SlideShare une entreprise Scribd logo
1  sur  23
Phreaks and Hackers


                     Part2: Hack




Lilya Nachalova
Mohammad Eghlima
Introduction                    programmer subcultures
                            Definition                      Hobbyist subcultures
         Hack               Categories                      Jargon files
                            Computer security subcultures   Resource && Appendixes



We are going to give answers to these questions:
• Who is the hacker?
• What is the meaning of hack?
• How many types of hackers exist?
• Do they have any moral lows or beliefs?
• Do they have any specific languages for themselves?




                                                                                     2
Introduction                    programmer subcultures
                        Definition                      Hobbyist subcultures
         Hack           Categories                      Jargon files
                        Computer security subcultures   Resource && Appendixes

Hacker

 People committed to circumvention of computer security.

 A community of enthusiast computer programmers and systems
designers. originated in the 1960s around the Massachusetts
Institute of Technology's (MIT's) Tech Model Railroad Club (TMRC)
and MIT Artificial Intelligence Laboratory.
 The hobbyist home computing community:
   (The community included Steve Jobs, Steve Wozniak and Bill Gates and
      created the personal computing industry).




                                                                                 3
Introduction                    programmer subcultures
                               Definition                      Hobbyist subcultures
         Hack                  Categories                      Jargon files
                               Computer security subcultures   Resource && Appendixes

Over the course of 2011, the word "hacker" gained a fourth meaning
• someone who challenges the existing order, most often using science, engineering,
  or information technology
• popularized by:
    – internet pop culture (such as the web comic xkcd)
    – large corporations (particularly Facebook, whose new headquarters prominently
      encourages its employees to "hack")
• Examples of these new age "hacks“:
    – Facebook timeline: as a revolution of social networking.
    – successful protest against SOPA.
    – social media driven revolutions (Syria, and Yemen, Libya, Egypt, and Iran)




                                                                                        4
Introduction                    programmer subcultures
                     Definition                      Hobbyist subcultures
      Hack           Categories                      Jargon files
                     Computer security subcultures   Resource && Appendixes

(1) Hacking means
finding out weaknesses in a computer or computer network
and exploiting them
by
someone with an advanced understanding of computers and
computer networks
motivated by
a multitude of reasons, such as profit, protest, or challenge.



                                                                              5
Introduction                    programmer subcultures
                              Definition                      Hobbyist subcultures
         Hack                 Categories                      Jargon files
                              Computer security subcultures   Resource && Appendixes

Subgroups:
may be defined by the legal status of their activities.

        White hat (ethical hacker):
•breaks security for non-malicious reasons, perhaps to test their own security system
•perform penetration tests and vulnerability assessments within a contractual
agreement

        Black hat:
• "violates computer security for little reason beyond maliciousness or for personal
gain"(Moore,2005).
•the best example of public fears in computer crimes.

         Grey hat:
• is a combination of a Black Hat and a White Hat Hacker
• may use his skills for legal or illegal acts, but NOT for personal gains
• The moment they cross that boundary, they become black hat hackers
                                                                                       6
Introduction                    programmer subcultures
                       Definition                      Hobbyist subcultures
       Hack            Categories                      Jargon files
                       Computer security subcultures   Resource && Appendixes



Elite hacker: elite is used to describe the most skilled.
Script kiddie: is a non-expert who breaks into computer systems by
using pre-packaged automated tools written by others, usually with
little understanding of the underlying concept.
Neophyte: A neophyte, "n00b", or "newbie" is someone who is new
to hacking or phreaking and has almost no knowledge or experience of
the workings of technology, and hacking.
Blue hat: is someone outside computer security consulting firms who
is used to bug test a system prior to its launch.
Hacktivist: A hacktivist is a hacker who utilizes technology to
announce a social, ideological, religious, or political message.

