20-minute Intro to Hacking

Slides:



Advertisements
Similar presentations
Cyber Safety By Georgia & Emily. The Internet Dos Remember to share guidelines with your students. If you are going to put names on the web make up nicknames.
Advertisements

The Internet: Educates Us Entertains Us Connects us False information
How to be SAFE when you use the internet..
By Pamela McMahon. Find space on the internet In order to build a website, you must have somewhere to build it. You can buy space and customize it anyway.
Introduction to the Internet
Ebinport Students Encourage Internet Safety. “Doing the Right thing online.” January 2012.
World Wide Web Hyperlinks Servers/Clients Browsers HTML (HyperText Markup Language)
4.01 How Web Pages Work.
INTERNET SAFETY FOR STUDENTS
By Diana, Juliana, Melanie
S2 – COMMUNICATIONS UNIT
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional.
August 15 click! 1 Basics Kitsap Regional Library.
Do you know how to keep yourself safe?
INTERNET SAFETY FOR STUDENTS
I Can Stay Safe Online!. We can use the computer to…
Internet Safety Guidelines Elementary Information and graphics obtained from:
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
By Ksenia Primizenkina 8K
Wyatt Pearsall November  HyperText Transfer Protocol.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
By Michael Cebreiro. Hyper linking is an easy way to travel through the computer by one click. It is very easy once you get the hang of it. The first.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Math By Kaylee D. What have you found challenging about math this year? This Year I think something challenging was the pace of the math class. I think.
Viruses, Hacking and Backups By Katie Louise Bieber!
HTML Internet Basics & Beyond. What The Heck Is HTML? HTML is the language of web pages. In order to truly understand HTML, you need to know a little.
December Journal !!. Table of continents 1.) Provide your vital statistics… 2.) What do you like least about math… 3.) What do you like best about math…
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
About Me I love my wife. I love my kids. I love my family. I love Taiwan. I love teaching.
Computer Viruses... a big problem with small solutions.
By Demi Gardiner 8P Who’s been on your computer??
. Here is me sending an with an attachment, you click onto the paper clip icon in order to send the attachment.
Why I Need a Mac Reasons a Mac is Most Trusted It Looks Snazy Mac’s are the most renowned computer. That means they have lots of cool options on cases.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Security CS Introduction to Operating Systems.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Unit 12 Additional Evidence Charlotte Thompson. 1.1 I can describe what types of information are needed. Logo Idea 1 I do not want this logo to be my.
Guide to web safety for Key Stage 1. Being safe on the internet is really important. If you follow these rules at all times you can still have lots of.
Megan Meier Story ABC with Diane Sawyer CNN with Anderson Cooper.
Computers Are Smarter Than Humans Or Are They???
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
The problem that needs to be solved is if a computer career is for me.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
How the Internet Works Most people use the internet but do not know how it works.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
How Web Servers and The Internet Work The Basic Process.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Main Areas for Testing System stability – is the system going to crash or not? System usability – is the system easy to use? System security – is the.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Remember that our latest topics involve a more advanced look at how webpages work
Common Methods Used to Commit Computer Crimes
Internet Identity, Safety, & Security
The Internet.
Testing All Input is Evil pt 2.
Browsing and Searching the Web
What is Computer Science?
BP5 – encryption - Fun gym
Boys & Girls Club of Nampa WizzyWig/ Internet Safety
Safer computing week Create, connect and share respect.
Testing.
Your computer is the client
Testing.
My digital footprint By Ava Brouillette.
Presentation transcript:

20-minute Intro to Hacking Mike Gagnon, Ethical Hacker http://mikegagnon.com

First things first…

Guideline: Never hack someone’s system without their permission Ethical Hacking Be responsible Don’t use hacking for evil It’s easy to be caught, and the penalties are very steep Guideline: Never hack someone’s system without their permission

Why do ethical hackers hack? It’s fun “War games.” Companies hire ethical hackers to hack into their systems so that the companies can learn how to improve their defenses Ethical hackers develop defensive technology Every coder should know how to hack, so that they know how to write “secure code” (which is code that can defend itself from hackers)

How to hack? Hacking = manipulating a system to do something it wasn’t designed to do Like hot wiring a car http://commons.wikimedia.org/wiki/File:Dash_Wires.jpg Hacking computers is often simple (once you know how computers work)

Just like requesting a person to compute something for you How do computers work? For example: What happens when you type google.com in your browser? There is a computer on the Internet whose address is google.com Your computer sends a “request” to that computer The google.com computer computes a “response” and sends it back to your computer Your computer shows the response on your screen google.com computes the response this response is a web page: request Just like requesting a person to compute something for you

Example DoS attack DoS = denial of service Send a request for a very difficult computation It might crash the computer The Air Force once challenged me to hack their radar. That’s how I did it. http://www.ll.mit.edu/mission/cybersec/publications/publication-files/full_papers/2010_06_25_Gagnon_ISARCS_FP.pdf http://commons.wikimedia.org/wiki/File:C-band_Radar-dish_Antenna.jpg

Hack my server! You have my permission to try to crash: http://hackerpuzzle.herokuapp.com But I won’t tell you how It’s a puzzle

Guideline: Never hack someone’s system without their permission I repeat: Be responsible Don’t use hacking for evil It’s easy to be caught, and the penalties are very steep Guideline: Never hack someone’s system without their permission

Teach yourself to hack It can be a career Learn everything you can about how computers work Learn to code Learn math (algebra, calculus, statistics, and beyond) Experiment a lot Find hacking challenges on the Web Be tenacious Be patient Be ethical