SlideShare une entreprise Scribd logo
1  sur  26
How Hackers Get Into
   Your System

        By
        Antriksh Shah
        null The Open Security Community
Introduction to Hackers

Refers to a person who enjoys learning the details
of computer systems and to stretch his/her
capabilities



Refers to a person who uses his hacking skills for offensive purposes



              Hacking
Describes the rapid development of new programs or the reverse
engineering of the already existing software to make the code better and
more efficient
Types of Hackers
Steganography
 Greek Words:
    STEGANOS – “Covered”
    GRAPHIE – “Writing”
 Steganography is the art and science of writing hidden
  messages in such a way that no one apart from the
  intended recipient knows of the existence of the message.

 This can be achieve by concealing the existence of
  information within seemingly harmless carriers or cover
 Carrier: text, image, video, audio, etc
Ancient Steganography
 Demeratus in 440 BC sent a warning about a
  forthcoming attack to Greece by writing it on a wooden
  panel and covering it in wax.


 Histiaeus, who shaved the head of his most trusted
  slave and tattooed a message on it. After his hair had
  grown the message was hidden. The purpose was to
  instigate a revolt against the Persians.
Use of Steganography
         by Terrorist
   Al Qaeda's use of steganography is somewhat simpler: In 2008 a British
    man,Rangzieb Ahmed, was alleged to have a contact book with Al-
    Qaeda telephone numbers, written in invisible ink. He was convicted of
    terrorism.

   In 2010, the Federal Bureau of Investigation revealed that the Russian
    foreign intelligence service uses customized steganography software for
    embedding encrypted text messages inside image files for certain
    communications with "illegal agents" (agents under non-diplomatic
    cover) stationed abroad.

   Using steganography to embed a message in a pornographic image and
    posting it to a Usenet newsgroup is the cyberspace equivalent of a dead
    drop. To everyone else, it's just a picture. But to the receiver, there's a
    message in there waiting to be extracted.
http://www.8newsnow.com/story/498274/steganography-hidden-writing-how-terrorists-
communicate-online
Steganography Demo
Malwares Spying your
     System’s
Malware
A malware is a small program that runs hidden on an infected computer
With the help of a malware, an attacker gets access to stored
passwords in the compromised computer and would be able to
read personal documents, delete files and display pictures, and/or
show messages on the screen
Different Types of
             Malware
 Remote Access Data-Sending Malware

 Destructive Malware

 Denial-of-Service (DoS) Attack Malware

 FTP Trojans

 Security Software Disablers
What Do Malware
          Creators Look For
 Credit card information

 Account data (email addresses, passwords, user names, and so
  on)

 Confidential documents

 Financial data (bank account numbers, social security numbers,
  insurance information, and so on)

 Calendar information concerning the victim’s whereabouts

 Using the victim’s computer for illegal purposes, such as to hack,
  scan, flood, or infiltrate other machines on the network or Internet
Different Ways a Malware
 Can Get into a System
 Internet

 Pirated Software’s

 Free ScreenSavers

 E-Greeting Cards

 Untrusted Web Site Links

 USB Drive/ Images etc…
How does an attacker get a Trojan installed on the
                victim's computer?


 Using wrappers

 A wrapper attaches a given EXE application (such as
  games or office applications) to the Trojan executable

 The two programs are wrapped together into a single
  file. When the user runs the wrapped EXE, it first
  installs the Trojan in the background and then runs the
  wrapped application in the foreground

 The user only sees the latter application
Process
Zeus
   Zeus is a malware that steals banking information by keystroke
    logging and Form Grabbing

   Zeus is spread mainly through drive-by downloads and phishing
    schemes

   In June 2009, security company Prevx discovered that Zeus had
    compromised accounts of such companies as the Bank of America,
    NASA, Monster, ABC, Oracle,Play.com Cisco, Amazon, and
    BusinessWeek.

   2009 over 1.5 million phishing messages were sent on Facebook with
    the purpose of spreading the Zeus' trojan.

   From November 14–15, 2009 Zeus spread via e-mails purporting to be
    from Verizon Wireless. A total of nine million of these phishing e-mails
    were sent.

   The five countries with the most significant instances of infected
    machines are Egypt, the United States, Mexico, Saudi Arabia, and
http://www.fbi.gov/newyork/press-releases/2011/nikolay-garifulin-pleads-guilty-in-
manhattan-federal-court-to-involvement-in-global-bank-fraud-scheme-that-used-zeus-
trojan-to-steal-millions-of-dollars-from-u.s.-bank-accounts
Trojan Demo
Key-Logger
Key-logger's stealing away your
      Private Passwords
 A program or hardware device that captures every
  key depression on the computer

 Used to monitor employee performance

 Used to seal private information

 Besides being used for legitimate purposes,
  keyloggers can be hardware installed to a computer or
  software that is used to collect sensitive information.
Hackers Motive of Key-
          Logger
 The types of sensitive information include:
     Usernames & Passwords
        Credit Card Numbers
        Person Information such as Name, Address, etc.

