SlideShare uma empresa Scribd logo

Hacking And Its Prevention

Hacking is good and bad depending on who you are. Prevention tips to safeguard against hacking. 20090320, Ver 2.0

1 de 39
HACKING & IT’S PREVENTION PUNE POLICE Workshop on Cyber Crime (March 19 – 20, 2009) March 20, 2009
Introduction Dinesh Bareja CISA, CISM, ITIL, BS: 7799 (Imp & LA) Email:  [email_address] Information Security professional, having more than 11 years of experience in technology in  commercial, operational, functional and project management roles on multiple large and small projects in global and domestic markets.   Experienced in establishing ISMS (Information Security Management System), planning and implementation of large scale CobiT® implementation, ISO: 27001,  ERM, BCP/DR, BIA, Asset Management, Incident Mgt, Governance and Compliance, VA/PT, AppSec etc   He is also member of ISACA, OCEG,  iTSMF and co-founder of Indian Honeynet Project and Open Security Alliance. You can find him on Linked In as the owner of the India – Information Security Community group.
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The hacker / cracker has  TIME ANONYMITY INTELLIGENCE (hopefully not) TOOLS AND INFORMATION MALICIOUS INTENT  Hack Hacker Hacking Hack:   // to write computer programs for enjoyment  //to gain access to a computer illegally —  hack it Hacker:  //  an expert at programming and solving problems with a computer //   a person who illegally gains access to and sometimes tampers with information in a computer system   Crack  Cracker Crack:   //  to puzzle out and expose, solve, or reveal the mystery of <crack a code>  //to break into <crack a safe>  Cracker:  // Hacker // braggart; boaster.
Hacker to Cracker ,[object Object],[object Object],[object Object],[object Object]
Hacker to Cracker ,[object Object],[object Object],[object Object]

Recomendados

Mais conteúdo relacionado

Mais procurados

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 

Mais procurados (20)

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Phishing
PhishingPhishing
Phishing
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Destaque

Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentDinesh O Bareja
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITDinesh O Bareja
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionDinesh O Bareja
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident ResponseDinesh O Bareja
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked InDinesh O Bareja
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires SuperhumansDinesh O Bareja
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information SecurityDinesh O Bareja
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Dinesh O Bareja
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSDinesh O Bareja
 

Destaque (17)

Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for Government
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of IT
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introduction
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked In
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires Superhumans
 
Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information Security
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CS
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Semelhante a Hacking And Its Prevention

Semelhante a Hacking And Its Prevention (20)

Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Chase Bank Hacking
Chase Bank HackingChase Bank Hacking
Chase Bank Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Hacking
HackingHacking
Hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking
HackingHacking
Hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 

Mais de Dinesh O Bareja

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers Dinesh O Bareja
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITDinesh O Bareja
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Dinesh O Bareja
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 

Mais de Dinesh O Bareja (9)

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers
 
Cybersecurity 2.0
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with IT
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 

Último

D2 meeting agenda 02.12.24.hehehheeebebepdf
D2 meeting agenda 02.12.24.hehehheeebebepdfD2 meeting agenda 02.12.24.hehehheeebebepdf
D2 meeting agenda 02.12.24.hehehheeebebepdfsundaysantos13
 
Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...
Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...
Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...Lviv Startup Club
 
5 Common Writing Mistakes Infographic.pdf
5 Common Writing Mistakes Infographic.pdf5 Common Writing Mistakes Infographic.pdf
5 Common Writing Mistakes Infographic.pdfRemar Barquilla
 
Zero Budget Marketing Strategy with KPIs for a Cleaning Detergent Training ...
Zero Budget Marketing  Strategy with KPIs for a Cleaning Detergent  Training ...Zero Budget Marketing  Strategy with KPIs for a Cleaning Detergent  Training ...
Zero Budget Marketing Strategy with KPIs for a Cleaning Detergent Training ...Precious Mvulane CA (SA),RA
 
Geocell manufacture in india Singhal industries
Geocell manufacture in india Singhal industriesGeocell manufacture in india Singhal industries
Geocell manufacture in india Singhal industriesdmktgsinghal
 
Grevault battery storage system manufacturer
Grevault battery storage system manufacturerGrevault battery storage system manufacturer
Grevault battery storage system manufacturerGrevault
 
Cracking the Leadership Shadow Code.pptx
Cracking the Leadership Shadow Code.pptxCracking the Leadership Shadow Code.pptx
Cracking the Leadership Shadow Code.pptxWorkforce Group
 
Truths and Myths of Innovation and Entrepreneurship
Truths and Myths of Innovation and EntrepreneurshipTruths and Myths of Innovation and Entrepreneurship
Truths and Myths of Innovation and EntrepreneurshipYannis Charalabidis
 
