Introduction to Hacking, Hackers & Hacktivism
-
Upload
ankit-baliyan -
Category
Technology
-
view
2.058 -
download
1
Transcript of Introduction to Hacking, Hackers & Hacktivism
![Page 1: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/1.jpg)
HACKING, HACKERS & HACKTIVISM
• Ankit Singh Baliyan (1109713018)
![Page 2: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/2.jpg)
TOPICS COVERED IN THIS PRESENTATION
DEFINITIONS OF HACKING TYPES OF HACKING EFFECT OF HACKING PURPOSE OF HACKING DEFINITION OF HACKER HACKERS AND CRACKERS HACKTIVISM CONCLUSION
![Page 3: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/3.jpg)
What is the meaning of Hack/Hacking? Dictionary –
To cut, notch, slice, chop, or sever (something) with or as with heavy, irregular blows (often followed by up or down ): to hack meat; to hack down trees.
Computing Dictionary – Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.
![Page 4: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/4.jpg)
Definition of Hacking :
Authorized or unauthorized attempts to bypass the security mechanisms of an information system or network.
Stealing of the data and information from someone else’s computer or network without the prior permission of the owner.
Breaking into someone else’s Computer System, Often on a network.
Bypasses password or licenses in computer program.
![Page 5: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/5.jpg)
Types of Hacking
Website Hacking. E-mail Hacking. Network Hacking. Password Hacking. Online Banking Hacking. Computer Hacking.
![Page 6: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/6.jpg)
Website Hacking..
![Page 7: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/7.jpg)
SQL Injection Attacks – Using SQL injections, attackers can:
Add new data to the databaseCould be embarrassing to find yourself selling politically incorrect
items on an eCommerce siteUsername – 1’ or ‘1’=‘1 Password - 1’ or ‘1’=‘1
Modify data currently in the databaseCould be very costly to have an expensive item suddenly be deeply
‘discounted’Perform an UPDATE in the injected SQL
![Page 8: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/8.jpg)
E-mail Hacking…
![Page 9: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/9.jpg)
Network Hacking...
![Page 10: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/10.jpg)
Password Cracking….
![Page 11: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/11.jpg)
Online Banking Hacking..
![Page 12: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/12.jpg)
Computer Hacking..
![Page 13: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/13.jpg)
Who is a “HACKER” ?
![Page 14: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/14.jpg)
INTRODUCTION
• A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers.
• Hacker is a person who access computer system and network without authorization.
• There are 3 types of hacker which are white hat, black hat and grey hat
![Page 15: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/15.jpg)
Types of Hackers
![Page 16: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/16.jpg)
White-hat Hackers The good guys who identify the security
weakness of the system or network and inform the owner about them.
![Page 17: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/17.jpg)
Black Hat Hackers A black hat hacker is the villain or bad guy, who
crash into victim’s security to steal information and destroy the victims security network.
![Page 18: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/18.jpg)
Grey hat Hackers A grey hat hacker, in the hacking community,
refers to a skilled hacker who is somewhere in between white and black hat hackers.
![Page 19: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/19.jpg)
The difference of Hacking and CrackingHack
A hacker is a person who is proficient with computers and/or programming to an elite level where they know all of the in's and out's of a system.
CrackA cracker is a hacker who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses etc.
![Page 20: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/20.jpg)
World’s Most Famous Hacker
Stephen Wozniak
Tsutomu Shimomura
Kevin Mitnick
At the time of his arrest, he was the most-wanted computer criminal in the United States.
![Page 21: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/21.jpg)
PURPOSE OF HACKING• To steal
Money Important data / information
• To test their knowledge in understanding network and computer system
• To harm someone’s privacy
• To become a cyber warrior
• To espionage other people
![Page 22: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/22.jpg)
• Data loss
• Increasing maintenance cost
• Negative reputation
![Page 23: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/23.jpg)
Hacktivism
![Page 24: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/24.jpg)
HACKTIVISM
The act of hacking, or breaking into computer system,for a political or socially motivated purpose. The individual who performs an act of Hacktivism is said to be a Hacktivist.
They uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause.
![Page 25: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/25.jpg)
Hacktivism(The war on…)
![Page 26: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/26.jpg)
What is Hacktivism?
![Page 27: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/27.jpg)
What is Hacktivism
Well it’s a portmanteau of…
![Page 28: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/28.jpg)
What is Hacktivism
Well it’s a portmanteau of…
Hacking…
![Page 29: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/29.jpg)
What is Hacktivism
Well it’s a portmanteau of…
Hacking…
and activism.
![Page 30: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/30.jpg)
So what is hacking?
![Page 31: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/31.jpg)
Not This.
![Page 32: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/32.jpg)
![Page 33: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/33.jpg)
Learning and Sharing the KnowledgeInformation wants to be free!
![Page 34: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/34.jpg)
Hacking + Activism =
![Page 35: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/35.jpg)
Hacking + Activism =
![Page 36: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/36.jpg)
Expecting this…
![Page 37: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/37.jpg)
So what is hacktivism?
