SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
Hacking is not a crime


                            Novizul Evendi
                            karuwak@tlab.co.id




Hat Secure © 2012                                        Hacking is not a crime
http://hatsecure.com                             Padang, 3 May 2012 | UNAND
What Is a Hacker?


  Hacker (computer security),
      who accesses a computer system by circumventing its security
      system
  Hacker (programmer subculture),
      who shares an anti-authoritarian approach to software
      development now associated with the free software movemen
  Hacker (hobbyist),
      who makes innovative customizations or combinations of retail
      electronic and computer equipment


Hat Secure © 2012                                            Hacking is not a crime
http://hatsecure.com                                 Padang, 3 May 2012 | UNAND
Basic Hacking Skills


                       
                           Learn how to program
                       
                           Get one of the open-source Unixes
                           (learn to use and run it)
                       
                           Learn how to use the World Wide Web
                       
                           If you don't have functional English,   learn it!!




Hat Secure © 2012                                                          Hacking is not a crime
http://hatsecure.com                                               Padang, 3 May 2012 | UNAND
Status in the Hacker Culture


       
           Write open-source software
       
           Help test and debug open-source software
       
           Publish useful information
       
           Help keep the infrastructure working
       
           Serve the hacker culture itself




Hat Secure © 2012                                             Hacking is not a crime
http://hatsecure.com                                  Padang, 3 May 2012 | UNAND
Types of Hackers
    Professional hackers
              
                  Black Hats – the Bad Guys
              
                  White Hats – Professional Security Experts


   Criminal Hackers
              
                  Real criminals, are in it for whatever they can get no matter who it hurts


   Disgruntled Employees
              
                  Most dangerous to an enterprise as they are “insiders”



Hat Secure © 2012                                                           Hacking is not a crime
http://hatsecure.com                                                Padang, 3 May 2012 | UNAND
Phase

                       Hacking



Hat Secure © 2012                      Hacking is not a crime
http://hatsecure.com           Padang, 3 May 2012 | UNAND
Phase Hacking #1


     Reconnaissance
         hackers first perform routine and detailed reconnaissance.


         Methods of reconnaissance include Dumpster Diving, Social
         Engineering, Google Searching & Google Hacking, and work
         their way up to more insidious methods such as infiltrating your
         employees environments from coffee shops to simply walking in
         and setting up in a  cubicle and asking a lot of questions.




Hat Secure © 2012                                              Hacking is not a crime
http://hatsecure.com                                   Padang, 3 May 2012 | UNAND
Phase Hacking #2


     Scanning
         can reveal vulnerabilities that create a hit list, or      triage list,
         for hackers to work through.
         Typically, hackers perform port scans and port mapping, while
         attempting to discover what services and versions of services are
         actively available on any open or available ports.




Hat Secure © 2012                                                  Hacking is not a crime
http://hatsecure.com                                       Padang, 3 May 2012 | UNAND
Phase Hacking #3


     Gaining Access
         Open ports can lead to a hacker gaining direct access to
         services and possibly to internal network connections.


         Whether the hacker is successful attacking an internal system
         has much to do with how vulnerable the specific system is, which
         is related to system configurations and architecture.




Hat Secure © 2012                                              Hacking is not a crime
http://hatsecure.com                                   Padang, 3 May 2012 | UNAND
Phase Hacking #4


Maintain Access
 Hackers may choose to continue attacking and exploiting the
 target system, or to explore deeper into the target network and
 look for more systems and services


 Hackers can continue to sniff your network looking for more
 information to use against you.




                                                         Hacking is not a crime
                                                 Padang, 3 May 2012 | UNAND
Phase Hacking #5


     Covering Tracks
         Most hackers will attempt to cover their footprints and tracks as
         carefully as possible.


         Gaining root level access and administrative access is a big part
         of covering one’s tracks as the hacker can remove log entries
         and do so as a privileged administrator as opposed to an
         unknown hacker.




Hat Secure © 2012
http://hatsecure.com
Modes of Hacker Attack



                                    
                                        Over Internet
                                    
                                        Over LAN
                                    
                                        Locally
                                    
                                        Offline
                                    
                                        Theft



Hat Secure © 2012                                         Hacking is not a crime
http://hatsecure.com                              Padang, 3 May 2012 | UNAND
Cyber Crime

Hat Secure © 2012              Hacking is not a crime
http://hatsecure.com   Padang, 3 May 2012 | UNAND
Is Computer Hacking a Crime?
     Computer hacking
            is broadly defined as any action that results in unauthorized
            interference with a computer, computer system or network.