These small devices connect directly on the end of a keyboard to the port
on the computer and look rather unassuming.
Preventive Measure
Use Anti-Virus Programs

Keep your system patched

Read Email with Attachments Carefully

Use Firewall Programs

Backup Important Files/Folders on separate storage
media
Preventive Measure
Use strong Passwords

Download and Install Software with Care

Avoid Social Engineering Attacks

Avoid Public Computers

Learn & Arm your self against Cyber Attacks
Thank You

Contenu connexe

Tendances

Internet security
Internet securityInternet security
Internet security
at1211
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
bebo
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
Patricia M Watson
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
yanizaki
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
Lindsey Landolfi
 

Tendances (20)

A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Internet security
Internet securityInternet security
Internet security
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
Surf smart
Surf smartSurf smart
Surf smart
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
 
185
185185
185
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
hacking and its types
hacking and its typeshacking and its types
hacking and its types
 
INTERNET THREAT
INTERNET THREATINTERNET THREAT
INTERNET THREAT
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
 

Similaire à yoda at rotary_pune_club

Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docx
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docxCathy Dillon wrote 1. njRAT targeted Middle East high-level org.docx
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docx
tidwellveronique
 

Similaire à yoda at rotary_pune_club (20)

Presentation1
Presentation1Presentation1
Presentation1
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docx
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docxCathy Dillon wrote 1. njRAT targeted Middle East high-level org.docx
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docx
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Ransomware
RansomwareRansomware
Ransomware
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
MALWARE
MALWAREMALWARE
MALWARE
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Malware
MalwareMalware
Malware
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Information security
Information securityInformation security
Information security
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Dickmaster
DickmasterDickmaster
Dickmaster
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

yoda at rotary_pune_club

  • 1. How Hackers Get Into Your System By Antriksh Shah null The Open Security Community
  • 2. Introduction to Hackers Refers to a person who enjoys learning the details of computer systems and to stretch his/her capabilities Refers to a person who uses his hacking skills for offensive purposes Hacking Describes the rapid development of new programs or the reverse engineering of the already existing software to make the code better and more efficient
  • 4. Steganography  Greek Words:  STEGANOS – “Covered”  GRAPHIE – “Writing”  Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover  Carrier: text, image, video, audio, etc
  • 5. Ancient Steganography  Demeratus in 440 BC sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax.  Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians.
  • 6. Use of Steganography by Terrorist  Al Qaeda's use of steganography is somewhat simpler: In 2008 a British man,Rangzieb Ahmed, was alleged to have a contact book with Al- Qaeda telephone numbers, written in invisible ink. He was convicted of terrorism.  In 2010, the Federal Bureau of Investigation revealed that the Russian foreign intelligence service uses customized steganography software for embedding encrypted text messages inside image files for certain communications with "illegal agents" (agents under non-diplomatic cover) stationed abroad.  Using steganography to embed a message in a pornographic image and posting it to a Usenet newsgroup is the cyberspace equivalent of a dead drop. To everyone else, it's just a picture. But to the receiver, there's a message in there waiting to be extracted.
  • 7.
  • 8.
  • 11. Malwares Spying your System’s
  • 12. Malware A malware is a small program that runs hidden on an infected computer With the help of a malware, an attacker gets access to stored passwords in the compromised computer and would be able to read personal documents, delete files and display pictures, and/or show messages on the screen
  • 13. Different Types of Malware  Remote Access Data-Sending Malware  Destructive Malware  Denial-of-Service (DoS) Attack Malware  FTP Trojans  Security Software Disablers
  • 14. What Do Malware Creators Look For  Credit card information  Account data (email addresses, passwords, user names, and so on)  Confidential documents  Financial data (bank account numbers, social security numbers, insurance information, and so on)  Calendar information concerning the victim’s whereabouts  Using the victim’s computer for illegal purposes, such as to hack, scan, flood, or infiltrate other machines on the network or Internet
  • 15. Different Ways a Malware Can Get into a System  Internet  Pirated Software’s  Free ScreenSavers  E-Greeting Cards  Untrusted Web Site Links  USB Drive/ Images etc…
  • 16. How does an attacker get a Trojan installed on the victim's computer?  Using wrappers  A wrapper attaches a given EXE application (such as games or office applications) to the Trojan executable  The two programs are wrapped together into a single file. When the user runs the wrapped EXE, it first installs the Trojan in the background and then runs the wrapped application in the foreground  The user only sees the latter application
  • 18. Zeus  Zeus is a malware that steals banking information by keystroke logging and Form Grabbing  Zeus is spread mainly through drive-by downloads and phishing schemes  In June 2009, security company Prevx discovered that Zeus had compromised accounts of such companies as the Bank of America, NASA, Monster, ABC, Oracle,Play.com Cisco, Amazon, and BusinessWeek.  2009 over 1.5 million phishing messages were sent on Facebook with the purpose of spreading the Zeus' trojan.  From November 14–15, 2009 Zeus spread via e-mails purporting to be from Verizon Wireless. A total of nine million of these phishing e-mails were sent.  The five countries with the most significant instances of infected machines are Egypt, the United States, Mexico, Saudi Arabia, and
  • 22. Key-logger's stealing away your Private Passwords  A program or hardware device that captures every key depression on the computer  Used to monitor employee performance  Used to seal private information  Besides being used for legitimate purposes, keyloggers can be hardware installed to a computer or software that is used to collect sensitive information.
  • 23. Hackers Motive of Key- Logger  The types of sensitive information include:  Usernames & Passwords  Credit Card Numbers  Person Information such as Name, Address, etc. These small devices connect directly on the end of a keyboard to the port on the computer and look rather unassuming.
  • 24. Preventive Measure Use Anti-Virus Programs Keep your system patched Read Email with Attachments Carefully Use Firewall Programs Backup Important Files/Folders on separate storage media
  • 25. Preventive Measure Use strong Passwords Download and Install Software with Care Avoid Social Engineering Attacks Avoid Public Computers Learn & Arm your self against Cyber Attacks