Top Banner
GOOD AFTERNOON
28

my new HACKING

Apr 13, 2017

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: my new HACKING

GOOD AFTERNOON

Page 2: my new HACKING

A

PRESENTATION ON

HACKING BY OLANREWAJU GEORGE BABATUNDE

Page 3: my new HACKING

OUTLINE:

WHAT IS HACKING?WHO IS AN HACKER?

HISTORY OF HACKINGTYPES OF HACKING HACKING TECHNIQUESHACKING TOOLS

WHAT CAN BE HACKED?CERTIFICATIONS IN HACKING

HOW HACKING ATTACK WORKSEFFECTS OF HACKING

PREVENTION AND DETECTION OF HACKING

CONCLUSION

Page 4: my new HACKING

Hacking is an activity that is engaged in by people who use their knowledge of the internet, computers, firewalls and security preferences to break into other people's computers, allowing them to view private information, alter data and steal files, information or programs.

In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems.

WHAT IS HACKING

Page 5: my new HACKING

WHO IS AN HACKER

In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. A hacker is an individual that attempts to take control over someone else's computer by using viruses, worms, and other types of Internet attacks.

Page 6: my new HACKING

DAWN OF HACKING

M.I.T. engineers in the 1960s first popularized the term and concept of HACKING. The so-called "hacks" perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities.

Page 7: my new HACKING

Password cracking: The process of recovering passwords from data that has been stored in or transmitted by a computer system.

Spoofing attack (Phishing):One program or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user .

Rootkit: A Rootkit is designed to conceal the compromise of a computer's security.

TYPES OF HACKING

Page 8: my new HACKING

Trojan horses: A program which seems to be doing one thing, but is actually doing another. A Trojan horse can be used to set up a backdoor

Viruses: A self-replicating program that spreads by inserting copies of itself into other executable code or documents .Some viruses are considered malicious.

Worms: A worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention.

TYPES OF HACKING CONT’D

Page 9: my new HACKING

LEGAL HACKERS

ILLEGAL HACKERS

TYPES OF HACKERS

Page 10: my new HACKING

TYPES OF HACKERS LEGAL HACKERS

White hatBreaks security for non-malicious reasons, for instance testing their own security system. Also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. Often, this type of 'white hat' hacker is called an ETHICAL HACKER.

Page 11: my new HACKING

TYPES OF HACKERS ILLEGAL HACKERS

Black hatBreak into secure networks to destroy data or make the network unusable for those who are authorized to use the network.

Script kiddieA non-expert who breaks into computer systems by using pre-packaged automated tools written by others.

Elite hackerA social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers.

Page 12: my new HACKING

SOURCE:NELLY DAY, www.ehow.com

August 2012

Page 13: my new HACKING

HACKING TECHNIQUES

DENIAL of SERVICE (DoS)Give hackers a way to bring down a network without gaining internal access by flooding the access routers with bogus traffic causing the network to slow down or shut down . Using a third party (Transmission Control Protocol(TCP) or packets).

SOCIAL ENGINEERING Is the act of manipulation and the skill of exploiting human weakness, into performing actions or divulging confidential information rather than by using technical cracking techniques

Page 14: my new HACKING

Dictionary attack A dictionary file is loaded into a cracking application which is run against user accounts located by the application.

Hybrid attack Add numbers or symbols to the filename to crack a password. Many people change their passwords by simply adding a number to the end of their current password

Brute force attack A comprehensive form of attack, often take a long time to work depending on the complexity of the password.

HACKING TECHNIQUES

Page 15: my new HACKING

SOURCE:NELLY DAY, www.ehow.com

Page 16: my new HACKING

N map:(Network Mapper) A tool designed to rapidly scan large networks, uses raw IP packets in novel ways to determine what hosts are available on the network

Cain and Abel: A password recovery tool. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords.

Key loggers: A tool designed to record every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine

HACKING TOOLS

Page 17: my new HACKING

WHAT CAN BE HACKED

Basically anything can be hacked as long as it has vulnerabilities examples include;NetworksServers Personal computersATM’SDispenser machinesWebsitesMobile phonesGovernmentOrganizations….etc.

Page 18: my new HACKING

CEH CertificationA CERTIFIED ETHICAL HACKER is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker .To achieve the Certified Ethical Hacker Certification, you must pass the CEH exam 312-50

CHFI CertificationCOMPUTER HACKING FORENSIC INVESTIGATION is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. The CHFI certification is awarded after successfully passing the exam EC0 312-49.

INTERNATIONAL COUNCIL OF ELECTRONIC COMMERCE CONSULTANTS(ICECC)

CERTIFICATIONS IN HACKING

Page 19: my new HACKING

HACKING IN ORGANISATIONS m

cmaster.ca

Page 20: my new HACKING

SOURCE:NELLY DAY, www.ehow.com

Page 21: my new HACKING

HOW HACKING ATTACK WORKS

The first thing an hacker does on gaining access to you is to install a Rootkit to facilitate durable influence on your system . Using these to create new accounts or networks. Then he tries to obscure his presence, surveys the network then tries to carry out his devious act. He then creates a backdoor he can always use to have access to your system. The hacker may use a third party to hack into you .

Page 22: my new HACKING

BOTNETWORK

Page 23: my new HACKING

EFFECTS OF HACKING

Denial of Service (DoS)ExploitationSales LossesDefacement (websites)Data LossRemote File ExecutionNetwork TrafficLoss of ControlAdditional Cost Fraud…. etc.

Page 24: my new HACKING
Page 25: my new HACKING

PREVENTION AND DETECTION OF HACKING

SECURITY AWARENESSIs the knowledge and attitude members of an organization possess regarding the protection of the physical and especially information asset of the organization. These include the following:Physical security Desktop security Networks security(Cyber security)Password securityAntivirusesAntispyware'sE-mail securityFirewall

Page 26: my new HACKING

Security software called intrusion detection systems may be used in computers to detect unusual and suspicious activity and, in some cases, stop a variety of harmful actions by authorized or unauthorized persons. Abuse and misuse of sensitive system and application programs and data such as password, inventory, financial, engineering, and personnel files can be detected by these systems. Microsoft®Encarta®2009.©

INTRUSION DETECTION SYSTEMS

Page 27: my new HACKING

CONCLUSION

The question therefore is, is Hacking a crime?From the afore discussion its obvious hacking(illegal hacking) is a CRIME.Hacking can be prevented or minimized if proper security measures and computer ethics are adhered to.Therefore be careful not to get hacked because this can be detrimental.

Page 28: my new HACKING

Thank you