     Computer hacking
            includes breaking into a computer with the intent to steal,
            damage, modify or monitor data or settings within the system.




Hat Secure © 2012                                                    Hacking is not a crime
http://hatsecure.com                                         Padang, 3 May 2012 | UNAND
Cyber crime
       Criminal activity where a computer or computer
       network is source ,tool , target, or place of a crime.




                               • Computer is a target.
                               • Computer is a tool of crime
                               • Computer is incidental to crime




Hat Secure © 2012                                         Hacking is not a crime
http://hatsecure.com                              Padang, 3 May 2012 | UNAND
Cyber Criminals
            
                Children and adolescents
                (between the age group of 6 – 22 years)
            
                Organised hackers
            
                Professional hackers / crackers
            
                Discontented employees

                                     Capacity to store data in small space

                                     Easy to access

                                     Negligence

                                     Loss of evidence



Hat Secure © 2012                                                      Hacking is not a crime
http://hatsecure.com                                           Padang, 3 May 2012 | UNAND
DEMO



               #0x01 Wifi Hacking
               #0x02 Network Hacking
               #0x03 Web Hacking




Hat Secure © 2012                              Hacking is not a crime
http://hatsecure.com                   Padang, 3 May 2012 | UNAND
Question?

Mais conteúdo relacionado

Mais procurados

Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber SecurityGTreasury
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 

Mais procurados (20)

Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 

Destaque

Wireless Hacking Fast Track
Wireless Hacking Fast TrackWireless Hacking Fast Track
Wireless Hacking Fast TrackNovizul Evendi
 
Information System Security
Information System SecurityInformation System Security
Information System SecurityNovizul Evendi
 
Outline course Backtrak Pentest
Outline course Backtrak PentestOutline course Backtrak Pentest
Outline course Backtrak PentestNovizul Evendi
 
Hacking Backtrak Mobile
Hacking Backtrak MobileHacking Backtrak Mobile
Hacking Backtrak MobileNovizul Evendi
 
Modul praktikum hardware dan software
Modul praktikum hardware dan softwareModul praktikum hardware dan software
Modul praktikum hardware dan softwarejoko2016
 
Modul teknisi komputer kursus
Modul teknisi komputer kursusModul teknisi komputer kursus
Modul teknisi komputer kursusalpi sahrin
 
Communication through internet.ppt
Communication through internet.pptCommunication through internet.ppt
Communication through internet.pptgasumova
 

Destaque (14)

E-commerce
E-commerceE-commerce
E-commerce
 
Wireless Hacking Fast Track
Wireless Hacking Fast TrackWireless Hacking Fast Track
Wireless Hacking Fast Track
 
Information System Security
Information System SecurityInformation System Security
Information System Security
 
Dialog Technoprener
Dialog Technoprener Dialog Technoprener
Dialog Technoprener
 
Outline course Backtrak Pentest
Outline course Backtrak PentestOutline course Backtrak Pentest
Outline course Backtrak Pentest
 
Small servers
Small serversSmall servers
Small servers
 
T'Lab
T'LabT'Lab
T'Lab
 
Hacking Backtrak Mobile
Hacking Backtrak MobileHacking Backtrak Mobile
Hacking Backtrak Mobile
 
Modul praktikum hardware dan software
Modul praktikum hardware dan softwareModul praktikum hardware dan software
Modul praktikum hardware dan software
 
Modul teknisi komputer kursus
Modul teknisi komputer kursusModul teknisi komputer kursus
Modul teknisi komputer kursus
 
Virtualisasi Hacking
Virtualisasi HackingVirtualisasi Hacking
Virtualisasi Hacking
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Communication through internet.ppt
Communication through internet.pptCommunication through internet.ppt
Communication through internet.ppt
 

Semelhante a Hacking Is Not Always a Crime

Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudIJSRD
 
Internet security
Internet security Internet security
Internet security Ayesha Rana
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013Imperva
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
Evaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityEvaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityRapidSSLOnline.com
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeBrijesh Joshi
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeESDS Software Solution Pvt. Ltd
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
The Dark Web - What it is & How to Stay Safe.pdf
The Dark Web - What it is & How to Stay Safe.pdfThe Dark Web - What it is & How to Stay Safe.pdf
The Dark Web - What it is & How to Stay Safe.pdfCyber Octet Private Limited
 