EAPJ Vol VIII February 2024.pdf
EAPJ Vol VIII February 2024.pdfEAPJ Vol VIII February 2024.pdf
EAPJ Vol VIII February 2024.pdfDarryl_Carr
 
PUBLISHING AND LITERARY NETWORKS IN THE SOUTH WEST_EBOOK_WCOVER.pdf
PUBLISHING AND LITERARY NETWORKS IN THE SOUTH WEST_EBOOK_WCOVER.pdfPUBLISHING AND LITERARY NETWORKS IN THE SOUTH WEST_EBOOK_WCOVER.pdf
PUBLISHING AND LITERARY NETWORKS IN THE SOUTH WEST_EBOOK_WCOVER.pdfUniversity of Exeter MA Publishing
 
Time Management Techniques for increased productivity and goal achievement
Time Management Techniques for increased productivity and goal achievementTime Management Techniques for increased productivity and goal achievement
Time Management Techniques for increased productivity and goal achievementOfficeClip
 
Let’s get moving! Setting some goals Optimizing your workflow
Let’s get moving! Setting some goals Optimizing your workflowLet’s get moving! Setting some goals Optimizing your workflow
Let’s get moving! Setting some goals Optimizing your workflowngothuyanct
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
SARomics Biostructures 2024 Company Presentation
SARomics Biostructures 2024 Company PresentationSARomics Biostructures 2024 Company Presentation
SARomics Biostructures 2024 Company PresentationSalam Al-Karadaghi
 
Your Expert Guide to CX Orchestration & Enhancing Customer Journeys
Your Expert Guide to CX Orchestration & Enhancing Customer JourneysYour Expert Guide to CX Orchestration & Enhancing Customer Journeys
Your Expert Guide to CX Orchestration & Enhancing Customer JourneysAggregage
 
Decoding Generative AI-AI Playbook for Marketing Students_UPower DUGA_Supavad...
Decoding Generative AI-AI Playbook for Marketing Students_UPower DUGA_Supavad...Decoding Generative AI-AI Playbook for Marketing Students_UPower DUGA_Supavad...
Decoding Generative AI-AI Playbook for Marketing Students_UPower DUGA_Supavad...Supavadee(Noi) Tantiyanon
 
FICCI Monthly Bulletin February 2024.pdf
FICCI  Monthly Bulletin February 2024.pdfFICCI  Monthly Bulletin February 2024.pdf
FICCI Monthly Bulletin February 2024.pdfsubarnamostafa1
 

Último (20)

D2 meeting agenda 02.12.24.hehehheeebebepdf
D2 meeting agenda 02.12.24.hehehheeebebepdfD2 meeting agenda 02.12.24.hehehheeebebepdf
D2 meeting agenda 02.12.24.hehehheeebebepdf
 
Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...
Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...
Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...
 
5 Common Writing Mistakes Infographic.pdf
5 Common Writing Mistakes Infographic.pdf5 Common Writing Mistakes Infographic.pdf
5 Common Writing Mistakes Infographic.pdf
 
Zero Budget Marketing Strategy with KPIs for a Cleaning Detergent Training ...
Zero Budget Marketing  Strategy with KPIs for a Cleaning Detergent  Training ...Zero Budget Marketing  Strategy with KPIs for a Cleaning Detergent  Training ...
Zero Budget Marketing Strategy with KPIs for a Cleaning Detergent Training ...
 
Geocell manufacture in india Singhal industries
Geocell manufacture in india Singhal industriesGeocell manufacture in india Singhal industries
Geocell manufacture in india Singhal industries
 
Digital Transformation & Improvement Pocketbook
Digital Transformation & Improvement PocketbookDigital Transformation & Improvement Pocketbook
Digital Transformation & Improvement Pocketbook
 
Grevault battery storage system manufacturer
Grevault battery storage system manufacturerGrevault battery storage system manufacturer
Grevault battery storage system manufacturer
 
Cracking the Leadership Shadow Code.pptx
Cracking the Leadership Shadow Code.pptxCracking the Leadership Shadow Code.pptx
Cracking the Leadership Shadow Code.pptx
 
Truths and Myths of Innovation and Entrepreneurship
Truths and Myths of Innovation and EntrepreneurshipTruths and Myths of Innovation and Entrepreneurship
Truths and Myths of Innovation and Entrepreneurship
 
EAPJ Vol VIII February 2024.pdf
EAPJ Vol VIII February 2024.pdfEAPJ Vol VIII February 2024.pdf
EAPJ Vol VIII February 2024.pdf
 
