+ All Categories
Home > Technology > Professional Hackers

Professional Hackers

Date post: 09-May-2015
Category:
Upload: jim-geovedi
View: 5,333 times
Download: 1 times
Share this document with a friend
Description:
Presented at IDSECCONF2009
23
jim geovedi information security troublemaker, professional script kiddy professional hackers
Transcript
Page 1: Professional Hackers

jim geovediinformation security troublemaker, professional script kiddy

professional hackers

Page 2: Professional Hackers

hackers

Page 3: Professional Hackers

are hackers getting paid now, like a pro?

Page 4: Professional Hackers

professional hackers

Page 5: Professional Hackers

corporate hackers

Page 6: Professional Hackers

corporate hackers

programmer

deals with programming operating systems or applications

Page 7: Professional Hackers

corporate hackers

administrator

responsible for running special equipment or whole infrastructures

Page 8: Professional Hackers

corporate hackers

operator

sitting in front of a monitor (or several) all days and evaluating output of logs and system messages

Page 9: Professional Hackers

corporate hackers

security officer

writing the security policies and procedures for the company

decides what to do when security incident is happening

defining security and access roles

Page 10: Professional Hackers

corporate hackers

it auditor

independent organ within the organisation which ensures the adequateness of it controls

Page 11: Professional Hackers

corporate hackers

consultant

works for a consultant company (general consultant companies, it consultant companies, or it security companies)

Page 12: Professional Hackers

corporate hackers

hacker

check security of networks, review source code, etc.

hired to show to customers or press the company employ cool person

Page 13: Professional Hackers

independent hackers

Page 14: Professional Hackers

independent hackers

operating system/software hacker

develop and improve system based on personal interest

Page 15: Professional Hackers

independent hackers

intrusion specialist

concentrate primarily on how to break-in the system or network

Page 16: Professional Hackers

independent hackers

vulnerability researcher

discovering the vulnerability and how to take advantage of it

Page 17: Professional Hackers

independent hackers

botnet owner

take control of thousands of hosts

rent the botnet for ddos, anonymous proxy, spam, phising etc.

Page 18: Professional Hackers

independent hackers

rootkit/trojan/virus writer

sometime work together with intrusion specialists and botnet owner

Page 19: Professional Hackers

independent hackers

spammer/fraudster

intend to result in financial or personal gain

Page 20: Professional Hackers

local hacking scene

Page 21: Professional Hackers

how many professional hackers in indonesia?

a question of ethics: hackers behaviour

real hackers vs. media whores

local hacking scene

Page 22: Professional Hackers

skill development

certification for professional hackers

valuing our own skills

local hacking scene

Page 23: Professional Hackers

fin.


Recommended