Involves…1. Repurposing of Technology
![Page 38: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/38.jpg)
So what is hacktivism?
Involves…1. Repurposing of Technology2. Better understanding of technology (including traditional
technologies)
![Page 39: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/39.jpg)
So what is hacktivism?
Involves…1. Repurposing of Technology2. Better understanding of technology (including traditional
technologies)3. Promoting education of these technologies (they should not be
foreign to us).
![Page 40: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/40.jpg)
So what is hacktivism?
Involves…1. Repurposing of Technology2. Better understanding of technology (including traditional
technologies)3. Promoting education of these technologies (they should not be
foreign to us).4. Possibly with a sense of whimsy
![Page 41: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/41.jpg)
So what is hacktivism?
Involves…1. Repurposing of Technology2. Better understanding of technology (including traditional
technologies)3. Promoting education of these technologies (they should not be
foreign to us).4. Possibly with a sense of whimsy5. Done for a social cause.
![Page 42: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/42.jpg)
A brief history of Hacktivism
![Page 43: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/43.jpg)
WANK Worm
According to Julian Assange, the WANK worm is the first instance of hacktivism. On Oct. 16, 1989, during the Cold War when nuclear war was an immediate possibility, hackers hit the NASA computers with the WANK Worm. Two days prior to the launch of the plutonium-fueled Galileo space probe from the Kennedy Space Station, NASA employees logged on to see a humorous yet frightening welcome screen: "Your computer has been officially WANKed. You talk of times of peace for all, and then prepare for war," and "Remember, even if you win the rat race, you're still a rat." The machines of the U.S. Department of Energy and NASA worldwide had been penetrated by the anti-nuclear WANK (WORMS AGAINST NUCLEAR KILLERS) worm.
![Page 44: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/44.jpg)
The Rise of Hacktivism
The Mentor
![Page 45: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/45.jpg)
The Mentor 1
But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world...
![Page 46: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/46.jpg)
The Mentor 2
Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me...
Damn underachiever. They're all alike.
![Page 47: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/47.jpg)
The Mentor 3
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.
That year…Julian Assange get’s his first computerJeremy Hammond is Born
![Page 48: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/48.jpg)
Electronic Disturbance Theater
![Page 49: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/49.jpg)
Wikileaks
Leaking site Developed by Julian Assange Background as a hacker Endorses Hacktivist ethic: information wants to be free.
22:50 https://www.youtube.com/watch?v=PvmfOaZ34Pk
![Page 50: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/50.jpg)
Anonymous• Suddenly emerged in 2008
• At the beginning it was composed of professionals → Now anyone can participate
![Page 51: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/51.jpg)
Anonymous• GOALS: end with the oppression from governments and other
organizations on the Interneto “We want to fight the powers-that-be when they overstep the lines.”
• Conciousness o "I'm not under the illusion that we're going to change the world,but if we can make a
big enough noise for people to notice there's a problem and scream loud enough, someone's going to take notice. That's what Anonymous is."
Scottish Activist
![Page 52: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/52.jpg)
Questions
How can we influence policy decisions on surveillance & protest our invasion of privacy?
![Page 53: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/53.jpg)
Questions
How can we influence policy decisions on surveillance & protest our invasion of privacy?
: First we have to educate our peers.
![Page 54: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/54.jpg)
Questions
How can we influence policy decisions on surveillance & protest our invasion of privacy?
: First we have to educate our peers. Keep Talking. Spread the word.
![Page 55: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/55.jpg)
Conclusion
Hacking is a good computing skill that can be used for good or bad intention.
Hacking does not mean using your computing skills to do bad. Society have forgotten the difference between
crackers and hackers.
Learning skills of hacking is only for the greater good.
The End
![Page 56: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/56.jpg)
![Page 57: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/57.jpg)
References
http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking.htm http://whatishacking.org/ http://whatismyipaddress.com/hacking http://dictionary.reference.com/browse/hacker?s=t http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_cracking http://answers.yahoo.com/question/index?qid=20071206182542AA3JzNy http://www.huffingtonpost.co.uk/eva-blumdumontet/29c3-hacking-politics_b_25125
73.html http://answers.yahoo.com/question/index?qid=20110801131429AAFTktO http://www.cs.berkeley.edu/~bh/hacker.html http://www.ehow.com/about_4673738_why-do-people-hack.html http://venturebeat.com/2011/12/28/anonymous-stratfor-hack-10-things-to-know/ http://www.slideshare.net/TerroWhite/ethical-hacking-and-it-security-training http://www.switched.com/2011/02/24/what-to-do-email-account-hacked/
Thank You
![Page 58: Introduction to Hacking, Hackers & Hacktivism](https://reader035.fdocuments.us/reader035/viewer/2022081512/58ef23521a28ab2d258b4577/html5/thumbnails/58.jpg)
Any **Queries ?
**Ask@Your Own Risk