PUBLISHING AND LITERARY NETWORKS IN THE SOUTH WEST_EBOOK_WCOVER.pdf
PUBLISHING AND LITERARY NETWORKS IN THE SOUTH WEST_EBOOK_WCOVER.pdfPUBLISHING AND LITERARY NETWORKS IN THE SOUTH WEST_EBOOK_WCOVER.pdf
PUBLISHING AND LITERARY NETWORKS IN THE SOUTH WEST_EBOOK_WCOVER.pdf
 
Time Management Techniques for increased productivity and goal achievement
Time Management Techniques for increased productivity and goal achievementTime Management Techniques for increased productivity and goal achievement
Time Management Techniques for increased productivity and goal achievement
 
Let’s get moving! Setting some goals Optimizing your workflow
Let’s get moving! Setting some goals Optimizing your workflowLet’s get moving! Setting some goals Optimizing your workflow
Let’s get moving! Setting some goals Optimizing your workflow
 
2024 Calendar-eXperience MattersThailand
2024 Calendar-eXperience MattersThailand2024 Calendar-eXperience MattersThailand
2024 Calendar-eXperience MattersThailand
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
SARomics Biostructures 2024 Company Presentation
SARomics Biostructures 2024 Company PresentationSARomics Biostructures 2024 Company Presentation
SARomics Biostructures 2024 Company Presentation
 
Your Expert Guide to CX Orchestration & Enhancing Customer Journeys
Your Expert Guide to CX Orchestration & Enhancing Customer JourneysYour Expert Guide to CX Orchestration & Enhancing Customer Journeys
Your Expert Guide to CX Orchestration & Enhancing Customer Journeys
 
Decoding Generative AI-AI Playbook for Marketing Students_UPower DUGA_Supavad...
Decoding Generative AI-AI Playbook for Marketing Students_UPower DUGA_Supavad...Decoding Generative AI-AI Playbook for Marketing Students_UPower DUGA_Supavad...
Decoding Generative AI-AI Playbook for Marketing Students_UPower DUGA_Supavad...
 
Stand Out on the Road with a Creative Box Truck Wrap
Stand Out on the Road with a Creative Box Truck WrapStand Out on the Road with a Creative Box Truck Wrap
Stand Out on the Road with a Creative Box Truck Wrap
 
FICCI Monthly Bulletin February 2024.pdf
FICCI  Monthly Bulletin February 2024.pdfFICCI  Monthly Bulletin February 2024.pdf
FICCI Monthly Bulletin February 2024.pdf
 

