Professional Documents
Culture Documents
Objectives
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 1 of 23
Basics of Hacking
The greatest challenge that the information technology business faces today is the security of information in terms of integrity, availability, and confidentiality. To prevent security breaches, you must understand why intrusions take place and who the intruders are. Today, all system intrusions and virus attacks point to a community called hackers. The security of information depends on the intention of the hacker who breaks into a system.
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 2 of 23
Hacker Communities
Depending on their mindsets and intentions, hackers can be divided into different communities:
Hackers Crackers Phreaks Script Kiddies
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 3 of 23
Evolution of Hacking
1950s
Origin of computer hacking Introduction of computers, IBM 704 series and TX-0 Hackers experimented with new solutions without any malicious intent
1960s
Introduction of Compatible Time Sharing System (CTSS) Hackers used first names, last names, and names related to the users families to guess logon names and passwords Finally broke CTSS systems Introduction of phreaks
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 4 of 23
1980s
Hackers penetrated into computers that were connected to the Internet, with combined phreaking and hacking activities Introduction of malicious code, such as viruses, worms, and Trojans to attack systems of legitimate users Hackers spread viruses, such as Code Red and Nimda, in e-mail attachments Introduction of Script Kiddies who used information on the Internet to learn how to attack computers
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 5 of 23
Classes of Hackers
Depending on the nature of their activities, hackers are categorized into the following groups:
White Hats Black Hats Grey Hats
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 6 of 23
Hacker Motivations
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 7 of 23
Hacker Mindset
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 8 of 23
Ethics are principles that allow us to distinguish between right and wrong. Ethical principles have a crucial role in the hacker community. In a social environment, everyone has moral and social responsibilities to provide social justice to other human beings.
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 9 of 23
In order to provide social justice to all the members of the community, it is necessary to separate good and bad things. It is necessary to have some guidelines that distinguish good conduct from bad. A code of ethics helps to govern technological advancement, which is the key point of social development.
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 10 of 23
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 11 of 23
As a community, hackers have a moral responsibility towards the society. It is the responsibility of hackers to ensure that their activities do not cause any damage to the confidentiality and integrity of the information. Hackers with good intentions can use their intelligence and experience to invent new solutions that help the overall development of technology.
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 12 of 23
System administrators use hacking techniques to check security gaps in the networks and software products. The process of using hacking techniques for audit purposes and security tests is known as ethical hacking or vulnerability assessment. Ethical hackers help the users of a network to protect their resources from cracking and other illegal hacking activities. Ethical hacking is a combination of integrity, transparency, and independence. Ethical hacking of networks and systems should be performed on a regular basis, to detect new vulnerabilities and possible hacking attempts.
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 13 of 23
There are various tools and techniques that help hackers find vulnerabilities and security gaps in a system:
Password Cracking Sniffing Spoofing Reconnaissance Scanning Trojan Horses Denial-of-Service
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 14 of 23
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 15 of 23
The two-pronged use of the Internet, to access information and to communicate with each other, has become the battlefield of individuals, corporations, and nations. Modern society is highly dependent on technology to ensure data integrity and availability. Information has become a weapon to conduct sophisticated wars against enemies, such as:
Government Military Forces Internet Service Providers (ISP) Corporations Individuals
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 16 of 23
Cyber-Terrorism
Cyber-terrorism is a subset of information war activities. Like traditional terrorism, cyber-terrorism tries to destabilize social life by conducting violent activities and generating fear. Cyber-terrorists target public information systems, such as government networks, military networks, and bank networks. It is the responsibility of each individual to protect information technology from misuse by cyber-terrorists and other crackers.
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 17 of 23
Summary
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 18 of 23
Summary (Contd.)
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 19 of 23
Summary (Contd.)
Every human being has moral and social responsibilities to provide social justice to other human beings. It is necessary to formulate guidelines that help people decide between good and bad hacker activities.
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 20 of 23
Summary (Contd.)
Hackers should not harass or cause damage through their activities, but help build and improve existing technology. The process of using hacking techniques for audit purposes and security tests is known as ethical hacking, or vulnerability assessment.
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 21 of 23
Summary (Contd.)
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 22 of 23
Summary (Contd.)
Ver. 1.0
Introduction to Hacking/Chapter 1
Slide 23 of 23