3. OUTLINE:
WHAT IS HACKING?
WHO IS AN HACKER?
HISTORY OF HACKING
TYPES OF HACKING
HACKING TECHNIQUES
HACKING TOOLS
WHAT CAN BE HACKED?
CERTIFICATIONS IN HACKING
HOW HACKING ATTACK WORKS
EFFECTS OF HACKING
PREVENTION AND DETECTION OF HACKING
CONCLUSION
4. Hacking is an activity that is engaged in by
people who use their knowledge of the internet,
computers, firewalls and security preferences to
break into other people's computers, allowing
them to view private information, alter data and
steal files, information or programs.
In computer networking, hacking is any
technical effort to manipulate the normal
behavior of network connections and connected
systems.
WHAT IS
HACKING
5. WHO IS AN
HACKER
In computer security and everyday
language, a hacker is someone who
breaks into computers and computer
networks. A hacker is an individual that
attempts to take control over someone
else's computer by using viruses,
worms, and other types of Internet
attacks.
6. DAWN OF HACKING
M.I.T. engineers in the 1960s first
popularized the term and concept
of HACKING. The so-called "hacks"
perpetrated by these hackers were
intended to be harmless technical
experiments and fun learning
activities.
7. Password cracking: The process of recovering
passwords from data that has been stored in or
transmitted by a computer system.
Spoofing attack (Phishing):One program or
website successfully masquerading as another by
falsifying data and thereby being treated as a trusted
system by a user .
Rootkit: A Rootkit is designed to conceal the
compromise of a computer's security.
TYPES OF
HACKING
8. Trojan horses: A program which seems to be doing
one thing, but is actually doing another. A Trojan horse
can be used to set up a backdoor
Viruses: A self-replicating program that spreads by
inserting copies of itself into other executable code or
documents .Some viruses are considered malicious.
Worms: A worm is also a self-replicating program. A
worm differs from a virus in that it propagates through
computer networks without user intervention.
TYPES OF
HACKING CONT’D
10. TYPES OF
HACKERS LEGAL HACKERS
White hat
Breaks security for non-malicious reasons,
for instance testing their own security
system. Also includes individuals who
perform penetration tests and vulnerability
assessments within a contractual
agreement. Often, this type of 'white hat'
hacker is called an ETHICAL HACKER.
11. TYPES OF
HACKERS ILLEGAL HACKERS
Black hat
Break into secure networks to destroy data or make the
network unusable for those who are authorized to use
the network.
Script kiddie
A non-expert who breaks into computer systems by
using pre-packaged automated tools written by others.
Elite hacker
A social status among hackers, elite is used to describe
the most skilled. Newly discovered exploits will circulate
among these hackers.
13. HACKING
TECHNIQUES
DENIAL of SERVICE (DoS)
Give hackers a way to bring down a network without
gaining internal access by flooding the access routers
with bogus traffic causing the network to slow down or
shut down . Using a third party (Transmission Control
Protocol(TCP) or packets).
SOCIAL ENGINEERING
Is the act of manipulation and the skill of exploiting
human weakness, into performing actions or divulging
confidential information rather than by using technical
cracking techniques
14. Dictionary attack
A dictionary file is loaded into a cracking application
which is run against user accounts located by the
application.
Hybrid attack
Add numbers or symbols to the filename to crack a
password. Many people change their passwords by
simply adding a number to the end of their current
password
Brute force attack
A comprehensive form of attack, often take a long time
to work depending on the complexity of the password.
HACKING
TECHNIQUES
16. N map:(Network Mapper) A tool designed to rapidly scan
large networks, uses raw IP packets in novel ways to determine
what hosts are available on the network
Cain and Abel: A password recovery tool. It allows easy
recovery of various kind of passwords by sniffing the network,
cracking encrypted passwords.
Key loggers: A tool designed to record every keystroke on
an affected machine for later retrieval. Its purpose is usually to
allow the user of this tool to gain access to confidential
information typed on the affected machine
HACKING
TOOLS
17. WHAT CAN
BE HACKED
Basically anything can be hacked as long as it has
vulnerabilities examples include;
Networks
Servers
Personal computers
ATM’S
Dispenser machines
Websites
Mobile phones
Government
Organizations….etc.
18. CEH Certification
A CERTIFIED ETHICAL HACKER is a skilled professional who
understands and knows how to look for the weaknesses and
vulnerabilities in target systems and uses the same knowledge
and tools as a malicious hacker .To achieve the Certified Ethical
Hacker Certification, you must pass the CEH exam 312-50
CHFI Certification
COMPUTER HACKING FORENSIC INVESTIGATION is the process of
detecting hacking attacks and properly extracting evidence to
report the crime and conduct audits to prevent future attacks.
The CHFI certification is awarded after successfully passing the
exam EC0 312-49.
INTERNATIONAL COUNCIL OF ELECTRONIC COMMERCE CONSULTANTS(ICECC)
CERTIFICATIONS IN
HACKING
21. HOW HACKING
ATTACK WORKS
The first thing an hacker does on gaining
access to you is to install a Rootkit to
facilitate durable influence on your system .
Using these to create new accounts or
networks. Then he tries to obscure his
presence, surveys the network then tries to
carry out his devious act. He then creates a
backdoor he can always use to have access
to your system. The hacker may use a third
party to hack into you .
23. EFFECTS OF HACKING
Denial of Service (DoS)
Exploitation
Sales Losses
Defacement (websites)
Data Loss
Remote File Execution
Network Traffic
Loss of Control
Additional Cost
Fraud…. etc.
24.
25. PREVENTION AND DETECTION
OF HACKING
SECURITY AWARENESS
Is the knowledge and attitude members of an
organization possess regarding the protection of the
physical and especially information asset of the
organization. These include the following:
Physical security
Desktop security
Networks security(Cyber security)
Password security
Antiviruses
Antispyware's
E-mail security
Firewall
27. CONCLUSION
The question therefore is, is Hacking a
crime?
From the afore discussion its obvious
hacking(illegal hacking) is a CRIME.
Hacking can be prevented or minimized if
proper security measures and computer
ethics are adhered to.
Therefore be careful not to get hacked
because this can be detrimental.