Theme:
Hacking today
S T UDENT O F T HE T I R - 3 6 G R O U P
Contents
Who is a Hacker?
Tips of Hacheries.
Hacker Terms
Hacking through the ages
Types of Hackers
The most famous hackers
Top 15 Tips To Protect Yourself From Hackers
Who is a Hacker?
• A hacker is an individual who uses computer,
networking or other skills to overcome a technical
problem. The term hacker may refer to anyone with
technical skills, but it often refers to a person who
uses his or her abilities to gain unauthorized access
to systems or networks in order to commit crimes.
A hacker may, for example, steal information to hurt
people via identity theft, damage or bring down
systems and, often, hold those systems hostage to
collect ransom.
Who is a Hacker?
• The term hacker has historically been a divisive one, sometimes
being used as a term of admiration for an individual who exhibits a
high degree of skill, as well as creativity in his or her approach to
technical problems. However, the term is more commonly applied
to an individual who uses this skill for illegal or unethical purposes.
Types of hackers
• The security community has informally used references to hat color as a way
different types of hacker are identified, usually divided into three types:
white hat, black hat and gray hat
Who are “white hat hackers?”
• White hat hackers, also known as ethical hackers,
strive to operate in the public's best interest, rather
than to create turmoil. Many white hat hackers work
doing penetration testing, hired to attempt to break
into the company's networks to find and report on
security vulnerabilities. The security firms then help
their customers mitigate security issues before
criminal hackers can exploit them.
Who are “black hat hackers?”
• Black hat hackers intentionally gain unauthorized access to
networks and systems with malicious intent, whether to
steal data, spread malware or profit from ransomware,
vandalize or otherwise damage systems or for any other
reason -- including gaining notoriety. Black hat hackers are
criminals by definition because they violate laws against
accessing systems without authorization, but they may also
engage in other illegal activity, including identity theft and
distributed denial-of-service attacks.
Who are “gray hat hackers?”
• Gray hat hackers fall somewhere between white hat hackers and
black hat hackers. While their motives may be similar to those of
white hat hackers, gray hats are more likely than white hat hackers
to access systems without authorization; at the same time, they are
more likely than black hat hackers to avoid doing unnecessary
damage to the systems they hack. Although they aren't typically --
or only -- motivated by money, gray hat hackers may offer to fix
vulnerabilities they have discovered through their own,
unauthorized, activities rather than using their knowledge to exploit
vulnerabilities for illegal profit.
Hacker Terms
• Hacking - showing computer expertise
• Cracking - breaching security on software or systems
• Phreaking - cracking telecom networks
• Spoofing - faking the originating IP address in a
datagram
• Denial of Service (DoS) - flooding a host with sufficient
network traffic so that it can’t respond anymore
• Port Scanning - searching for vulnerabilities
Hacking through the ages
1 9 6 9 - UNIX ‘ HACK E D ’ TO G E T HE R
1 9 71 - CA P ‘ N CR UNCH P HO NE E X P LO IT D I S COVE RE D
1 9 8 8 - MO R R IS INT E R NET WO R M CR A S HE S 6 , 0 0 0 S E R VE R S
1 9 9 4 - $ 1 0 MIL L ION T R A NS F E R RE D F R O M CI T I B A NK ACCO U NT S
1 9 9 5 - K E VI N MI T NICK SENT ENCED TO 5 YEAR S IN J AIL
20 0 0 - MA J O R WE B S I T ES S U CCU MB TO D D O S
20 0 0 - 1 5,70 0 CR E DIT A ND D E B I T CA R D NU MB ER S S TO L E N F R O M WE S T E RN U NIO N
(HACK E D WHIL E WE B D ATA B A S E WA S U NDER GO ING MA I NT E NA NCE)
20 0 1 CO DE R E D
exploited bug in MS IIS to penetrate & spread
probes random IPs for systems running IIS
had trigger time for denial-of-service attack
2nd wave infected 360000 servers in 14 hours
CODE R E D 2 - HA D BACKDOOR INSTALLED TO ALLOW R EMOT E CONT R OL
NIMDA - U SED MU LTIPLE INFECT ION MECHANISMS EMAIL, SHAR ES, WEB CLIENT, I I S
20 02 – SL A MME R WO R M B R I NG S WE B TO I T S K NE E S B Y AT TACK I NG MS S QL
S E R VE R
Types of Hackers
• Criminal Hackers
• Real criminals, are in it for whatever they can get no matter who it
hurts
• Corporate Spies
• Are relatively rare
• Disgruntled Employees
• Most dangerous to an enterprise as they are “insiders”
• Since many companies subcontract their network services a
disgruntled vendor could be very dangerous to the host enterprise
The most famous hackers
But any medal has its two sides, the same situation with
computers and the Internet. If there are some means to
facilitate our lives, then there is someone who wants to
illegally use other people’s data. Such people are called
“hackers”. About them films are shot, after them special
services are chased. Meanwhile, the names of the ten
most famous hackers in history are already known. In
many ways, they have one thing in common: they all
have been caught by the authorities.
The most famous hackers
Kevin Mitnick Kevin Poulsen Adrian Lamo
Vladimir Levin Fred Cohen Mark Aben
Top 15 Tips To Protect Yourself From Hackers
Step 1. Use Strong Passwords Step 8: Use a Really Good Firewall
Step 2: Use Two-Factor Authentication Step 9. Make Your Phone’s Lock Code More Secure
Step 3: Never Click on Suspicious Links Step 10. Look Out for Social Engineering Attacks
Step 4: Do Not Use P2P File Sharing Networks Step 11. Lock Down Your Wireless Router
Step 5: Keep Your System & Apps Updated Step 12. Don’t Use Public Wi-Fi Without A VPN
Step 6: Use Antivirus Products & Keep Them Up to Date Step 13. Be careful while using thumb drive
Step 7: Do Not Use Adobe Flash Step 14. Try not to use public computers
Step 15. Clear your browser history
THE END