                                                                                7
Introduction                    programmer subcultures
                             Definition                      Hobbyist subcultures
         Hack                Categories                      Jargon files
                             Computer security subcultures   Resource && Appendixes

Computer security (continue …) – Attacks type:
A typical approach in an attack on Internet-connected system is:
• Network enumeration: Discovering information about the intended target.
• Vulnerability analysis: Identifying potential ways of attack.
• Exploitation: Attempting to compromise the system by employing the
   vulnerabilities found through the vulnerability analysis.
Security exploits: SQL injection, Cross Site Scripting and Cross Site Request Forgery.
These are very common in website/domain hacking.
Vulnerability scanner: is a tool used to quickly check computers on a network for
known weaknesses.
Password cracking: is the process of recovering passwords from data that has been
stored in or transmitted by a computer system.
Packet sniffer: A packet sniffer is an application that captures data packets.
Spoofing attack (Phishing): A spoofing attack involves one program, system, or
website successfully masquerading as another by falsifying data and thereby being
treated as a trusted system.
                                                                                      8
Introduction                    programmer subcultures
                              Definition                      Hobbyist subcultures
         Hack                 Categories                      Jargon files
                              Computer security subcultures   Resource && Appendixes

Computer security (continue …) – Attacks type:
Rootkit: set of programs which work to subvert control of an operating system from
its legitimate operators. Usually, a rootkit will obscure its installation and attempt to
prevent its removal through a subversion of standard system security.
Social engineering: in the second stage of the targeting process, he or she will
typically use some social engineering tactics to get enough information to access the
network.
A common practice for hackers who use this technique, is to contact the system
administrator and play the role of a user who cannot get access to his or her system.
Hackers who use this technique have to be quite savvy and choose the words they
use carefully, in order to trick the system administrator into giving them information.
Trojan horses: A Trojan horse is a program which seems to be doing one thing, but is
actually doing another.
Viruses: A virus is a self-replicating program that spreads by inserting copies of itself
into other executable code or documents.
Worms: Like a virus, a worm is also a self-replicating program. A worm differs from a
virus in that it propagates through computer networks without user intervention.
Key loggers: record ('log') every keystroke on an affected machine for later retrieval.
                                                                                    9
Introduction                    programmer subcultures
                      Definition                      Hobbyist subcultures
       Hack           Categories                      Jargon files
                      Computer security subcultures   Resource && Appendixes

Computer security (continue …)
Hacker groups and conventions:
The computer underground is supported by regular real-world
gatherings called hacker conventions or "hacker cons".
These draw many people every year including SummerCon
(Summer), DEF CON, HoHoCon (Christmas), ShmooCon (February),
BlackHat, Hacker Halted, and H.O.P.E.

Hacker magazines
The most notable hacker-oriented magazine publications are
                                                   Phrak, Hakin9.


                                                                               10
Introduction                    programmer subcultures
                             Definition                      Hobbyist subcultures
         Hack                Categories                      Jargon files
                             Computer security subcultures   Resource && Appendixes

(2) Hacker (programmer subculture)
A hacker is an adherent of the computer programmer subculture that originally
emerged in academia in the 1960s in particular around the Massachusetts Institute
of Technology (MIT)'sTech Model Railroad Club (TMRC) and MIT Artificial Intelligence
Laboratory.
•It defines hacker "A person who enjoys exploring the details of
programmable systems and stretching their capabilities, as opposed to
most users, who prefer to learn only the minimum necessary.

•This community is notable for launching the free software movement
•The World Wide Web and the Internet itself are also hacker artifacts.




                                                                                      11
Introduction                      programmer subcultures
                                    Definition                        Hobbyist subcultures
          Hack                      Categories                        Jargon files
                                    Computer security subcultures     Resource && Appendixes

Hacker (programmer subculture) – History
• Before communications between computers and computer users were
  as networked as they are now.
• there were multiple independent and parallel hacker subcultures, often unaware
  or only partially aware of each others' existence.
• All of these had certain important traits in common:
    –   Creating software and sharing it with each other
    –   Placing a high value on freedom of inquiry; hostility to secrecy
    –   Information-sharing as both an ideal and a practical strategy
    –   Emphasis on rationality
    –   Distaste for authority
    –   Playful cleverness, taking the serious humorously and their humor seriously.
• These sorts of subcultures were commonly found at academic settings.
• They evolved in parallel, and largely unconsciously, until the Internet
• Over time, the academic hacker subculture has tended to become more
  conscious, more cohesive, and better organized.
                                                                                               12
Introduction                    programmer subcultures
                                  Definition                      Hobbyist subcultures
          Hack                    Categories                      Jargon files
                                  Computer security subcultures   Resource && Appendixes

Hacker (programmer subculture) – History
• The most important consciousness-raising moments:
    –   the composition of the first Jargon File in 1973
    –   the promulgation of the GNU Manifesto in 1985
    –   and the publication of The Cathedral and the Bazaar in 1997
    –   Correlated with this has been the gradual recognition of a set of shared culture heroes:
          • Bill Joy, Donald Knuth, Dennis Ritchie, Paul Graham, Alan Kay, Ken Thompson, Richard M.
             Stallman, Linus Torvalds, Larry Wall, and Guido Van Rossum.
• In 1975, hacker Dom was scattered across several different families of operating
  systems and disparate networks; today it is largely a Unix and TCP/IP
  phenomenon.