Hacking And Its Prevention

  • 1. HACKING & IT’S PREVENTION PUNE POLICE Workshop on Cyber Crime (March 19 – 20, 2009) March 20, 2009
  • 2. Introduction Dinesh Bareja CISA, CISM, ITIL, BS: 7799 (Imp & LA) Email: [email_address] Information Security professional, having more than 11 years of experience in technology in commercial, operational, functional and project management roles on multiple large and small projects in global and domestic markets.   Experienced in establishing ISMS (Information Security Management System), planning and implementation of large scale CobiT® implementation, ISO: 27001, ERM, BCP/DR, BIA, Asset Management, Incident Mgt, Governance and Compliance, VA/PT, AppSec etc   He is also member of ISACA, OCEG, iTSMF and co-founder of Indian Honeynet Project and Open Security Alliance. You can find him on Linked In as the owner of the India – Information Security Community group.
  • 3.
  • 4. The hacker / cracker has TIME ANONYMITY INTELLIGENCE (hopefully not) TOOLS AND INFORMATION MALICIOUS INTENT Hack Hacker Hacking Hack:   // to write computer programs for enjoyment  //to gain access to a computer illegally —  hack it Hacker: //  an expert at programming and solving problems with a computer //  a person who illegally gains access to and sometimes tampers with information in a computer system Crack Cracker Crack:   //  to puzzle out and expose, solve, or reveal the mystery of <crack a code>  //to break into <crack a safe> Cracker: // Hacker // braggart; boaster.
  • 5.
  • 6.
  • 7.
  • 8. Profiling …. the color of your hat ! White Hat Also known as friendly hackers are always using their knowledge for good reasons Black Hat Also known as crackers these are the ones to watch out for, they send and make viruses, destroy data, and deface websites along with other illegal activity and break into peoples machines. This type of hacker has a bad reputation. Grey Hat … Are borderline white/black hats. They sometimes prank unsuspecting users and cause general mayhem. While they think this kind of activity is harmless, they may face long periods of jail time if they ever get found out. Not to forget the hatless….. - Script Kiddies - The Hobbyist - Insider - Countries
  • 9.
  • 10. Are these Black or White ? Kevin Poulsen : “Dark Dante” recognized for his hack of LA radio's KIIS-FM phone lines. Authorities began to pursue him after he hacked into a federal investigation database and during this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information. He served a sentence of five years and since serving time, he has worked as a journalist. As senior editor for Wired News his most prominent article details his work on identifying 744 sex offenders with MySpace profiles. Tsutomu Shimomura : son of Osamu Shimomura, winner of the 2008 Nobel Prize in Chemistry. He was hacked by Kevin Mitnick. Following this personal attack, he helped the FBI capture him by out-hacking Mitnick and had his own dark side These were the Black Hats Robert Tappan Morris :   now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet. Kevin Mitnick : now a productive member of society after five years in jail, about 8 months of it in solitary confinement. Now he is a computer security consultant, author and speaker Adrian Lamo: was breaking into NY Times, Microsoft, Yahoo etc …. currently working as an award-winning journalist and public speaker.
  • 11.
  • 12.
  • 13. Motivation Greed Revenge Curiosity Criminal Intent Coercion Show Off Attack
  • 14. Web Hacking Incident Database Report .. Motivation Attack Goal % Defacement 24% Stealing Sensitive Information 19% Planting Malware 16% Monetary Loss 13% Downtime 8% Phishing 5% Deceit 2% Worm 1% Link Spam 13% Information Warfare 1% Web Hacking Incidents Database Report 2008
  • 15.
  • 16. Tools… a brief listing Trojan Horses - Yuri RAT v1.2 - MofoTro v1.7 BETA - Charon - Beast v2.0.7 - Omerta v1.3 - Theef v2.10 - Combined Forces R.A.T - MoSucker v3.0 - ProRat v1.9 Fix2 Keyloggers - Elite Keylogger v1.0 - SKL v0.1 - KeySpy v2.0 - A++++- Curiosity - Keylogger - KeyCopy Viruses - Hippi virus - Sasser- W32. Blaster .Worm - Midnight Massacre - 00001 - Nimda - Loveletter virus - Happy ‘99 - MXZ Binders - Daemon Crypt Public v- NT Packer v2.1 - EES binder v1.0 - File Injector v3 - Bytes Adder - FreshBind v2.01 - YAB v2.01 - NakedBind v1.0 - Amok Joiner WebHacks/WordLists Brute Forcers - Munga Bunga ’s Official - Brutus - Authentication Engine Test 2 - wwwHack v1.946 - FTP Brute Hacker - FTP Brute Forcer.tar.gz - Unix- Wbrute.tar.gz - Unix- Shadow Scanner - Brute Forcer - Hackers Utility v1.5 - POP3 brute forcer.tar.gz - Unix CGI-Bug Scanners - NStealth HTTP Security Scanner v5.8 - Attack Toolkit v4.1 - Scanarator- Legion NetBios Scanner v2.1 - NetView v1.0 - CGI Vulnerability Scan - CGI Scanner v4.0 - VoidEye CGI scanner Virus Builders - DR VBS - VBSwg 2 beta - Virus builder - p0ke’s WormGen 2.0 - RESIDUO - DoS Virus MSN Hacks & Bots - HoaX Toolbox 1.1 - MSN Extreme 3.0 - MessenPass v1.06 - Advanced Blood Scroller - Nudge Madness - Advanced IM  Password Recovery - Contact Spy - Msn Explosion - Encrypted Messenger Port & IP Scanners - Blues Port Scanner - ProPort v2.2 - SuperScan v3.0 - Net Scan Tools v4.2 - LanSpy v2.0 - ~censored~ Threads v3.1 - Trojan Hunter v1.5 - SuperScan v4.0 - Neotrace PRO v3.25 Nukers And Flooders - Rocket v1.0 - RPCNuke v1.0 - Panther Mode1 - 56k - Panther Mode2 - ISDN + - Final Fortune v2.4 - Battle Pong - Technophoria - Assault v1.0 - ICMP Nuker - CLICK v2.2
  • 17.
  • 19. Web Hacking Incidents Database Report 2008
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 37.
  • 38. Thank You Dinesh Bareja Email: dineshbareja@gmail.com / dinesh@opensecurityalliance.org Phone: 9769890505
  • 39. www.opensecurityalliance.org Join OSA and leverage your knowledge and expertise to provide guidance and direction to community. Help in removing the FUD and misinformation and contribute to practical and usable studies and research that is India centric. This document is created by Open Security Alliance and is released in the public domain under Creative Commons License (Attribution-Noncommercial 2.5 India) http://creativecommons.org/licenses/by-nc-sa/2.5/in/. Sponsored by Secure Matrix India Pvt Ltd. Title:Hacking and it’s Prevention Version: 1.0 / March 20, 2009