SlideShare uma empresa Scribd logo
1 de 40
Hacking




Hackking
Hacking
•       Hacker



                           Hacker

    Hacker           Security Professional

                                         Hacker

    Ethical Hacker
                             White Hat Hacker
                                     Cracker      Black
Cracker
• cracker

                       Hacker

            password
Hacker




UNIX
Hacker           Cracker
                        Internet
•        Password Sniffers
                                        Log on
            Password)
         Spooling
    Internet Address)

        Root)
                             Sniffers
         Back Door
          The Hole in the Web
    World -Wide-Web (WWW )
        Website
                    Site
Hacking
•      Hacker
         white hat hacker)
           black hat hacker)
                                                   Grey hat
    hacker)                             Yellow hat hacker)
    White hat hacker    Hacker



          bug                web site
                       bug
    ethical hacker             Hacker
          bug
Hacking
•      Black hat hacker      Hacker              hacker
                              hacker

                                        web site
    web site            virus script         ad Aare spy
    ware         software key logger link       software
                    web site                            link

•   Grey hat hacker
                web site
  web site                         web site
         web site
•   Yellow hat hacker

          hack
Hacker
Cracker
Password Sniffers
                                Log on
        Password)

     Spoofing

Internet Address)


                Root)
                                    Sniffers
                    Back Door
The Hole in the Web
World -Wide-Web

            Website
                      Site
Hacker
•             Network                 OS ) UNIX          OS

    UNIX                           Interactive time sharing
           OS                      C
    UNIX
                  OS            Free ware product            Hacker
                        Idea                             UNIX
    Version
    Version
           USENET
       Hacker
       Newgroup            Newgroup      HOST     Server
                Internet     Web browser    USENET
                Newgroup         Enduser
            www
                   technic computer
                                         Netware
Hacking
•

    Hacker   Cracker
Hacking
•



    Hacker   Cracker
1.Robert Tappan Morris
•                   -                  rtm
                             National Computer Security
    Center NSA(National Security Agency–
                             No Such Agency
             Dan Brown
                          SuperUser       Belle Lab
                -                           worm

    Cornell
                                    worm
                  MorrisWorm)
                                    worm       replicate

              -
       Ph.D        Harvard
    MIT
2. Kevin Mitnick
•                       -           Condor
                     crack           North American
    Aerospace Defence Command
    Punch Card     Los Angeles BusSystem

•                   -
                            Digital Equibment Corperation
         software
                                  Nokia    Motorolla
        - hack                     Tsutomu Shiomura
    Shiomura                FBI
    Shiomura                         White hat
             -                       hacker
3. Adrian Lamo
•                 -                The homeless hacker’

                      laptop,

•               -                                The
    New York Times
                                   The New York Times
                           LexisNexis
                    The New York Times
       Microsoft ,Yahoo , Bank of America    CitiGroup
            -
    Hacker
4. Gary McKinnon -
                    Solo
•            -                    US Government
    U.S. Department of Defense,


                   -
5.Raphael Gray -
             Curador
•      -         e-commerce


•          -      The saint(of e-commerce)
6 .John Draper –
           Cap’n Crunch
•               -
        crack           phone phreaking)
                                 PC
                         Draper
                    -                crack
    Draper                                   (!?!)–
                                          Cap’n Crunch
    cereal                         whistle
                                  Hz           Bluebox
7. Kevin Poulsen –
           Dark Dante
•      -
                                     FBI
           -
               Pacific Bell
                   KIIS-FM      LA
                        Porche!!!

