoned for cybercrime.

He cracked into NASA computers, stealing software worth approximately $1.7 million.

BLACK HAT HACKER

Gary McKinnonHe is accused of hacking into 97 United States military and NASA computers over a 13-

month period between, using the name ‘Solo’.

The US authorities claim he deleted critical files from operating systems, which shut down the United States Army’s Military District of Washington network of 2,000 computers for 24 hours.

BLACK HAT HACKER

Adrian LamoHe used coffee shops, libraries and internet cafés as his locations for hacking.

Apart from being the homeless hacker, Lamo is widely known for breaking into a series of high profile computer networks, which include The New York Times, Microsoft, Yahoo!, and MCI WorldCom.

BLACK HAT HACKER

George HotzGeorge Francis Hotz, alias geohot, or simply mil, is an American hacker known for

unlocking the iPhone, allowing the phone to be used with other wireless carriers, contrary to AT&T and Apple’s intent.

CONCLUSION

Hacking is good if you are using it for doing some work which is incredible.

Use your knowledge and skills of hacking for developing such thing which is memorable to everyone.

Don’t use hacking for evil.

Thank you!