Beruflich Dokumente
Kultur Dokumente
http://
http://
HACKER
CONTENT
Overview of Hacking
Why do hackers hack?
Types of Hacker
Level of Hackers
Hackers language
Ethical Hacking Process
How can protect the system?
What should do after hacked?
Final words
OVERVIEW OF HACKING
It is Legal
HACKING VS CRACKING
Hacker
The person who hack
Cracker
System intruder/destroyer
disastrous.
Cracking yield more devastating results.
Cracking is crime.
Cyber crime are the results of cracking ,not hacking
TH E G R EAT H A C K ER W A R
Kevin Mitnick The most famous, and
undoubtedly most gifted hacker in history,
made a name for himself in 1981 at the
tender age of 17 by getting into a phone
exchange, which allowed him to redirect
subscriber calls in any way he wanted. In
1983, he achieved his first major coup and also his first arrest - when he
accessed a Pentagon computer. It was his
repeated offenses that made him a target
of the FBI. He was sentenced to five years
in prison in the 1990s, but today he is a
security consultant and owns his own
company: Mitnick Security.
John Draper known as "Cap'n Crunch",
Draper was one of the first hackers in
history. This moniker comes from the
cereal of the same name, inside of which
he once discovered a toy whistle (provided
as a gift to entice children to ask parents
for the cereal). He discovered that he
could use the whistle to hack a telephone
line and get free phone calls - all that was
necessary was to produce a precise tone in
the receiver for the method to work. He
was arrested in 1976 and sentenced to two
months in prison.
Show off
information
system
Trusted person
TY P ES O F H A C K ER
BLACK
HAT
HACKER
WHITE
HAT
HACKE
R
GRAY
HAT
HACKE
R
LABEL OF HACKER
CODER
SCRIPT
ADMIN
KIDDIN
G
H A C K ER S LA N G U A G E
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or
|\| -> n
|\/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
H A C K ER S LA N G U A G E
TR A N S LATIO N
EXAMPLE:Hacking is good
H4ck||\|g 1$ 900d
HACKING - PROCESS
Foot Printing
Scanning
Gaining Access
Maintaining Access
FOOT PRINTING
Whois Lookup
NS lookup
IP Lookup
SCANNING
Port scanning
Network scanning
Finger Printing
Fire walking
SCANNING
GAINING ACCESS
Password Attacks
Social Engineering
Viruses
MAINTAINING ACCESS
Os BackDoors
Trojans
Clearing tracks
ADVANTAGES &
DISADVANTAGES
Advantages
Provides security to banking and financial
establishments
Prevents website defacements
An evolving technique
To catch a thief you have to think like a thief
Disadvantages
All depends upon the trustworthiness of the
ethical hacker
Hiring professionals is expensive.
H 4C K IN G P R O N E A R EA S
H A C K IN G G R O W TH R ATE
P LEA S E G IV E YO U R S U G G ES TIO N S A N D
FEED B A C K S
A N Y Q U ES TIO N ?
TH A N K YO U
http://