      -                                Wired News
                                BlackHat
8. Dmitri Galushkevich
•               -   hacker


         hack

          internet gridlock”–   ATM,

                                       Martin
    Luther King
9. Jonathan James -
             c0mrade
•               -
    BellSouth                        DTRA
                                              Hack
         Backdoor             Nasa
                                            Nasa

                    Nasa

                      -               James

                          C
10.The Deceptive Duo -
                                       Benjamin Stark
                   c]t Robert Lyttle
•           -
                FAA(
•   Hacker
•
    hacker
1.Tsutomu Shimomura

•       -          John Markoff             FBI
                              Kevin Mitnick
              -               Osamu Shimomura

                             TakeDown
            KevinMitnick
             TakeDown
2.Stephen Wozniak
•               -                 Apple Computer           -
              Wozniak
              Esquire (   Esquire
                              Steve Jobs
    BlueBox
                                           Steve Wozniak
                 BlueBox
         Henry Kissinger
3.Tim Berners-Lee
•                 -                  www        Lee
                                   Convey     Mary
    Berners-Lee                             Manchester
    Mark 1                                       Tim
    Berners-Lee         FreeLance        CERN (

                                               Hypertext)
                               TCP      DNS
                      www
                            Welcome to info.cern.ch
          Tim Berners-Lee
                     hacker-                  hack
           acess code)               Oxford
4.Richard Stallman
•            -                  MIT
    StaffComputer
                    Stallman
                         hack Printer

            -             GNU
                         Copyleft
Social Engineering
•


                Dumpster Diving)

    Phishing
•
Password Guessing
• Password



 Password
 Password    Password

 Password           Password
             Password
Denial of Service (DOS)
• Denial of Service (



      Denial of Service
      Firewall    IDS                  Update


      Software

                          Distributed Denial of
  Service (DDOS)[7]
Decryption
•                        Key
    Algorithm
                       Decryption
                                    Key
                  Weak Key
                                      Key
                Key                     bit
                                    Key
Birthday Attacks
•


•
    Random Key         Random Key
                 Key
Man in the middle Attacks
•

                Active
                         Passive
                                   Replay
    Attack

•                                  Digital
    Signature

Mais conteúdo relacionado

Mais procurados

A perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageA perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionage
Gohsuke Takama
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
yanizaki
 
อาชญากรรมทางคอมพิวเตอร์ 100
อาชญากรรมทางคอมพิวเตอร์  100อาชญากรรมทางคอมพิวเตอร์  100
อาชญากรรมทางคอมพิวเตอร์ 100
Khunjitjai Sroi Sirima
 
Layer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dosLayer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dos
fangjiafu
 

Mais procurados (17)

Malware Trends Developments
Malware Trends DevelopmentsMalware Trends Developments
Malware Trends Developments
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
 
The devil is in the details
The devil is in the detailsThe devil is in the details
The devil is in the details
 
A perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageA perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionage
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Ransomware: History, Analysis, & Mitigation
Ransomware: History, Analysis, & MitigationRansomware: History, Analysis, & Mitigation
Ransomware: History, Analysis, & Mitigation
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 
Hacking
HackingHacking
Hacking
 
รายงาน
รายงานรายงาน
รายงาน
 
Is the us engaged in a cyber war
Is the us engaged in a cyber warIs the us engaged in a cyber war
Is the us engaged in a cyber war
 
Hacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering AdversariesHacking with Skynet - How AI is Empowering Adversaries
Hacking with Skynet - How AI is Empowering Adversaries
 
อาชญากรรมทางคอมพิวเตอร์ 100
อาชญากรรมทางคอมพิวเตอร์  100อาชญากรรมทางคอมพิวเตอร์  100
อาชญากรรมทางคอมพิวเตอร์ 100
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Layer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dosLayer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dos
 

Semelhante a โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา

Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Umang Patel
 

Semelhante a โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา (20)

History of Old School Hacking
History of Old School HackingHistory of Old School Hacking
History of Old School Hacking
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
hacking
hackinghacking
hacking
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
Hacking
HackingHacking
Hacking
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all time
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
History of Hacking
History of HackingHistory of Hacking
History of Hacking
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Ethical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedEthical hacking : Beginner to advanced
Ethical hacking : Beginner to advanced
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา

