This presentation provided information on communication skills and hackers. It began with an introduction to the topic of hackers, defining what a hacker is and discussing different types of hackers such as black hat, white hat, grey hat, and script kiddie hackers. The presentation then discussed famous hackers like Albert Gonzalez, Jonathan James, Ian Murphy, and John Draper. It provided details on some of their hacking activities. The presentation concluded with tips on how to prevent hacking, including keeping software and operating systems updated, using firewalls and antivirus software, avoiding suspicious websites and emails, and having strong passwords.
4. What is Hacker???
Hacker is a term used to mean "a
clever programmer’’
Especially those in popular media, to
mean “someone who tries to break
into computer systems”.
5. There are many definition of hacking as
well as varying ideas of what a hacker is
or does.
A hacker is a person of good taste.
People who hack computers are known as
hackers.
6. Why Do Hackers Hack?
Just for fun
Show off
Hack other systems secretly
Notify many people their own
thought
Steal important information
Destroy enemy’s computer network
7. How to translate the hackers’
language?
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|| -> n
|/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
8. How to translate the hackers’
language?
• Example:
–1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3
th1s wh3n 1 h4ck3d 1n
–I did not hack this page, it was like this
when I hacked in
9. How can be a real Hacker ?
• Study C/C++
• Study computer architecture
• Study operating system
• Study computer network
• Examine the hacking tools
• Think the problem of the computer
10.
11. Types of Hackers:
• Black hat
• White hat
• Grey hat
• Script Kiddie
• Neophyte
• Blue hat
• Hacktivist
13. 1. Black hat:
Black hat hackers always do illegal work.
They work for black money.
They hack into bank websites, credit card
websites and stole money from account in
bank websites.
They are professionals in their fields.
They use their knowledge for illegal
purpose.
A black hat hacker is the bad guy.
15. 2. White hat:
breaks security for non-malicious reasons
perhaps to test their own security system
While working for a security company which
makes security software.
In fact, a large number of white hat hackers
are security experts themselves who want to
push the boundaries of their own IT security.
In fact, the National Security Agency (NSA)
offers certifications to these hackers.
17. 3. Grey hat:
• A grey hat hacker is a combination of a
black hat and a white hat hacker.
• A grey hat hacker may surf the internet
and hack into a computer system for the
sole purpose of notifying the
administrator that their system has a
security defect.
19. 4. Script kiddie:
• A script kiddie is basically a non-expert hacker.
• A hacker who breaks into people's computer
systems not through his knowledge in IT
security.
• Mostly kids/students
• User tools created by black hats
• To get free stuff
• Impress their peers
• Not get caught
22. 5. Neophyte:
• A neophyte means “newcomer” or
“newbie”.
• someone who is new to hacking
• Has almost no knowledge or
experience of the workings of
technology and hacking.
24. 6. Blue hat:
• A blue hat hacker is someone outside
computer security consulting firms.
• Who is used to bug test a system former
to its launch, looking for exploits so they
can be closed.
• Microsoft also uses the term Blue Hat to
represent a series of security briefing
events.
26. 8. Hacktivist
• A Hacktivist is a hacker who utilizes
technology to announce a social,
ideological, religious, or political
message.
• They use the same tools and techniques
as a hacker.
• They does so in order to disrupt services
and bring attention to a political and
social causes.
30. Albert "segvec"
Gonzalez
• Born in 1981
• An American Computer Hacker &
Computer Criminal
• ShadowCrew - screen name
"CumbaJohnny"
Trafficked stolen credit and ATM card
numbers
• Hacked the databases of TJX
Companies - 45.6 million credit and
debit card numbers
• Heartland Payment
Systems, Citibank
• Hacked computer systems of the
government of India
• Arrested on May 7, 2008 - was
sentenced to prison for 20 years
31. List of sites from which I collected data
related to Albert “segvec” Gonzalez
1. http://en.wikipedia.org/wiki/Albert_Gonzalez
2. http://www.time.com/time/business/article/0,8599,1
917345,00.html
3. http://www.wired.com/science/discoveries/news/200
1/02/41630
4. http://en.wikipedia.org/wiki/Code_injection
http://en.wikipedia.org/wiki/Backdoor_(computing)
5. http://www.neatorama.com/2006/08/28/a-short-
history-of-hacking/
32. Jonathan
James
Born on December 12,
1983, United States of America
c0mrade
Hacked software of NASA
Hacked software of DOD -
Between August 23, 1999, and
October 27, 1999
Arrested and sentenced to six
months
Died on May 18, 2008
33. List of sites from which I collected
data related to Jonathon James
1. http://en.wikipedia.org/wiki/Jonathan_Jame
s
2. http://www.jonathanjames.com/
3. https://www.facebook.com/pages/Jonathan-
james-hacker/268732283193175
4. http://www.linkedin.com/in/jonathankjames
34. Ian Murphy
Name in Hacking World –
Captain Zap
First Cracker
Hacked AT&T’s
Computers (1981)
He also provided the
inspiration for the 1992
film "Sneakers."
now the chairman of
Secure Data System (SDS)
- A data security Company
35. List of sites from which I collected
data related to Ian Murphy
1. https://twitter.com/Ian_Murphy
2. http://www.linkedin.com/pub/ian-murphy/25/88a/499
3. http://www.neatorama.com/2006/08/28/a-short-history-
of-hacking/
4. http://hackstory.net/Captain_Zap
5. http://attrition.org/errata/charlatan/ian_murphy/threat_p
rofile/
36. Phreaker John
Draper
Born in 1943, also known
as Captain Crunch , Crunch
or Crunchman
well known phone hacker/
phreaker
How he hacked?
