Sie sind auf Seite 1von 21

GROUP 4

Hackers & Crackers

Wildan Fauzie Akbar


Muchammad Iqbal Saepulhaq
Arief Yuniarto

Agenda

Hackers and their vocabulary


Threats and risks
Types of hackers
Difference of Hacker and Cracker
Gaining access
Intrusion detection and prevention
Legal issues

What is Hacking?
Hacking refers to an array of activities which are done to
intrude some one elses personal information space so as to
use it for malicious, unwanted purposes.
Hacking is a term used to refer to activities aimed at
exploiting security flaws to obtain critical information for
gaining access to secured networks.

Hacker Terms
Hacking - showing computer expertise
Cracking - breaching security on software or systems
Phreaking - cracking telecom networks
Spoofing - faking the originating IP address in a
datagram
Denial of Service (DoS) - flooding a host with sufficient
network traffic so that it cant respond anymore
Port Scanning - searching for vulnerabilities

Hacking through the ages

1969 - Unix hacked together


1971 - Cap n Crunch phone exploit discovered
1988 - Morris Internet worm crashes 6,000 servers
1994 - $10 million transferred from CitiBank accounts
1995 - Kevin Mitnick sentenced to 5 years in jail
2000 - Major websites succumb to DDoS
2000 - 15,700 credit and debit card numbers stolen from Western Union
(hacked while web database was undergoing maintenance)
2001 Code Red
o exploited bug in MS IIS to penetrate & spread
o probes random IPs for systems running IIS
o had trigger time for denial-of-service attack
o 2nd wave infected 360000 servers in 14 hours
Code Red 2 - had backdoor installed to allow remote control
Nimda -used multiple infection mechanisms email, shares, web client,
IIS
2002 Slammer Worm brings web to its knees by attacking MS SQL
Server

The threats
Denial of Service (Yahoo, eBay, CNN, MS)
Defacing, Graffiti, Slander, Reputation
Loss of data (destruction, theft)
Divulging private information (AirMiles, corporate
espionage, personal financial)
Loss of financial assets (CitiBank)

Types of hackers
Professional hackers
o Black Hats the Bad Guys
o White Hats Professional Security Experts

Script kiddies
o Mostly kids/students
User tools created by black hats,
o To get free stuff
o Impress their peers
o Not get caught

Underemployed Adult Hackers


o Former Script Kiddies
Cant get employment in the field
Want recognition in hacker community
Big in eastern european countries

Types of Hackers

Criminal Hackers
o Real criminals, are in it for whatever they can get no matter
who it hurts
Corporate Spies
o Are relatively rare
Disgruntled Employees
o Most dangerous to an enterprise as they are insiders
o Since many companies subcontract their network services a
disgruntled vendor could be very dangerous to the host
enterprise
Ideological Hackers
o hack as a mechanism to promote some political or
ideological purpose
o Usually coincide with political events

Difference of Hacker &


Cracker
Hacker
Hacker have skill to analyzing the security of system
Hacker have ethics and creativity
Hacker may share her/his knowladge to the other.
Cracker
Cracker makes program just for interest and usually
have destroy effect, to find profit.

Gaining access
Front door
o Password guessing
o Password/key stealing

Back doors
o Often left by original developers as debug and/or
diagnostic tools
o Forgot to remove before release

Trojan Horses
o Usually hidden inside of software

Software vulnerability exploitation


o Crack and Keygen

Software vulnerability
exploitation

Buffer overruns
HTML / CGI scripts
Javascript hacks
Other holes / bugs in software and services
Tools and scripts used to scan ports for vulnerabilities

Password guessing

Default or null passwords


Password same as user name (use finger)
Password files, trusted servers
Brute force

Password/key theft
Dumpster diving
o Its amazing what people throw in the trash
Personal information
Passwords

o Many enterprises now shred all white paper


trash

Inside jobs
o Disgruntled employees
o Terminated employees (about 50% of
intrusions resulting in significant loss)

Once inside, the hacker


can...
Modify logs

o To cover their tracks


o To mess with you

Steal files

o Sometimes destroy after stealing


o A pro would steal and cover their tracks so to be
undetected

Modify files

o To let you know they were there


o To cause mischief

Install back doors

o So they can get in again

Attack other systems

Intrusion prevention

Patches and upgrades (hardening)


Disabling unnecessary software
Firewalls and Intrusion Detection Systems
Honeypots
Recognizing and reacting to port scanning

Risk management

Port scanner example

Computer Crimes

Financial Fraud
Credit Card Theft
Identity Theft
Computer specific crimes

o Denial-of-service
o Denial of access to information
o Viruses Melissa virus cost New Jersey man 20 months in jail
Melissa caused in excess of $80 Million

Intellectual Property Offenses


o
o
o
o
o

Information theft
Trafficking in pirated information
Storing pirated information
Compromising information
Destroying information

Content related Offenses


o Hate crimes
o Harrassment
o Cyber-stalking

Child privacy

Top intrusion justifications


Im doing you a favor pointing out your
vulnerabilities
Im making a political statement (?)

Because I can
Because Im paid to do it

Legal Recourse
Average armed robber will get $2500-$7500 and risk being
shot or killed; 50-60% will get caught , convicted and spent
an average of 5 years of hard time
Average computer criminal will net $50K-$500K with a risk
of being fired or going to jail; only 10% are caught, of
those only 15% will be turned in to authorities; less than 50%
of them will do jail time
Prosecution
o Many institutions fail to prosecute for fear of advertising
Many banks absorb the losses fearing that they
would lose more if their customers found out and
took their business elsewhere
Fix the vulnerability and continue on with business as usual

Coclusion
Some hacker not always the bad boy/man. Many
hacker is need into business for analyzing a
weekness of security system
Many way to pass the security system, so we have
keep our data
Cracker may have a bad purpose because he just
make provit to him self.