Top Banner
Hacking
23

Hackingpresentation

Jan 21, 2015

Download

Documents

me yu

hi friends , this presentation is about Hacking and types of hackers...

find me on facebook
Mihir Roat
Enjoy...
like or comment

thank you :D
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hackingpresentation

Hacking

Page 2: Hackingpresentation

What I s Hack ing

   Computer hacking is when someone modifies computer hardware or software in a way that alters the creator's original intent.

Page 3: Hackingpresentation

Commun i t i e s o f Hacke r

HackerPhreaksCrackers

Script kiddies

Page 4: Hackingpresentation

• Hackers are Intelligent Computer Professionals.

• Motive/Intent –• To gain in-depth knowledge of a system,

what’s happening at the backend, behind the screen.

• To find possible security vulnerabilities in a system.

• They create security awareness by sharing knowledge. It’s a team work.

Hacker?

Page 5: Hackingpresentation

Types of Hacker

Page 6: Hackingpresentation

Types of Hacker

Whi te Ha t

• A white hat is the hero or good guy, especially in computing slang, where it refers to an ethical hacker or Penetration tester who focuses on securing and protecting IT systems.

• White Hat Hackers, also known as Ethical Hackers

Page 7: Hackingpresentation

Types of Hacker

B l a c k H a t

• A black hat is the villain or bad guy. It refers to a hacker that breaks into networks or computers, or creates computer viruses. Black Hat Hackers (also called "crackers") who are specialized in unauthorized penetration of information systems.

• They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause.

Page 8: Hackingpresentation

Types o f Hacker

Grey Hat• A grey hat, in the hacking community,

refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not.

• They are a hybrid between white and black hat hackers.

• They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit crimes during the course of their technological

Page 9: Hackingpresentation

Fa m o u s H a c ke r s i n H i s t o r y

Ian Murphy Kevin Mitnick Johan Helsinguis

Mark AbeneLinus Torvalds Robert Morris

Page 10: Hackingpresentation

• An Individuals who break into computers with malicious intent.

• Motive/Intent –• To seek unauthorized access into a

system and cause damage or destroy or reveal confidential information.

• To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge.

• Effects- Can cause financial losses & image/reputation damages,

defamation in the society for individuals or organizations

Crackers /At tackers

Page 11: Hackingpresentation

Phreaks?

• Phreaks – These are persons who use computer devices and software to break into phone networks.

• Motive/Intention- To find loopholes in security in phone network and to make phone calls at free of cost!!!

• Effects- You may have to big amount of phone bills, for doing nothing!!!

Page 12: Hackingpresentation

Scr ip t K idd ies

• Script Kiddies – These are persons not having technical skills to hack computers.

• Motive/Intention- They use the available information about known

• vulnerabilities to break into remote systems.

• It’s an act performed for a fun or out of curiosity.

Page 13: Hackingpresentation

Mal ic ious Hacker St ra teg ies

Reconnaissance

Scanning

Attack

1

2

3

Page 14: Hackingpresentation

Reconnaissance

Page 15: Hackingpresentation

Sacnn ing

Scanning is the process of finding out open/close ports,vulnerabilities in remote system, server & networks.• Scanning will reveal• IP addresses• Operating systems• Services running on each computer.• Services running on each computer.

Page 16: Hackingpresentation

Types o f Scann ing

• Port Scanning• Network Scanning• Vulnerability Scanning

Page 17: Hackingpresentation

Por t Scann ing

• Port Scanning is one of the most popular technique attacker use todiscover the service they break into.• All machines connected to a LAN or connected to Internet via amodem run many services that listen at well-known and not so wellknownports.• There are 1 to 65535 ports are available in the computer.• By port scanning the attacker finds which ports are available .

Page 18: Hackingpresentation

Network Scann ing

Understand IP Addresses and related information about the computer network systems

Page 19: Hackingpresentation

Vulnerab i l i ty Scann ing

Understand the exiting weakness

Page 20: Hackingpresentation

Top 10 Vu lnerab i l i t ies1. SQL Injection 2. Cross Site Scripting (XSS)3. Malicious File Execution4. Insecure Direct Object Reference5. Cross Site Request Forgery (CSRF)6. Information Leakage and Improper

Error Handling7. Broken Authentication and Session

Management8. Insecure Cryptographic Storage9. Insecure Communications10. Failure to Restrict URL Access

Page 21: Hackingpresentation

Example Of SQL Injection

Page 22: Hackingpresentation
Page 23: Hackingpresentation