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docxPROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docxwoodruffeloisa
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
A Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxA Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxTurboAnchor
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger GiralFaurel
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESIJNSA Journal
 
Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option Seculert
 

Semelhante a Hacking Is Not Always a Crime (20)

Challenges2013
Challenges2013Challenges2013
Challenges2013
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
Internet security
Internet security Internet security
Internet security
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Evaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityEvaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise Mobility
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
The Dark Web - What it is & How to Stay Safe.pdf
The Dark Web - What it is & How to Stay Safe.pdfThe Dark Web - What it is & How to Stay Safe.pdf
The Dark Web - What it is & How to Stay Safe.pdf
 
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docxPROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
A Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxA Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptx
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
 
Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option
 

Último

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Hacking Is Not Always a Crime

  • 1. Hacking is not a crime Novizul Evendi karuwak@tlab.co.id Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 2. What Is a Hacker? Hacker (computer security), who accesses a computer system by circumventing its security system Hacker (programmer subculture), who shares an anti-authoritarian approach to software development now associated with the free software movemen Hacker (hobbyist), who makes innovative customizations or combinations of retail electronic and computer equipment Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 3. Basic Hacking Skills  Learn how to program  Get one of the open-source Unixes (learn to use and run it)  Learn how to use the World Wide Web  If you don't have functional English, learn it!! Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 4. Status in the Hacker Culture  Write open-source software  Help test and debug open-source software  Publish useful information  Help keep the infrastructure working  Serve the hacker culture itself Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 5. Types of Hackers Professional hackers  Black Hats – the Bad Guys  White Hats – Professional Security Experts Criminal Hackers  Real criminals, are in it for whatever they can get no matter who it hurts Disgruntled Employees  Most dangerous to an enterprise as they are “insiders” Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 6. Phase Hacking Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 7. Phase Hacking #1 Reconnaissance hackers first perform routine and detailed reconnaissance. Methods of reconnaissance include Dumpster Diving, Social Engineering, Google Searching & Google Hacking, and work their way up to more insidious methods such as infiltrating your employees environments from coffee shops to simply walking in and setting up in a  cubicle and asking a lot of questions. Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 8. Phase Hacking #2 Scanning can reveal vulnerabilities that create a hit list, or triage list, for hackers to work through. Typically, hackers perform port scans and port mapping, while attempting to discover what services and versions of services are actively available on any open or available ports. Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 9. Phase Hacking #3 Gaining Access Open ports can lead to a hacker gaining direct access to services and possibly to internal network connections. Whether the hacker is successful attacking an internal system has much to do with how vulnerable the specific system is, which is related to system configurations and architecture. Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 10. Phase Hacking #4 Maintain Access Hackers may choose to continue attacking and exploiting the target system, or to explore deeper into the target network and look for more systems and services Hackers can continue to sniff your network looking for more information to use against you. Hacking is not a crime Padang, 3 May 2012 | UNAND
  • 11. Phase Hacking #5 Covering Tracks Most hackers will attempt to cover their footprints and tracks as carefully as possible. Gaining root level access and administrative access is a big part of covering one’s tracks as the hacker can remove log entries and do so as a privileged administrator as opposed to an unknown hacker. Hat Secure © 2012 http://hatsecure.com
  • 12. Modes of Hacker Attack  Over Internet  Over LAN  Locally  Offline  Theft Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 13. Cyber Crime Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 14. Is Computer Hacking a Crime? Computer hacking is broadly defined as any action that results in unauthorized interference with a computer, computer system or network. Computer hacking includes breaking into a computer with the intent to steal, damage, modify or monitor data or settings within the system. Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 15. Cyber crime Criminal activity where a computer or computer network is source ,tool , target, or place of a crime.  • Computer is a target.  • Computer is a tool of crime  • Computer is incidental to crime Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 16. Cyber Criminals  Children and adolescents (between the age group of 6 – 22 years)  Organised hackers  Professional hackers / crackers  Discontented employees Capacity to store data in small space Easy to access Negligence Loss of evidence Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND
  • 17. DEMO #0x01 Wifi Hacking #0x02 Network Hacking #0x03 Web Hacking Hat Secure © 2012 Hacking is not a crime http://hatsecure.com Padang, 3 May 2012 | UNAND