+ All Categories

Hacker

Date post: 19-May-2015
Category:
Upload: ramasubbu-p
View: 4,796 times
Download: 4 times
Share this document with a friend
Description:
Presentation
Popular Tags:
24
Taeho Oh http://postech.edu/~ohhara [email protected]
Transcript
Page 1: Hacker

Taeho Ohhttp://postech.edu/~ohhara

[email protected]

Page 2: Hacker

Who is hacker? History of hacking Types of hacking Hacking accidents Why do hackers hack? What hackers do after hacking? What do hackers know?

Page 3: Hacker

How can kid hack? Why can’t Korean kid hack? How can be a real hacker? Why can’t defend against hackers? How can protect the system? What should do after hacked?

Page 4: Hacker

How to translate the hackers’ language

Page 5: Hacker

HackCut with repeated irregular blowsExamine something very minutely

HackerThe person who hacks

CrackerSystem intruder/destroyer

Page 6: Hacker

Hacker means cracker nowadaysMeaning has been changed

Page 7: Hacker

Telephone hackingUse telephone freely It’s called phreaking

Computer virusDestroy many computers

Network hackingHack the important server remotely and

destroy/modify/disclose the information

Page 8: Hacker

Normal

data transfer

Interruption Interception

Modification Fabrication

Page 9: Hacker

Internet WormRobert T. Morris made an internet worm. It

spread through the internet and crashed about 6000 systems.

Cuckoo’s EggClifford Stoll caught the hackers who are

the German hackers applied by KGB

Page 10: Hacker

IP SpoofKevin Mitnick was caught by Tsutomu

Shimomura who was security expert. Kevin Mitnick uses the IP Spoof attack in this accident

Page 11: Hacker

Just for fun Show off Hack other systems secretly Notify many people their thought Steal important information Destroy enemy’s computer network

during the war

Page 12: Hacker

Patch security holeThe other hackers can’t intrude

Clear logs and hide themselves Install rootkit ( backdoor )

The hacker who hacked the system can use the system later

It contains trojan ls, ps, and so on

Page 13: Hacker

Install irc related program identd, irc, bitchx, eggdrop, bnc

Install scanner programmscan, sscan, nmap

Install exploit program Install denial of service program Use all of installed programs silently

Page 14: Hacker

Don’t know how to use vi Don’t know what unix is Don’t know what they do Know how to intrude the system Know how to crash the system Know where the hacking programs are

Page 15: Hacker

Kid has much of timeKid can search for longer time than other

people All hacking program is easy to use Kid doesn’t have to know how the

hacking program works These kids are called script kiddies

Page 16: Hacker

Almost all Korean kids don’t know English well

Almost all hacking program manuals are written in EnglishHowever, many hacking program manuals

are being translated

Page 17: Hacker

Study C/C++/assembly language Study computer architecture Study operating system Study computer network Examine the hacking tools for a month Think the problem of the computer

Page 18: Hacker

There are many unknown security hole Hackers need to know only one security

hole to hack the system Admin need to know all security holes to

defend the system

Page 19: Hacker

Patch security hole often Encrypt important data

Ex) pgp, ssh Do not run unused daemon Remove unused setuid/setgid program Setup loghost

Page 20: Hacker

Use switch hub Setup firewall

Ex) ipchains Setup IDS

Ex) snort Check unintentional changes

Ex) tripwire

Page 21: Hacker

Backup the system often

Page 22: Hacker

Shutdown the systemOr turn off the system

Separate the system from network Restore the system with the backup

Or reinstall all programs Connect the system to the network It can be good to call the police

Page 23: Hacker

1 -> i or l3 -> e4 -> a7 -> t9 -> g0 -> o$ -> s| -> i or l

|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x

Page 24: Hacker

Ex)1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s

wh3n 1 h4ck3d 1n

I did not hack this page, it was like this when I hacked in


Recommended