What is hacking

y Hacking is exploring the details of programmable


y Stretching the capabilities of computer systems y Sharing their computer expertise y Can also mean breaking into computer


Who is hacker?
y Hack y Cut with repeated irregular blows y Examine something very minutely y Hacker y The person who hacks y Cracker y System intruder/destroyer

History of hacking
y Telephone hacking y Use telephone freely y It¶s called phreaking y Computer virus y Destroy many computers y Network hacking y Hack the important server remotely and destroy/modify/disclose the information

Hacking accidents
y Internet Worm y Robert T. Morris made an internet worm. It spread through the internet and crashed about 6000 systems. y IP Spoof y Kevin Mitnick was caught by Tsutomu Shimomura who was security expert. Kevin Mitnick uses the IP Spoof attack in this accident

Difference between Hackers and crackers
y A person who enjoys exploring the details of programmable systems and

how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. y One who programs enthusiastically (even obsessively) or who enjoys programming rather than simply theorizing about programming. y Positive
y gaining access to important information that you have. Surely you are a y y y y

V.I.P. in the computer world and you are being seriously hunted; gaining access to your system resources. interrupting your host s efficiency (with no threat of exposure). This may be dangerous if your clients require uninterrupted service from your host; checking out the mechanism of attacks against other systems. Negative

Why do hackers hack?
y y y y y y y y y y y y

Fun Profit Technical Reputation Scorekeeping Revenge/maliciousness Intellectual Challenges Desire to embarrass Experimentation Self Gratification Problem Solving Exposing System Weakness Want to be Hero of Wild Internet

Types of hackers
y y



y y y

Professional hackers y Black Hats the Bad Guys y White Hats Professional Security Experts Script kiddies y Mostly kids/students y User tools created by black hats, y To get free stuff y Impress their peers y Not get caught Underemployed Adult Hackers y Former Script Kiddies y Can t get employment in the field y Want recognition in hacker community Ideological Hackers y hack as a mechanism to promote some political or ideological purpose y Usually coincide with political events Criminal Hackers y Real criminals, are in it for whatever they can get no matter who it hurts Corporate Spies y Are relatively rare Disgruntled Employees y Most dangerous to an enterprise as they are insiders y Since many companies subcontract their network services a disgruntled vendor could be very dangerous to the host enterprise

Types of Attacks
y Internal

like Technical attacks y External like Social Engineering

What do hackers do after hacking?
y Patch security hole y The other hackers can¶t intrude y Clear logs and hide themselves y Install rootkit ( backdoor ) y The hacker who hacked the system can use the system later y It contains trojan ls, ps, and so on

Why can¶t defend against hackers?
y There are many unknown security hole y Hackers need to know only one security hole to hack

the system
y Admin need to know all security holes to defend the


How can protect the system?
y Patch security hole often y Encrypt important data y Do not run unused Files and Folders y Remove unused setup program y Setup loghost y Use switch hub y Setup firewall y Setup IDS y Check unintentional changes

What should do after hacked?
y Shutdown the system y Or turn off the system y Separate the system from network y Restore the system with the backup y Or reinstall all programs y Connect the system to the network

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.