                                                                                            13
Introduction                    programmer subcultures
                            Definition                      Hobbyist subcultures
         Hack               Categories                      Jargon files
                            Computer security subcultures   Resource && Appendixes

Hacker (programmer subculture) – Ethics and Principles
Hacker Ethics: describes the moral values and philosophy
that are standard in the hacker community.

The term hacker ethic was described by journalist Steven Levy in his
book titled “Hackers: Heroes of the Computer Revolution”, written in
1984.
According to Levy the general tenets or principles of hacker ethic
include:
        • Sharing
        • Openness
        • Decentralization
        • Free access to computers
        • World Improvement                                          14
Introduction                    programmer subcultures
                             Definition                      Hobbyist subcultures
         Hack                Categories                      Jargon files
                             Computer security subcultures   Resource && Appendixes

Hacker (programmer subculture) – Ethics and Principles
•In addition to those principles, Levy also described more specific hacker ethics and
beliefs in chapter 2, The Hacker Ethic: The ethics he described in chapter 2 are:
     – Access to computers—and anything which might teach you something about
        the way the world works—should be unlimited and total. Always yield to the
        Hands-On Imperative!
     – All information should be free.
     – Mistrust authority — promote decentralization.
     – Hackers should be judged by their hacking, not criteria such as degrees, age,
        race, sex, or position.
     – You can create art and beauty on a computer.
     – Computers can change your life for the better.




                                                                                      15
Introduction                    programmer subcultures
                             Definition                      Hobbyist subcultures
         Hack                Categories                      Jargon files
                             Computer security subcultures   Resource && Appendixes

Hacker (programmer subculture) – Levy's "true hackers"
Levy identifies several "true hackers" who significantly influenced the hacker ethic:
•John McCarthy: Co-founder of the MIT Artificial Intelligence Lab and Stanford AI
Laboratory
•Bill Gosper: Mathematician and hacker
•Richard Greenblatt: Programmer and early designer of LISP machines
•Richard Stallman: Programmer and political activist who is well known for GNU,
Emacs and the Free Software Movement

Levy also identified the:
•"hardware hackers" (the "second generation", mostly centered in Silicon Valley)
•The "game hackers" (or the "third generation").
All three generations of hackers, according to Levy, embodied the principles of the
hacker ethic.

                                                                                      16
Introduction                    programmer subcultures
                           Definition                      Hobbyist subcultures
        Hack               Categories                      Jargon files
                           Computer security subcultures   Resource && Appendixes

Hacker (programmer subculture) – Levy's "true hackers"
Some of Levy's "second-generation" hackers include:
•Steve Wozniak: One of the founders of Apple Computer
•Bob Marsh: A designer of the Sol-20 computer
•Fred Moore: Activist and founder of the Homebrew Computer Club
•Steve Dompier: Homebrew Computer Club member, worked with Altair 8800
• Lee Felsenstein: A hardware hacker and co-founder of Community Memory and
Homebrew Computer Club; a designer of the Sol-20 computer
•John Draper: A legendary figure in the computer programming world. He wrote
EasyWriter, the first word processor.

Levy's "third generation" practitioners of hacker ethic include:
•John Harris: One of the first programmers hired at On-Line Systems (which later
became Sierra Entertainment)
•Ken Williams: Along with wife Roberta, founded On-Line Systems after working at
                                                                           17
IBM
Introduction                    programmer subcultures
                              Definition                      Hobbyist subcultures
         Hack                 Categories                      Jargon files
                              Computer security subcultures   Resource && Appendixes

(3) Hacker (hobbyist)
•In home and hobby circles, a hacker is a person who heavily modifies the software
or hardware of their own computer system.
•It includes building, rebuilding, modifying, and creating to make it better or faster or
to give it added features or to make it do something it was never intended to do.

