You are on page 1of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Objectives

In this session, you will learn to:


Identify the various types of hackers Trace the evolution of hacking Identify the various classes of hacking Understand the mindset of hackers Identify the ethical issues related to hacking Understand the need for ethical hacking Identify common hacking techniques Identify various types of information warfare

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 1 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Basics of Hacking

The greatest challenge that the information technology business faces today is the security of information in terms of integrity, availability, and confidentiality. To prevent security breaches, you must understand why intrusions take place and who the intruders are. Today, all system intrusions and virus attacks point to a community called hackers. The security of information depends on the intention of the hacker who breaks into a system.

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 2 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Hacker Communities

Depending on their mindsets and intentions, hackers can be divided into different communities:
Hackers Crackers Phreaks Script Kiddies

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 3 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Evolution of Hacking

1950s
Origin of computer hacking Introduction of computers, IBM 704 series and TX-0 Hackers experimented with new solutions without any malicious intent

1960s
Introduction of Compatible Time Sharing System (CTSS) Hackers used first names, last names, and names related to the users families to guess logon names and passwords Finally broke CTSS systems Introduction of phreaks

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 4 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Evolution of Hacking (Contd.)

1980s
Hackers penetrated into computers that were connected to the Internet, with combined phreaking and hacking activities Introduction of malicious code, such as viruses, worms, and Trojans to attack systems of legitimate users Hackers spread viruses, such as Code Red and Nimda, in e-mail attachments Introduction of Script Kiddies who used information on the Internet to learn how to attack computers

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 5 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Classes of Hackers

Depending on the nature of their activities, hackers are categorized into the following groups:
White Hats Black Hats Grey Hats

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 6 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Hacker Motivations

The key motivations of a hacker are:


Enthusiasm for new solutions Desire for recognition Desire for financial gain Urge to imitate role models Desire for revenge

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 7 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Hacker Mindset

The key factors of a hackers mindset are:


Creativity Freedom Dedication Patience Satisfaction

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 8 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Need for Ethics

Ethics are principles that allow us to distinguish between right and wrong. Ethical principles have a crucial role in the hacker community. In a social environment, everyone has moral and social responsibilities to provide social justice to other human beings.

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 9 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Need for Ethics (Contd.)

In order to provide social justice to all the members of the community, it is necessary to separate good and bad things. It is necessary to have some guidelines that distinguish good conduct from bad. A code of ethics helps to govern technological advancement, which is the key point of social development.

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 10 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Ethical Issues of Information Technology

The ethics of information technology can be summarized in the following areas:


Privacy Accuracy Property Accessibility

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 11 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Ethical Issues of Hacking

As a community, hackers have a moral responsibility towards the society. It is the responsibility of hackers to ensure that their activities do not cause any damage to the confidentiality and integrity of the information. Hackers with good intentions can use their intelligence and experience to invent new solutions that help the overall development of technology.

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 12 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Ethical Hacking and System Security

System administrators use hacking techniques to check security gaps in the networks and software products. The process of using hacking techniques for audit purposes and security tests is known as ethical hacking or vulnerability assessment. Ethical hackers help the users of a network to protect their resources from cracking and other illegal hacking activities. Ethical hacking is a combination of integrity, transparency, and independence. Ethical hacking of networks and systems should be performed on a regular basis, to detect new vulnerabilities and possible hacking attempts.

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 13 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Common Hacking Techniques

There are various tools and techniques that help hackers find vulnerabilities and security gaps in a system:
Password Cracking Sniffing Spoofing Reconnaissance Scanning Trojan Horses Denial-of-Service

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 14 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Common Hacking Scenarios

Common illegal hacking activities include:


Defacing websites Hacking government networks and websites Hacking military information Performing DoS attacks on corporate networks Performing DoS attacks on e-commerce networks Stealing credit card numbers Hacking financial networks Installing Trojan horses on the computers of organizations and individuals Spreading viruses through e-mail messages

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 15 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Threats of Information Warfare

The two-pronged use of the Internet, to access information and to communicate with each other, has become the battlefield of individuals, corporations, and nations. Modern society is highly dependent on technology to ensure data integrity and availability. Information has become a weapon to conduct sophisticated wars against enemies, such as:
Government Military Forces Internet Service Providers (ISP) Corporations Individuals

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 16 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Cyber-Terrorism

Cyber-terrorism is a subset of information war activities. Like traditional terrorism, cyber-terrorism tries to destabilize social life by conducting violent activities and generating fear. Cyber-terrorists target public information systems, such as government networks, military networks, and bank networks. It is the responsibility of each individual to protect information technology from misuse by cyber-terrorists and other crackers.

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 17 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Summary

In this session, you learned:


Hackers are intelligent computer professionals who are interested in learning advanced techniques of operating systems, programming languages, and application software. Crackers are individuals who break into computers with malicious intent. Phreaks are persons who use computer devices and software to break into phone networks. Script kiddies are persons who do not have technical skills to hack computers, but use the available information about known vulnerabilities to break into remote systems.

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 18 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Summary (Contd.)

On the basis of their activities, hackers fall into three categories:


White Hats Black Hats Grey Hats

The key motivations of hackers are:


Enthusiasm for new solutions Desire for recognition Desire for financial gains Urge to imitate role models Desire for revenge

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 19 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Summary (Contd.)

The key ingredients of a hackers mindset are:


Creativity Freedom Dedication Patience Satisfaction

Every human being has moral and social responsibilities to provide social justice to other human beings. It is necessary to formulate guidelines that help people decide between good and bad hacker activities.

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 20 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Summary (Contd.)

The four ethical issues of information technology are:


Privacy Accuracy Property Accessibility

Hackers should not harass or cause damage through their activities, but help build and improve existing technology. The process of using hacking techniques for audit purposes and security tests is known as ethical hacking, or vulnerability assessment.

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 21 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Summary (Contd.)

The common hacking techniques include:


Password Cracking Sniffing Spoofing Reconnaissance Scanning Trojan horses Denial-of-Service

Today, information has become a weapon to conduct sophisticated wars.

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 22 of 23

Installing Windows Professional Using Attended Installation Introduction toXP Hacking

Summary (Contd.)

Information warfare can affect:


Government Military forces Internet Service Providers (ISP) Corporations Individuals

Ver. 1.0

Introduction to Hacking/Chapter 1

Slide 23 of 23

You might also like