hacking

36
HACKING

Upload: dianna-marie-manalo

Post on 17-Jul-2015

54 views

Category:

Internet


0 download

TRANSCRIPT

HACKING

GROUP MEMBERS

Dianna Marie B. Manalo Apol MagbuhosLenie Aniel Deborah Anna Perez Kim Ralph Perez Glenn Perez Marco Paolo Aclan Neil Ian BagsicChristian Recto

OverviewIs hacking a crime?What is Hacking?History of HackingTypes of HackingTypes of HackerSkill levels of HackingCommon Hacking ApproachWhy do people hack?Ethical HackingSome Famous Hacker

Is Hacking a crime?

Is hacking a crime??

NO NO NO..NOT AT ALL…….

Hacking is

NOT

a

CRIME

What is Hacking?

Process of attempting to gain or sucessfully gaining,unauthorized acess to computer resources for the purpose of help to a secure system.

A technique in which any one can access any one's computer without his permission.

History of Hacking

The first hacker appeared in 1960's at the Massachusetts Institute Of Technology(MIT)

During the 1970's, a different kind of hacker appeared: Phone Phreaker or Phone Hacker

In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared

During the 1990’s, when the use of internet widespread around the world, hackers multiplied

Types of Hacking

Website HackingEmail HackingNetwork HackingPassword HackingOnline Banking HackingComputer Hacking

Website Hacking

hacking a website means taking control from the website owner to a person who hacks the website

The hacker will get the username and password and the hacker will use that website for any purpose which may sometimes to destroy some valuable information or even reputation.

Email Hacking

Email Hacking is taking access to an email account or email correspondence

Email may be protected by methods such as a strong password, encryption of the contents or a digital signatture. An email disclaimer may be used to warn an authorized readers but these are thought to be ineffective

Network Hacking

generally means gathering information about domain by using tools like Telnet, NslookUp,Ping,Tracent,etc... over the network

3 common methods of hacking a wireless networkSniffingSpoofingEncryption Cracking

Password Hacking

the process of recovering secret password from data that has been stored in or transmitted by a computer system.

Techniques Rat and KeyloggersGuessingSocial EngineeringBrute ForcePhishingRainbow Table

Password Hacking(cont.)

Rat and Keyloggers In keylogging or RATing the

hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.

Password Hacking(cont.)

GuessingThis seems silly but this

can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess your password. Hacker can also use combination of Social Engineering and Guessing to acquire your password

Password Hacking(cont.)

Social EngineeringSocial engineering is process of manipulating

someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.

Password Hacking(cont.)

Brute ForceAny password can be

cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.

Password Hacking(cont.)

PhishingPhishing is the most

easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.

Password Hacking(cont.)

Rainbow TableA Rainbow table is a huge pre-computed list of

hashes for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm such as md5 and is transformed into something which is not recognizable. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. A very commonly used hashing algorithm to store passwords in website databases is MD5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords.

Online Banking Hacking

Unauthorized accessing bank accounts without knowing the password or without permission of account holder

A bank account can be access in many ways. When someone gts access to your account that person can take all your funds without your knowledge

Online Banking Hacking(cont.)

Here are 5 siple tips that will help to protect your Online Account

Use Strong AccountProtect your Computer Keep an eye on running process Download with care Be careful whenusing unprotected public

networks

Computer Hacking

Computer Hacking is when files on your computer are viewed, created or edited without you authorization

People can gain complete access to your computer from anywhere in the world if your computer is turned on,unprotected and has an internet connection. What they do, is up to them.

Hacker is a word that has twomeanings:

Traditionally, a Hacker isthe very inteligent person who is using

his knowledge in constructive manner to secure system and never damage data

....Recently, Hacker has taken on a new

meaning — someone who maliciously breaks into systems for

personal gain. Technically, thesecriminals & are known as Crackers.

Types of Hacker

White Hat Hackers• Good guys

• Don’t use their skill for illegal purpose

• Computer security experts and help to protect from Black Hats.

Black Hat HackersBad GuysUse their skill

maliciously for personal gain

Hack banks, steal credit cards and defaces websites

Types of Hacker (cont.)

Types of Hacker (cont.)

Grey Hat HackersIt is a

combination a of white hat hackers and Black Hat Hackers

Types of Hackers (cont.)

NEOPHYTE (NEWBIE, NOOB)Someone who's new in hacking/ phreaking

HACKTIVIST uses technology to publicize a social

ideological message

EX:Cyber Terrorist, Freedom of Information

COMMON HACKING APPROACH

SYSTEM ENUMERATIONDISCOVERING INFORMATION ABOUT THE

TARGET

VULNERABILITY ANALYSIS IDENTIFYING POTENTIAL WAYS TO ATTACK

EXPLOITATION- COMPROMISING THE SYSTEM BY EMPLOYING THE VULNERABILITIES FOUND

SKILL LEVELS OF HACKING

• ELLITE HACKERS- HIGHEST LEVEL

• TECHNICIAN CLASS - "TOOL DEPENDENT"

• SCRYPT SKIDDIES- LOWEST LEVEL HACKERS

WHY DO PEOPLE HACK?

• TO ACQUIRE DATA

• TO IMPERSONATE

• TO DESTROY DATA

• JUST FOR FUN ^_^

What is Ethical Hacking??

Ethical Hacking is testing the resources for a good cause and for the

betterment of technology.Technically Ethical Hacking means penetrationtesting which is focused on Securing and Protecting IT Systems.

Some Famous Hacker

Kevin MitnickAt age 15, he used social

engineering and dumpster diving to bypass the punch card system used in the Los Angeles bus system.

Social engineering became his primary method of obtaining information, including user-names and passwords and modem phone numbers

he was the most-wanted computer criminal in the United States.

Some Famous Hacker(cont.)

Johan Helsinguis born in 1961 in Helsinki, Finland,

started and ran the Anon.penet.fi internet remailer.

Anon.penet.fi was one of the most popular Internet remailers, handling 10,000 messages a day. The server was the first of its kind to use a password-protected PO box system for sending and receiving e-mails. In the 1980s, he was the system administrator for the central Finnish news node as well as one of the founding members of the Finnish UNIX User Group.

Some Famous Hacker(cont.)

Linus Torvalds a Finnish American software

engineer, he was the principal force behind the development of the Linux kernel that became the most popular kernel for operating systems.

He later became the chief architect of the Linux kernel and now acts as the project's coordinator.

He also created the revision control system Git as well as the diving log software Subsurface. He was honored, along with Shinya Yamanaka, with the 2012 Millennium Technology Prize by the Technology Academy Finland "in recognition of his creation of a new open source operating system for computers leading to the widely used Linux kernel".

Some Famous Hacker(cont.)

Mark Abene Mark Abene was one of the

most notorious phone hackers. His hacker handle was Phiber Optik. His preferred hacking activity was breaking into telephone systems using a normal phone receiver.

Mark was a member of the Legion of Doom hacker group, and then founded the hacker group Masters of Deception (MOD). When the AT&T telephone system crashed in 1990, he was blamed and raided by the Secret Service, but the crash later turned out be caused by a computer bug.

Some Famous Hacker(cont.)

Robbert Morris He is best known for creating the

Morris Worm in 1988, considered the first computer worm on the Internet, and for companies he has founded.

Morris was prosecuted for releasing the worm, and became the first person convicted under the new Computer Fraud and Abuse Act.

He went on to co-found the online store Viaweb, one of the first web-based applications

He later joined the faculty in the department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, where he received tenure in 2006.