Hardware modifier: those who modify hardware to expand capabilities.
•they have the ability to write circuit-level code, device drivers, firmware, low-level
networking (and even more impressively, using these techniques to make devices do
things outside of their spec sheets).
•Are typically in very high regard among hacker communities.




                                                                                       18
Introduction                    programmer subcultures
                             Definition                      Hobbyist subcultures
         Hack                Categories                      Jargon files
                             Computer security subcultures   Resource && Appendixes

Hacker (hobbyist) - (continue …)
Hacker artists: create art by hacking on technology as
an artistic medium.

•A successful software and hardware hacker artist is Mark Lottor (mkl),
who has created the 3-D light art projects entitled the Cubatron, and
the Big Round Cubatron. This art is made using custom computer
technology, with specially designed circuit boards and programming
for microprocessor chips to manipulate the LED lights.

•Some hacker artists create art by writing computer code, and others,
by developing hardware. Some create with existing software tools such
as Adobe Photoshop or GIMP.
                                                                                      19
Introduction                    programmer subcultures
                            Definition                      Hobbyist subcultures
         Hack               Categories                      Jargon files
                            Computer security subcultures   Resource && Appendixes

Jargon File:
Is a glossary of computer programmer slang.
•The original Jargon File was a collection of terms from technical cultures
such as the MIT AI Lab, the Stanford AI Lab(SAIL) and others of the
old ARPANET AI/LISP/PDP-10 communities, including Bolt, Beranek and
Newman, Carnegie Mellon University, and Worcester Polytechnic Institute.
Jargons file versions:
If you are intersted to know speciall vocabulary of hackers, we advice to read the
source denoted in appendixes number 12. In general there are three versions of
Jargon in computer programmer.
•1975 – 1983
•1983 – 1990
•1990 – later


                                                                                     20
Introduction                    programmer subcultures
                             Definition                      Hobbyist subcultures
         Hack                Categories                      Jargon files
                             Computer security subcultures   Resource && Appendixes

Hack terminology:
http://en.wikipedia.org/wiki/Hack_(technology_slang)#cite_ref-0
Hacker – Computer security:
http://en.wikipedia.org/wiki/Hacker_(computer_security)
Hacker – Programmer subculture:
http://en.wikipedia.org/wiki/Hacker_(programmer_subculture)
Hacker – Hobbyist:
http://en.wikipedia.org/wiki/Hacker_(hobbyist)
MIT Computer Science and Artificial Intelligence Laboratory:
http://en.wikipedia.org/wiki/MIT_Artificial_Intelligence_Laboratory
Tech Model Railroad Club:
http://en.wikipedia.org/wiki/Tech_Model_Railroad_Club



                                                                                      21
Introduction                    programmer subcultures
                            Definition                      Hobbyist subcultures
         Hack               Categories                      Jargon files
                            Computer security subcultures   Resource && Appendixes

1.   Löwgren, Jonas (February 23, 2000). "Hacker culture(s): Origins". Retrieved
     2008-10-18.
2.   http://tools.ietf.org/html/rfc1983
3.   Sterling, Bruce (1993). "Part 2(d)". The Hacker Crackdown. McLean, Virginia:
     IndyPublish.com. p. 61. ISBN 1-4043-0641-2
4.   Blomquist, Brian (May 29, 1999). "FBI's Web Site Socked as Hackers Target
     Feds".New York Post. Retrieved on October 21, 2008
5.   Wilhelm, Douglas. "2". Professional Penetration Testing. Syngress Press.
     p. 503.ISBN 9781597494250.
6.   http://en.wikipedia.org/wiki/Ethical_hacker
7.   Wilhelm, Douglas. "2". Professional Penetration Testing. Syngress Press.
     p. 503.ISBN 9781597494250.
8.   Moore, Robert (2005). Cybercrime: Investigating High Technology Computer
     Crime. Matthew Bender & Company. p. 258. ISBN 1-59345-303-5.Robert Moore
9.   Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer
     Crime(1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 9781593453039.22
Introduction                    programmer subcultures
                           Definition                      Hobbyist subcultures
        Hack               Categories                      Jargon files
                           Computer security subcultures   Resource && Appendixes

