Post on 18-Aug-2015
transcript
CONTENT
• Overview of Hacking
•Why do hackers hack?
• Types of Hacker
• Level of Hackers
• Hackers language
• Ethical Hacking – Process
• How can protect the system?
•What should do after hacked?
• Final words
OVERVIEW OF HACKING
It is Legal
Permission is obtained from the target
Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
Also Called – Attack & Penetration Testing.
HACKING VS CRACKING
• Hacker• The person who hack
• Cracker• System intruder/destroyer
HACKING WITH MALICIOUS INTENTION IS CRACKING
The basic difference is hackers do not do anything disastrous.
Cracking yield more devastating results.
Cracking is crime.
Cyber crime are the results of cracking ,not hacking
WHY DO PEOPLE HACK??
• To make security stronger ( Ethical Hacking )
• Just for fun
• Show off
• Hack other systems secretly & Steal important information
WHAT ARE THE VARIOUS QUALITIES A HACKER SHOULD
POSSES
• Good coder
• well knowledgeable person both hardware as well as software
• Should have knowledge on security system
Trusted person
HACKERS LANGUAGE
1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or
|\| -> n
|\/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x
ADVANTAGES & DISADVANTAGES
Advantages
• Provides security to banking and financial establishments
• Prevents website defacements
• An evolving technique
• To catch a thief you have to think like a thief
Disadvantages
• All depends upon the trustworthiness of the ethical hacker
• Hiring professionals is expensive.
HOW CAN WE PROTECT THE SYSTEM?
Patch security hole often
Encrypt important data
Ex) pgp, ssh
Do not run unused daemon
Remove unused program
Setup loghost
• Backup the system often
Setup firewall
Setup IDS
Ex) snort
WHAT SHOULD DO AFTER HACKED?
• Shutdown the system
• Or turn off the system
• Separate the system from network
• Restore the system with the backup
• Or reinstall all programs
• Connect the system to the network