Continued…
37. Tools Used by Phreaker John Draper
A phreaking
whistle
A Blue Box
Discovered
these methods
in 1971
Arrested for 2
times – in 1972,
1976
38. List of sites from which I collected
data related to Phreaker John Draper
1. http://www.neatorama.com/2006/08/28/a-short-history-
of-hacking/
2. http://www.wired.com/science/discoveries/news/2001/0
2/41630
3. http://en.wikipedia.org/wiki/John_Draper
4. http://mentalfloss.com/article/19484/true-crime-john-
draper-original-whistle-blower
5. http://www.infostruction.com/2011/09/12/10-hackers-
who-made-history/
6. http://www.livinginternet.com/i/ia_hackers_draper.htm
7. http://en.wikipedia.org/wiki/Blue_box
39. Robert Tappan
Morris
born on November 8,
1965
An American computer
scientist, best known
for creating the Morris
Worm in 1988
About Worm – The
Morris Worm
Lives in United States –
Age 48 years
40. List of sites from which I collected
data related to Robert Tappan Morris
1. http://en.wikipedia.org/wiki/Morris_worm
2. http://en.wikipedia.org/wiki/Robert_Tappan
_Morris
41. Kevin Poulson
Among Hackers he is known as
“Dark Dante” – born on Nov. 30
1965
Hacked FBI’s computers & phones
& stole Documents
hacked all phone lines running
into Los Angeles radio station
In April 1991, he was arrested
Released after paying more than
$50,000 (5,182,500 Rs) and serving
51 months in prison
. Today, he is the senior editor
of Wired magazine.
43. List of sites from which I collected
data related to Kevin Poulson
1. https://www.facebook.com/kevin.mitnickhac
k
2. http://www.takedown.com/bio/mitnick.html
3. http://en.wikipedia.org/wiki/Kevin_Poulsen
4. http://hackstory.net/Kevin_L._Poulsen
5. http://en.wikipedia.org/wiki/Wired_(magazi
ne)
44. Gary McKinnon
Born on 10 February 1966 –
a Scottishsystems administrator
and hacker
In Hackers known as “solo”
hack military computers
Illegally gained access to 97
computers - 13-month period from
February 2001 to March 2002.
He deleted a number of critical files,
over 300 computers and resulting in
over $700,000(72,555,001 Rs) in
damages.
45. List of sites from which I collected
data related to Gary McKinnon
1. http://en.wikipedia.org/wiki/Gary_McKinnon
2. http://freegary.org.uk/
3. http://www.theguardian.com/world/gary-
mckinnon
47. Some common ways to prevent your device
from being hacked are:
1) OS Updates
2) Software Updates
3) Installing Anti-Virus Software
4) Installing Anti-Spyware Software
5) Stop using Hacker Controlled Websites
6) Use Firewall
7) Data Backup
8) Avoid Spam Emails
9) Password Policies
10) Clear the Cookies
11) Don’t use generic user names
12) Keep your identity safe
48. Operating System Updates:
Hackers attack:
• Where they find weakness.
• A system ( not updated ) has flaws.
• So update your system regularly.
49. Software Updates:
Get the latest fixes or versions of :
• Applications installed on your computer
• Web based software
51. Installing Anti-Spyware Software:
A type of intrusion that:
• Slows down your computer
• Put advertisements
• Put pop-ups on the screen
• And can lead to identity theft
• So install anti-spyware as
soon as possible!
52. Stop using Hacker Controlled Websites:
In World Wide Web, avoid from:
1) Sites containing free downloads.
2) Online games.
“They are mostly controlled by hackers!”
53. Continue..
For ensuring a secure website:
• Check site-lock sign on Title bar
• https:// is written in caption below the title bar
instead of http://
54. Use Firewall:
Firewalls forbids:
• Outside threats (i.e. from hackers)
• Viruses from gaining access to your system.
• Control the traffic across connection
• Personalize your firewall settings
• Update it regularly
56. Data Backup:
The sensitive bits of
information can be wiped
clean from your hard
drive in the blink of an
eye..
“So it's best to always
have a backup at hand”.
58. Password Policies:
Use:
• Multiple, intricate passwords
• Combinations of letters and numbers
• Make sure that your password is not too difficult for you to
remember it!
60. Don’t use generic user names:
Do not use usernames such as:
• admin
• administrator
• Site Owner
Try to use unlimited range of combinations for
names.
61. Keep your Identity Safe
1) Do not use official email ID to subscribe
to the public groups.
2) Do not share and post professional
information on Social networks.
“Learn new technologies and techniques
for protection against hackers and keep
aware! “