10. Eric Chabrow (February 25, 2012). "7 Levels of Hackers: Applying An Ancient
    Chinese Lesson: Know Your Enemies". GovInfo Security. Retrieved February 27,
    2012
11. "The Hacker's Ethics". Retrieved 31 August 2011
12. http://en.wikipedia.org/wiki/Jargon_file




                                                                                    23

Contenu connexe

Tendances

presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
Amol Deshmukh
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
Luke Perrin
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
Being Uniq Sonu
 

Tendances (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Hacking
HackingHacking
Hacking
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hackers
HackersHackers
Hackers
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
hacking and its types
hacking and its typeshacking and its types
hacking and its types
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Research Paper - Hacker Plague
Research Paper - Hacker PlagueResearch Paper - Hacker Plague
Research Paper - Hacker Plague
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
 

Similaire à Hackers

Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
 

Similaire à Hackers (20)

Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppt
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Hackers
HackersHackers
Hackers
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
Hackers
HackersHackers
Hackers
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ka3118541860
Ka3118541860Ka3118541860
Ka3118541860
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Kishor
Hacking KishorHacking Kishor
Hacking Kishor
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Hacking
HackingHacking
Hacking
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Dernier

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Dernier (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Hackers

  • 1. Phreaks and Hackers Part2: Hack Lilya Nachalova Mohammad Eghlima
  • 2. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes We are going to give answers to these questions: • Who is the hacker? • What is the meaning of hack? • How many types of hackers exist? • Do they have any moral lows or beliefs? • Do they have any specific languages for themselves? 2
  • 3. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Hacker  People committed to circumvention of computer security.  A community of enthusiast computer programmers and systems designers. originated in the 1960s around the Massachusetts Institute of Technology's (MIT's) Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory.  The hobbyist home computing community: (The community included Steve Jobs, Steve Wozniak and Bill Gates and created the personal computing industry). 3
  • 4. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Over the course of 2011, the word "hacker" gained a fourth meaning • someone who challenges the existing order, most often using science, engineering, or information technology • popularized by: – internet pop culture (such as the web comic xkcd) – large corporations (particularly Facebook, whose new headquarters prominently encourages its employees to "hack") • Examples of these new age "hacks“: – Facebook timeline: as a revolution of social networking. – successful protest against SOPA. – social media driven revolutions (Syria, and Yemen, Libya, Egypt, and Iran) 4
  • 5. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes (1) Hacking means finding out weaknesses in a computer or computer network and exploiting them by someone with an advanced understanding of computers and computer networks motivated by a multitude of reasons, such as profit, protest, or challenge. 5
  • 6. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Subgroups: may be defined by the legal status of their activities. White hat (ethical hacker): •breaks security for non-malicious reasons, perhaps to test their own security system •perform penetration tests and vulnerability assessments within a contractual agreement Black hat: • "violates computer security for little reason beyond maliciousness or for personal gain"(Moore,2005). •the best example of public fears in computer crimes. Grey hat: • is a combination of a Black Hat and a White Hat Hacker • may use his skills for legal or illegal acts, but NOT for personal gains • The moment they cross that boundary, they become black hat hackers 6
  • 7. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Elite hacker: elite is used to describe the most skilled. Script kiddie: is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept. Neophyte: A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking. Blue hat: is someone outside computer security consulting firms who is used to bug test a system prior to its launch. Hacktivist: A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. 7
  • 8. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Computer security (continue …) – Attacks type: A typical approach in an attack on Internet-connected system is: • Network enumeration: Discovering information about the intended target. • Vulnerability analysis: Identifying potential ways of attack. • Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis. Security exploits: SQL injection, Cross Site Scripting and Cross Site Request Forgery. These are very common in website/domain hacking. Vulnerability scanner: is a tool used to quickly check computers on a network for known weaknesses. Password cracking: is the process of recovering passwords from data that has been stored in or transmitted by a computer system. Packet sniffer: A packet sniffer is an application that captures data packets. Spoofing attack (Phishing): A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system. 8
