Professional Documents
Culture Documents
Seminar 1
Seminar 1
Contents (1)
Who is hacker? History of hacking Types of hacking Hacking accidents Why do hackers hack? What hackers do after hacking? What do hackers know?
Contents (2)
How can kid hack? Why cant Korean kid hack? How can be a real hacker? Why cant defend against hackers? How can protect the system? What should do after hacked?
Contents (3)
How to translate the hackers language
Hacker
The person who hacks
Cracker
System intruder/destroyer
History of hacking
Telephone hacking
Use telephone freely Its called phreaking
Computer virus
Destroy many computers
Network hacking
Hack the important server remotely and destroy/modify/disclose the information
Types of hacking
Normal data transfer
Interruption
Interception
Modification
Fabrication
Cuckoos Egg
Clifford Stoll caught the hackers who are the German hackers applied by KGB
Install exploit program Install denial of service program Use all of installed programs silently
All hacking program is easy to use Kid doesnt have to know how the hacking program works These kids are called script kiddies
Do not run unused daemon Remove unused setuid/setgid program Setup loghost
Setup IDS
Ex) snort
Separate the system from network Restore the system with the backup
Or reinstall all programs
Connect the system to the network It can be good to call the police
I did not hack this page, it was like this when I hacked in