The document traces the history of hackers from the 1960s to the present. It describes different types of hackers including white hat, black hat, and grey hat hackers. It also discusses script kiddies and phreakers. The document outlines some common hacking techniques and topics in computer security like penetration testing and the advantages and disadvantages of ethical hacking.
4. The first hacker was appeared in 1960’s at the
Massachusetts Institute Of Technology(MIT)
During the 1970’s, a different kind of hacker
appeared: Phone Phreaker or Phone Hacker
In the 1980’s, phreaks started to migrate to
computers, and the first Bulletin Board
System (BBS) appeared
During the 1990’s, when the use of internet
widespread around the world, hackers
multiplied
5. Hacker
Access computer system or network without
authorization
Breaks the law
Ethical Hacker
Performs most of the same activities but with
owner’s permission
Employed by companies to perform
Penetration Tests
6.
7. White Hat Hacker
Good guys
Don’t use their skill for illegal purpose
Computer security experts and help to protect from
Black Hats.
Black hack Hat Hacker
Bad guys
Use their skill maliciously for personal gain
Hack banks, steal credit cards and deface websites
Grey Hat Hacker
It is a combination of White hat n Black Hat Hackers
Goal of grey hat hackers is to provide national security
8. Script Kiddie:
A Script Kiddie is basically a hacker amateur who
doesn’t has much knowledge to program tools to
breaks into computer networks. He often use
downloaded hacking tools from internet written by
other hackers/security experts.
Phreaker:
Phreaker is a telecom network hacker who
hacks a telephone system illegally to make calls
without paying for them.
13. Advantages
Provides security to banking and financial
establishments
Prevents website defacements
An evolving technique
To catch a thief you have to think like a thief
Disadvantages
All depends upon the trustworthiness of the
ethical hacker
Hiring professionals is expensive.
14.
15.
16. Next generation patch management tool released- Secunia
CSI 7.0
Anonymity tool TOR gains more than 1.2 million users
since NSA PRISM Scandal
Fear of NSA PRISM : Indian Government may ban US
email services for official Communication
CISCO vulnerability allows remote attacker to take control
of Windows System
New York Times. Twitter and Huffington Post Domains
hijacked by Syrian Electronic Army
FBI uses Anonymous Hackers to attack foreign
Governments
Palestinian Hacker , who hacked Zuckerberg’s Facebook
Account to be awarded with $12000
17.
18. It is clear from the graph it is increasing day by
day.
0%
20%
40%
60%
80%
100%
2000-2003
2004-2007
2007-2010
2010-2013