  • 9. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Computer security (continue …) – Attacks type: Rootkit: set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Social engineering: in the second stage of the targeting process, he or she will typically use some social engineering tactics to get enough information to access the network. A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system. Hackers who use this technique have to be quite savvy and choose the words they use carefully, in order to trick the system administrator into giving them information. Trojan horses: A Trojan horse is a program which seems to be doing one thing, but is actually doing another. Viruses: A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Worms: Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Key loggers: record ('log') every keystroke on an affected machine for later retrieval. 9
  • 10. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Computer security (continue …) Hacker groups and conventions: The computer underground is supported by regular real-world gatherings called hacker conventions or "hacker cons". These draw many people every year including SummerCon (Summer), DEF CON, HoHoCon (Christmas), ShmooCon (February), BlackHat, Hacker Halted, and H.O.P.E. Hacker magazines The most notable hacker-oriented magazine publications are Phrak, Hakin9. 10
  • 11. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes (2) Hacker (programmer subculture) A hacker is an adherent of the computer programmer subculture that originally emerged in academia in the 1960s in particular around the Massachusetts Institute of Technology (MIT)'sTech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory. •It defines hacker "A person who enjoys exploring the details of programmable systems and stretching their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. •This community is notable for launching the free software movement •The World Wide Web and the Internet itself are also hacker artifacts. 11
  • 12. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Hacker (programmer subculture) – History • Before communications between computers and computer users were as networked as they are now. • there were multiple independent and parallel hacker subcultures, often unaware or only partially aware of each others' existence. • All of these had certain important traits in common: – Creating software and sharing it with each other – Placing a high value on freedom of inquiry; hostility to secrecy – Information-sharing as both an ideal and a practical strategy – Emphasis on rationality – Distaste for authority – Playful cleverness, taking the serious humorously and their humor seriously. • These sorts of subcultures were commonly found at academic settings. • They evolved in parallel, and largely unconsciously, until the Internet • Over time, the academic hacker subculture has tended to become more conscious, more cohesive, and better organized. 12
  • 13. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Hacker (programmer subculture) – History • The most important consciousness-raising moments: – the composition of the first Jargon File in 1973 – the promulgation of the GNU Manifesto in 1985 – and the publication of The Cathedral and the Bazaar in 1997 – Correlated with this has been the gradual recognition of a set of shared culture heroes: • Bill Joy, Donald Knuth, Dennis Ritchie, Paul Graham, Alan Kay, Ken Thompson, Richard M. Stallman, Linus Torvalds, Larry Wall, and Guido Van Rossum. • In 1975, hacker Dom was scattered across several different families of operating systems and disparate networks; today it is largely a Unix and TCP/IP phenomenon. 13
  • 14. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Hacker (programmer subculture) – Ethics and Principles Hacker Ethics: describes the moral values and philosophy that are standard in the hacker community. The term hacker ethic was described by journalist Steven Levy in his book titled “Hackers: Heroes of the Computer Revolution”, written in 1984. According to Levy the general tenets or principles of hacker ethic include: • Sharing • Openness • Decentralization • Free access to computers • World Improvement 14
  • 15. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Hacker (programmer subculture) – Ethics and Principles •In addition to those principles, Levy also described more specific hacker ethics and beliefs in chapter 2, The Hacker Ethic: The ethics he described in chapter 2 are: – Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total. Always yield to the Hands-On Imperative! – All information should be free. – Mistrust authority — promote decentralization. – Hackers should be judged by their hacking, not criteria such as degrees, age, race, sex, or position. – You can create art and beauty on a computer. – Computers can change your life for the better. 15
