SlideShare une entreprise Scribd logo
1  sur  20
INTRODUCTION TO
HACKING
AND CYBER THREATSBy
AITEZAZ MOHSIN & HASSAN BIN ABDUL
REHMAN
What is hacking?
► Hacking is a term used to refer to activities aimed at exploiting
security flaws to obtain critical information for gaining access to secured
networks.
HISTORY OF HACKING
● 1980s
- Cyberspace Coined
- 414 arrested
- Two hacker groups formed
● 1990s
- National crackdown on hackers
- Kevin Mitnick arrested
● 2001
- In one of the biggest denial of service attack, hackers launched attacks
Against eBay, Yahoo , CNN.com , Amazon and others.
● 2007 Bank hit by biggest ever hack. Swedish Bank , nearly $1 Million
Has been stolen from 250 customer account.
Famous Hackers in History
● Kevin Mitnick
● Most wanted computer
criminal in U.S History. His
story is so wild that it was the
basis for two featured films.
● Breached Security of Digital
Equipment Corporation’s
network,National defense
warning system and has
stolen several credit cards.
● Ending with a 5-year prison
sentence he became a
consultant and public
speaker for computer
security
● Albert Gonzalez
Collected over 170 million
credit card and ATM card
numbers over a period of 2
years. Yep. That’s equal to a
little over half the population
of the United States.
● Gonzalez started off as the
leader of a hacker group
known as ShadowCrew
● Gonzalez was sentenced to
prison for 20 years
Famous Hackers in History
● Kevin Poulsen
Known as Dark Dante. He
hacked a radio station’s
phone lines and fixed himself
as the winning caller
● He then earned his way onto
the FBI’s wanted list when he
hacked into federal systems
and stole wiretap information.
He was later captured in a
supermarket and sentenced
to 51 months in prison, as
well paying $56,000 in
restitution.
Famous Hackers in History
The Hackers Attitude
● The world is full of fascinating problems Waiting to be solved
Being a hacker is lots of fun but it is the fun that takes lots of effort
The Effort takes motivation. To be a hacker you to get a basic thrill
From solving problems.
● Hackers (or Creative people) should never be bored. Becoming a
hacker will take intelligence, practice, dedication and hardwork.
Basic Hacking skills
● Study C/C++/Assembly Language
● Study Operating system
● Study Computer Networks
● Examine hacking tools for a month
● Think about the problems of computer
● Learn how internet is working
● Learn how websites are working
● Practice your skills
● Learn how to use World wide web and write HTML
Types Of Hackers
● White Hat Hacker
If a white hat hacker finds a fault in a security system ie. a
website then they will inform the owner immediately
● Black Hat Hacker
A black hat hacker if they find a fault will immediately exploit the
site for there own beneficial gain
● Grey Hat Hacker
Grey hat hacker finds a fault he will do what he feels like at the
time ie, exploiting the site OR informing the owner
Information Needed By A Hacker
● Domain Name
● Ip Address
● Operating system and Version Number
● Open Ports
● Services Running
● Knowledge of Firewall and IDS
● Vulnerabilities
● System Admin Name/Contact
● Whois database
● Exploit database or extreme knowledge
Why Do Hackers Hack?
● Just for fun
● Show off
● Hacks other systems secretly
● Steal important information
● Destroys Enemies computer networks during the War
Why can't Defend against hackers
● There are many unknown security holes
● Hackers need to know only one security hole to hack the target
system
● Admin needs to know all security holes to defend the system
Intrusion Techniques
● Physical Intrusion
Physical access to the machine
● System Intrusion
Also known as Privilege Escalation
● Remote Intrusion
Penetrate a system remotely across the network
Possible Vulnerabilities
● Software Bugs
Software always has bugs. System administrators and
programmers can never track down and eliminate all possible
software vulnerabilities, and attackers have only to find one hole
in order to break in.
Major Software Bugs
● Buffer Overflows
Hackers will examine every place the program has input and try to
overflow it with randomdata. If the program crashes, there is a good
chance that carefully constructed input will allow the attacker to gain
access.
● SQL Injection
An attacker executes unauthorized SQL commands through an input
field on a website by entering extra characters.
Major Software Bugs
● Running unnecessary services
● Poor system Administrator practices
● Password Cracking
● Directory Attack
● Brute Force Attacks
● Clear Text Sniffing
● Encrypted sniffing
● Password File stealing
● Social Engineering
● Key logging
Major Software Bugs
● Danial of Service Attack
● Web browser Attacks
● DNS Poisoning
● Cross site scripting
● Local file inclusion
● Remote File inclusion
● Xpath Injection
● CSRF
● Authentication Bypassing
● Remote Command Execution
● Remote Code Execution
Major Software Bugs
● Trojans
● Payloads
● ARP Poisoning
● Domain name Hijacking
● DNS cache Poisoning
● LDAP Injection
● Connection String Injection
● Resource Injection
WANT TO LEARN ABOUT
SECURITY ??
VIST WwW.MADLEETS.CoM
ANY QUESTIONS?

