2. What is hacking?
► Hacking is a term used to refer to activities aimed at exploiting
security flaws to obtain critical information for gaining access to secured
networks.
3. HISTORY OF HACKING
● 1980s
- Cyberspace Coined
- 414 arrested
- Two hacker groups formed
● 1990s
- National crackdown on hackers
- Kevin Mitnick arrested
● 2001
- In one of the biggest denial of service attack, hackers launched attacks
Against eBay, Yahoo , CNN.com , Amazon and others.
● 2007 Bank hit by biggest ever hack. Swedish Bank , nearly $1 Million
Has been stolen from 250 customer account.
4. Famous Hackers in History
● Kevin Mitnick
● Most wanted computer
criminal in U.S History. His
story is so wild that it was the
basis for two featured films.
● Breached Security of Digital
Equipment Corporation’s
network,National defense
warning system and has
stolen several credit cards.
● Ending with a 5-year prison
sentence he became a
consultant and public
speaker for computer
security
5. ● Albert Gonzalez
Collected over 170 million
credit card and ATM card
numbers over a period of 2
years. Yep. That’s equal to a
little over half the population
of the United States.
● Gonzalez started off as the
leader of a hacker group
known as ShadowCrew
● Gonzalez was sentenced to
prison for 20 years
Famous Hackers in History
6. ● Kevin Poulsen
Known as Dark Dante. He
hacked a radio station’s
phone lines and fixed himself
as the winning caller
● He then earned his way onto
the FBI’s wanted list when he
hacked into federal systems
and stole wiretap information.
He was later captured in a
supermarket and sentenced
to 51 months in prison, as
well paying $56,000 in
restitution.
Famous Hackers in History
7. The Hackers Attitude
● The world is full of fascinating problems Waiting to be solved
Being a hacker is lots of fun but it is the fun that takes lots of effort
The Effort takes motivation. To be a hacker you to get a basic thrill
From solving problems.
● Hackers (or Creative people) should never be bored. Becoming a
hacker will take intelligence, practice, dedication and hardwork.
8. Basic Hacking skills
● Study C/C++/Assembly Language
● Study Operating system
● Study Computer Networks
● Examine hacking tools for a month
● Think about the problems of computer
● Learn how internet is working
● Learn how websites are working
● Practice your skills
● Learn how to use World wide web and write HTML
9. Types Of Hackers
● White Hat Hacker
If a white hat hacker finds a fault in a security system ie. a
website then they will inform the owner immediately
● Black Hat Hacker
A black hat hacker if they find a fault will immediately exploit the
site for there own beneficial gain
● Grey Hat Hacker
Grey hat hacker finds a fault he will do what he feels like at the
time ie, exploiting the site OR informing the owner
10. Information Needed By A Hacker
● Domain Name
● Ip Address
● Operating system and Version Number
● Open Ports
● Services Running
● Knowledge of Firewall and IDS
● Vulnerabilities
● System Admin Name/Contact
● Whois database
● Exploit database or extreme knowledge
11. Why Do Hackers Hack?
● Just for fun
● Show off
● Hacks other systems secretly
● Steal important information
● Destroys Enemies computer networks during the War
12. Why can't Defend against hackers
● There are many unknown security holes
● Hackers need to know only one security hole to hack the target
system
● Admin needs to know all security holes to defend the system
13. Intrusion Techniques
● Physical Intrusion
Physical access to the machine
● System Intrusion
Also known as Privilege Escalation
● Remote Intrusion
Penetrate a system remotely across the network
14. Possible Vulnerabilities
● Software Bugs
Software always has bugs. System administrators and
programmers can never track down and eliminate all possible
software vulnerabilities, and attackers have only to find one hole
in order to break in.
15. Major Software Bugs
● Buffer Overflows
Hackers will examine every place the program has input and try to
overflow it with randomdata. If the program crashes, there is a good
chance that carefully constructed input will allow the attacker to gain
access.
● SQL Injection
An attacker executes unauthorized SQL commands through an input
field on a website by entering extra characters.
16. Major Software Bugs
● Running unnecessary services
● Poor system Administrator practices
● Password Cracking
● Directory Attack
● Brute Force Attacks
● Clear Text Sniffing
● Encrypted sniffing
● Password File stealing
● Social Engineering
● Key logging
17. Major Software Bugs
● Danial of Service Attack
● Web browser Attacks
● DNS Poisoning
● Cross site scripting
● Local file inclusion
● Remote File inclusion
● Xpath Injection
● CSRF
● Authentication Bypassing
● Remote Command Execution
● Remote Code Execution
18. Major Software Bugs
● Trojans
● Payloads
● ARP Poisoning
● Domain name Hijacking
● DNS cache Poisoning
● LDAP Injection
● Connection String Injection
● Resource Injection
19. WANT TO LEARN ABOUT
SECURITY ??
VIST WwW.MADLEETS.CoM