  • 16. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Hacker (programmer subculture) – Levy's "true hackers" Levy identifies several "true hackers" who significantly influenced the hacker ethic: •John McCarthy: Co-founder of the MIT Artificial Intelligence Lab and Stanford AI Laboratory •Bill Gosper: Mathematician and hacker •Richard Greenblatt: Programmer and early designer of LISP machines •Richard Stallman: Programmer and political activist who is well known for GNU, Emacs and the Free Software Movement Levy also identified the: •"hardware hackers" (the "second generation", mostly centered in Silicon Valley) •The "game hackers" (or the "third generation"). All three generations of hackers, according to Levy, embodied the principles of the hacker ethic. 16
  • 17. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Hacker (programmer subculture) – Levy's "true hackers" Some of Levy's "second-generation" hackers include: •Steve Wozniak: One of the founders of Apple Computer •Bob Marsh: A designer of the Sol-20 computer •Fred Moore: Activist and founder of the Homebrew Computer Club •Steve Dompier: Homebrew Computer Club member, worked with Altair 8800 • Lee Felsenstein: A hardware hacker and co-founder of Community Memory and Homebrew Computer Club; a designer of the Sol-20 computer •John Draper: A legendary figure in the computer programming world. He wrote EasyWriter, the first word processor. Levy's "third generation" practitioners of hacker ethic include: •John Harris: One of the first programmers hired at On-Line Systems (which later became Sierra Entertainment) •Ken Williams: Along with wife Roberta, founded On-Line Systems after working at 17 IBM
  • 18. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes (3) Hacker (hobbyist) •In home and hobby circles, a hacker is a person who heavily modifies the software or hardware of their own computer system. •It includes building, rebuilding, modifying, and creating to make it better or faster or to give it added features or to make it do something it was never intended to do. Hardware modifier: those who modify hardware to expand capabilities. •they have the ability to write circuit-level code, device drivers, firmware, low-level networking (and even more impressively, using these techniques to make devices do things outside of their spec sheets). •Are typically in very high regard among hacker communities. 18
  • 19. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Hacker (hobbyist) - (continue …) Hacker artists: create art by hacking on technology as an artistic medium. •A successful software and hardware hacker artist is Mark Lottor (mkl), who has created the 3-D light art projects entitled the Cubatron, and the Big Round Cubatron. This art is made using custom computer technology, with specially designed circuit boards and programming for microprocessor chips to manipulate the LED lights. •Some hacker artists create art by writing computer code, and others, by developing hardware. Some create with existing software tools such as Adobe Photoshop or GIMP. 19
  • 20. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Jargon File: Is a glossary of computer programmer slang. •The original Jargon File was a collection of terms from technical cultures such as the MIT AI Lab, the Stanford AI Lab(SAIL) and others of the old ARPANET AI/LISP/PDP-10 communities, including Bolt, Beranek and Newman, Carnegie Mellon University, and Worcester Polytechnic Institute. Jargons file versions: If you are intersted to know speciall vocabulary of hackers, we advice to read the source denoted in appendixes number 12. In general there are three versions of Jargon in computer programmer. •1975 – 1983 •1983 – 1990 •1990 – later 20
  • 21. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes Hack terminology: http://en.wikipedia.org/wiki/Hack_(technology_slang)#cite_ref-0 Hacker – Computer security: http://en.wikipedia.org/wiki/Hacker_(computer_security) Hacker – Programmer subculture: http://en.wikipedia.org/wiki/Hacker_(programmer_subculture) Hacker – Hobbyist: http://en.wikipedia.org/wiki/Hacker_(hobbyist) MIT Computer Science and Artificial Intelligence Laboratory: http://en.wikipedia.org/wiki/MIT_Artificial_Intelligence_Laboratory Tech Model Railroad Club: http://en.wikipedia.org/wiki/Tech_Model_Railroad_Club 21
  • 22. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes 1. Löwgren, Jonas (February 23, 2000). "Hacker culture(s): Origins". Retrieved 2008-10-18. 2. http://tools.ietf.org/html/rfc1983 3. Sterling, Bruce (1993). "Part 2(d)". The Hacker Crackdown. McLean, Virginia: IndyPublish.com. p. 61. ISBN 1-4043-0641-2 4. Blomquist, Brian (May 29, 1999). "FBI's Web Site Socked as Hackers Target Feds".New York Post. Retrieved on October 21, 2008 5. Wilhelm, Douglas. "2". Professional Penetration Testing. Syngress Press. p. 503.ISBN 9781597494250. 6. http://en.wikipedia.org/wiki/Ethical_hacker 7. Wilhelm, Douglas. "2". Professional Penetration Testing. Syngress Press. p. 503.ISBN 9781597494250. 8. Moore, Robert (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. p. 258. ISBN 1-59345-303-5.Robert Moore 9. Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime(1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 9781593453039.22
  • 23. Introduction programmer subcultures Definition Hobbyist subcultures Hack Categories Jargon files Computer security subcultures Resource && Appendixes 10. Eric Chabrow (February 25, 2012). "7 Levels of Hackers: Applying An Ancient Chinese Lesson: Know Your Enemies". GovInfo Security. Retrieved February 27, 2012 11. "The Hacker's Ethics". Retrieved 31 August 2011 12. http://en.wikipedia.org/wiki/Jargon_file 23