Contenu connexe

Tendances

Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Michael Asres
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Web defacement
Web defacementWeb defacement
Web defacementstudent
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikaSarika Dyne
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 

Tendances (20)

Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
HACKING
HACKINGHACKING
HACKING
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
Hacking
HackingHacking
Hacking
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking
HackingHacking
Hacking
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Hacking
HackingHacking
Hacking
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Web defacement
Web defacementWeb defacement
Web defacement
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarika
 
Hacking
HackingHacking
Hacking
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
HACKING
HACKINGHACKING
HACKING
 
Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 

En vedette

En vedette (6)

Hacking
HackingHacking
Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Similaire à Introduction To Hacking

Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 
Hacking its types and the art of exploitation
Hacking its types and the art of exploitationHacking its types and the art of exploitation
Hacking its types and the art of exploitationShubhamChoudhary171
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learnedB.A.
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4TEKMONKS
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4Rohit Kapoor
 

Similaire à Introduction To Hacking (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking its types and the art of exploitation
Hacking its types and the art of exploitationHacking its types and the art of exploitation
Hacking its types and the art of exploitation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
hacking
hackinghacking
hacking
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 

Dernier

Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 

Dernier (20)

Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 

Introduction To Hacking

  • 1. INTRODUCTION TO HACKING AND CYBER THREATSBy AITEZAZ MOHSIN & HASSAN BIN ABDUL REHMAN
  • 2. What is hacking? ► Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.
  • 3. HISTORY OF HACKING ● 1980s - Cyberspace Coined - 414 arrested - Two hacker groups formed ● 1990s - National crackdown on hackers - Kevin Mitnick arrested ● 2001 - In one of the biggest denial of service attack, hackers launched attacks Against eBay, Yahoo , CNN.com , Amazon and others. ● 2007 Bank hit by biggest ever hack. Swedish Bank , nearly $1 Million Has been stolen from 250 customer account.
  • 4. Famous Hackers in History ● Kevin Mitnick ● Most wanted computer criminal in U.S History. His story is so wild that it was the basis for two featured films. ● Breached Security of Digital Equipment Corporation’s network,National defense warning system and has stolen several credit cards. ● Ending with a 5-year prison sentence he became a consultant and public speaker for computer security
  • 5. ● Albert Gonzalez Collected over 170 million credit card and ATM card numbers over a period of 2 years. Yep. That’s equal to a little over half the population of the United States. ● Gonzalez started off as the leader of a hacker group known as ShadowCrew ● Gonzalez was sentenced to prison for 20 years Famous Hackers in History
  • 6. ● Kevin Poulsen Known as Dark Dante. He hacked a radio station’s phone lines and fixed himself as the winning caller ● He then earned his way onto the FBI’s wanted list when he hacked into federal systems and stole wiretap information. He was later captured in a supermarket and sentenced to 51 months in prison, as well paying $56,000 in restitution. Famous Hackers in History
  • 7. The Hackers Attitude ● The world is full of fascinating problems Waiting to be solved Being a hacker is lots of fun but it is the fun that takes lots of effort The Effort takes motivation. To be a hacker you to get a basic thrill From solving problems. ● Hackers (or Creative people) should never be bored. Becoming a hacker will take intelligence, practice, dedication and hardwork.
  • 8. Basic Hacking skills ● Study C/C++/Assembly Language ● Study Operating system ● Study Computer Networks ● Examine hacking tools for a month ● Think about the problems of computer ● Learn how internet is working ● Learn how websites are working ● Practice your skills ● Learn how to use World wide web and write HTML
  • 9. Types Of Hackers ● White Hat Hacker If a white hat hacker finds a fault in a security system ie. a website then they will inform the owner immediately ● Black Hat Hacker A black hat hacker if they find a fault will immediately exploit the site for there own beneficial gain ● Grey Hat Hacker Grey hat hacker finds a fault he will do what he feels like at the time ie, exploiting the site OR informing the owner
  • 10. Information Needed By A Hacker ● Domain Name ● Ip Address ● Operating system and Version Number ● Open Ports ● Services Running ● Knowledge of Firewall and IDS ● Vulnerabilities ● System Admin Name/Contact ● Whois database ● Exploit database or extreme knowledge
  • 11. Why Do Hackers Hack? ● Just for fun ● Show off ● Hacks other systems secretly ● Steal important information ● Destroys Enemies computer networks during the War
  • 12. Why can't Defend against hackers ● There are many unknown security holes ● Hackers need to know only one security hole to hack the target system ● Admin needs to know all security holes to defend the system
  • 13. Intrusion Techniques ● Physical Intrusion Physical access to the machine ● System Intrusion Also known as Privilege Escalation ● Remote Intrusion Penetrate a system remotely across the network
  • 14. Possible Vulnerabilities ● Software Bugs Software always has bugs. System administrators and programmers can never track down and eliminate all possible software vulnerabilities, and attackers have only to find one hole in order to break in.
  • 15. Major Software Bugs ● Buffer Overflows Hackers will examine every place the program has input and try to overflow it with randomdata. If the program crashes, there is a good chance that carefully constructed input will allow the attacker to gain access. ● SQL Injection An attacker executes unauthorized SQL commands through an input field on a website by entering extra characters.
  • 16. Major Software Bugs ● Running unnecessary services ● Poor system Administrator practices ● Password Cracking ● Directory Attack ● Brute Force Attacks ● Clear Text Sniffing ● Encrypted sniffing ● Password File stealing ● Social Engineering ● Key logging
  • 17. Major Software Bugs ● Danial of Service Attack ● Web browser Attacks ● DNS Poisoning ● Cross site scripting ● Local file inclusion ● Remote File inclusion ● Xpath Injection ● CSRF ● Authentication Bypassing ● Remote Command Execution ● Remote Code Execution
  • 18. Major Software Bugs ● Trojans ● Payloads ● ARP Poisoning ● Domain name Hijacking ● DNS cache Poisoning ● LDAP Injection ● Connection String Injection ● Resource Injection
  • 19. WANT TO LEARN ABOUT SECURITY ?? VIST WwW.MADLEETS.CoM