Introduction to Hacking, Hackers & Hacktivism

Post on 13-Apr-2017

2.058 views 1 download

Transcript of Introduction to Hacking, Hackers & Hacktivism

HACKING, HACKERS & HACKTIVISM

• Ankit Singh Baliyan (1109713018)

TOPICS COVERED IN THIS PRESENTATION

DEFINITIONS OF HACKING TYPES OF HACKING EFFECT OF HACKING PURPOSE OF HACKING DEFINITION OF HACKER HACKERS AND CRACKERS HACKTIVISM CONCLUSION

What is the meaning of Hack/Hacking? Dictionary –

To cut, notch, slice, chop, or sever (something) with or as with heavy, irregular blows (often followed by up  or down  ): to hack meat; to hack down trees.

Computing Dictionary – Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.

Definition of Hacking :

Authorized or unauthorized attempts to bypass the security mechanisms of an information system or network.

Stealing of the data and information from someone else’s computer or network without the prior permission of the owner.

Breaking into someone else’s Computer System, Often on a network.

Bypasses password or licenses in computer program.

Types of Hacking

Website Hacking. E-mail Hacking. Network Hacking. Password Hacking. Online Banking Hacking. Computer Hacking.

Website Hacking..

SQL Injection Attacks – Using SQL injections, attackers can:

Add new data to the databaseCould be embarrassing to find yourself selling politically incorrect

items on an eCommerce siteUsername – 1’ or ‘1’=‘1 Password - 1’ or ‘1’=‘1

Modify data currently in the databaseCould be very costly to have an expensive item suddenly be deeply

‘discounted’Perform an UPDATE in the injected SQL

E-mail Hacking…

Network Hacking...

Password Cracking….

Online Banking Hacking..

Computer Hacking..

Who is a “HACKER” ?

INTRODUCTION

• A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers.

• Hacker is a person who access computer system and network without authorization.

• There are 3 types of hacker which are white hat, black hat and grey hat

Types of Hackers

White-hat Hackers The good guys who identify the security

weakness of the system or network and inform the owner about them.

Black Hat Hackers A black hat hacker is the villain or bad guy, who

crash into victim’s security to steal information and destroy the victims security network.

Grey hat Hackers A grey hat hacker, in the hacking community,

refers to a skilled hacker who is somewhere in between white and black hat hackers.

The difference of Hacking and CrackingHack

A hacker is a person who is proficient with computers and/or programming to an elite level where they know all of the in's and out's of a system.

CrackA cracker is a hacker who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses etc.

World’s Most Famous Hacker

Stephen Wozniak

Tsutomu Shimomura

Kevin Mitnick

At the time of his arrest, he was the most-wanted computer criminal in the United States.

PURPOSE OF HACKING• To steal

Money Important data / information

• To test their knowledge in understanding network and computer system

• To harm someone’s privacy

• To become a cyber warrior

• To espionage other people

• Data loss

• Increasing maintenance cost

• Negative reputation

Hacktivism

HACKTIVISM

The act of hacking, or breaking into computer system,for a political or socially motivated purpose. The individual who performs an act of Hacktivism is said to be a Hacktivist.

They uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause.

Hacktivism(The war on…)

What is Hacktivism?

What is Hacktivism

Well it’s a portmanteau of…

What is Hacktivism

Well it’s a portmanteau of…

Hacking…

What is Hacktivism

Well it’s a portmanteau of…

Hacking…

and activism.

So what is hacking?

Not This.

Learning and Sharing the KnowledgeInformation wants to be free!

Hacking + Activism =

Hacking + Activism =

Expecting this…

So what is hacktivism?

Involves…1. Repurposing of Technology

So what is hacktivism?

Involves…1. Repurposing of Technology2. Better understanding of technology (including traditional

technologies)

So what is hacktivism?

Involves…1. Repurposing of Technology2. Better understanding of technology (including traditional

technologies)3. Promoting education of these technologies (they should not be

foreign to us).

So what is hacktivism?

Involves…1. Repurposing of Technology2. Better understanding of technology (including traditional

technologies)3. Promoting education of these technologies (they should not be

foreign to us).4. Possibly with a sense of whimsy

So what is hacktivism?

Involves…1. Repurposing of Technology2. Better understanding of technology (including traditional

technologies)3. Promoting education of these technologies (they should not be

foreign to us).4. Possibly with a sense of whimsy5. Done for a social cause.

A brief history of Hacktivism

WANK Worm

According to Julian Assange, the WANK worm is the first instance of hacktivism. On Oct. 16, 1989, during the Cold War when nuclear war was an immediate possibility, hackers hit the NASA computers with the WANK Worm. Two days prior to the launch of the plutonium-fueled Galileo space probe from the Kennedy Space Station, NASA employees logged on to see a humorous yet frightening welcome screen: "Your computer has been officially WANKed. You talk of times of peace for all, and then prepare for war," and "Remember, even if you win the rat race, you're still a rat." The machines of the U.S. Department of Energy and NASA worldwide had been penetrated by the anti-nuclear WANK (WORMS AGAINST NUCLEAR KILLERS) worm.

The Rise of Hacktivism

The Mentor

The Mentor 1

But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?

I am a hacker, enter my world...

The Mentor 2

Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me...

Damn underachiever. They're all alike.

The Mentor 3

Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.

That year…Julian Assange get’s his first computerJeremy Hammond is Born

Electronic Disturbance Theater

Wikileaks

Leaking site Developed by Julian Assange Background as a hacker Endorses Hacktivist ethic: information wants to be free.

22:50 https://www.youtube.com/watch?v=PvmfOaZ34Pk

Anonymous• Suddenly emerged in 2008

• At the beginning it was composed of professionals → Now anyone can participate

Anonymous• GOALS: end with the oppression from governments and other

organizations on the Interneto “We want to fight the powers-that-be when they overstep the lines.”

• Conciousness o "I'm not under the illusion that we're going to change the world,but if we can make a

big enough noise for people to notice there's a problem and scream loud enough, someone's going to take notice. That's what Anonymous is."

Scottish Activist

Questions

How can we influence policy decisions on surveillance & protest our invasion of privacy?

Questions

How can we influence policy decisions on surveillance & protest our invasion of privacy?

: First we have to educate our peers.

Questions

How can we influence policy decisions on surveillance & protest our invasion of privacy?

: First we have to educate our peers. Keep Talking. Spread the word.

Conclusion

Hacking is a good computing skill that can be used for good or bad intention.

Hacking does not mean using your computing skills to do bad. Society have forgotten the difference between

crackers and hackers.

Learning skills of hacking is only for the greater good.

The End

References

http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking.htm http://whatishacking.org/ http://whatismyipaddress.com/hacking http://dictionary.reference.com/browse/hacker?s=t http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_cracking http://answers.yahoo.com/question/index?qid=20071206182542AA3JzNy http://www.huffingtonpost.co.uk/eva-blumdumontet/29c3-hacking-politics_b_25125

73.html http://answers.yahoo.com/question/index?qid=20110801131429AAFTktO http://www.cs.berkeley.edu/~bh/hacker.html http://www.ehow.com/about_4673738_why-do-people-hack.html http://venturebeat.com/2011/12/28/anonymous-stratfor-hack-10-things-to-know/ http://www.slideshare.net/TerroWhite/ethical-hacking-and-it-security-training http://www.switched.com/2011/02/24/what-to-do-email-account-hacked/

Thank You

Any **Queries ?

**Ask@Your Own Risk