  • 2. Hacking • Hacker Hacker Hacker Security Professional Hacker Ethical Hacker White Hat Hacker Cracker Black
  • 3. Cracker • cracker Hacker password
  • 5. Hacker Cracker Internet • Password Sniffers Log on Password) Spooling Internet Address) Root) Sniffers Back Door The Hole in the Web World -Wide-Web (WWW ) Website Site
  • 6. Hacking • Hacker white hat hacker) black hat hacker) Grey hat hacker) Yellow hat hacker) White hat hacker Hacker bug web site bug ethical hacker Hacker bug
  • 7. Hacking • Black hat hacker Hacker hacker hacker web site web site virus script ad Aare spy ware software key logger link software web site link • Grey hat hacker web site web site web site web site • Yellow hat hacker hack
  • 9. Password Sniffers Log on Password) Spoofing Internet Address) Root) Sniffers Back Door
  • 10. The Hole in the Web World -Wide-Web Website Site
  • 11. Hacker • Network OS ) UNIX OS UNIX Interactive time sharing OS C UNIX OS Free ware product Hacker Idea UNIX Version Version USENET Hacker Newgroup Newgroup HOST Server Internet Web browser USENET Newgroup Enduser www technic computer Netware
  • 12. Hacking • Hacker Cracker
  • 13. Hacking • Hacker Cracker
  • 14.
  • 15. 1.Robert Tappan Morris • - rtm National Computer Security Center NSA(National Security Agency– No Such Agency Dan Brown SuperUser Belle Lab - worm Cornell worm MorrisWorm) worm replicate - Ph.D Harvard MIT
  • 16. 2. Kevin Mitnick • - Condor crack North American Aerospace Defence Command Punch Card Los Angeles BusSystem • - Digital Equibment Corperation software Nokia Motorolla - hack Tsutomu Shiomura Shiomura FBI Shiomura White hat - hacker
  • 17. 3. Adrian Lamo • - The homeless hacker’ laptop, • - The New York Times The New York Times LexisNexis The New York Times Microsoft ,Yahoo , Bank of America CitiGroup - Hacker
  • 18. 4. Gary McKinnon - Solo • - US Government U.S. Department of Defense, -
  • 19. 5.Raphael Gray - Curador • - e-commerce • - The saint(of e-commerce)
  • 20. 6 .John Draper – Cap’n Crunch • - crack phone phreaking) PC Draper - crack Draper (!?!)– Cap’n Crunch cereal whistle Hz Bluebox
  • 21. 7. Kevin Poulsen – Dark Dante • - FBI - Pacific Bell KIIS-FM LA Porche!!! - Wired News BlackHat
  • 22. 8. Dmitri Galushkevich • - hacker hack internet gridlock”– ATM, Martin Luther King
  • 23. 9. Jonathan James - c0mrade • - BellSouth DTRA Hack Backdoor Nasa Nasa Nasa - James C
  • 24. 10.The Deceptive Duo - Benjamin Stark c]t Robert Lyttle • - FAA(
  • 25. Hacker
  • 26. hacker
  • 27.
  • 28. 1.Tsutomu Shimomura • - John Markoff FBI Kevin Mitnick - Osamu Shimomura TakeDown KevinMitnick TakeDown
  • 29.
  • 30. 2.Stephen Wozniak • - Apple Computer - Wozniak Esquire ( Esquire Steve Jobs BlueBox Steve Wozniak BlueBox Henry Kissinger
  • 31.
  • 32. 3.Tim Berners-Lee • - www Lee Convey Mary Berners-Lee Manchester Mark 1 Tim Berners-Lee FreeLance CERN ( Hypertext) TCP DNS www Welcome to info.cern.ch Tim Berners-Lee hacker- hack acess code) Oxford
  • 33.
  • 34. 4.Richard Stallman • - MIT StaffComputer Stallman hack Printer - GNU Copyleft
  • 35. Social Engineering • Dumpster Diving) Phishing •
  • 36. Password Guessing • Password Password Password Password Password Password Password
  • 37. Denial of Service (DOS) • Denial of Service ( Denial of Service Firewall IDS Update Software Distributed Denial of Service (DDOS)[7]
  • 38. Decryption • Key Algorithm Decryption Key Weak Key Key Key bit Key
  • 39. Birthday Attacks • • Random Key Random Key Key
  • 40. Man in the middle Attacks • Active Passive Replay Attack • Digital Signature