Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presented by: Kevin Regaldo Phillip Dai

Similar presentations


Presentation on theme: "Presented by: Kevin Regaldo Phillip Dai"— Presentation transcript:

1 Presented by: Kevin Regaldo Phillip Dai
Hackers Presented by: Kevin Regaldo Phillip Dai

2 Hacker Defined… Hack (used with computers) verb :
to devise or modify (a computer program), usually skillfully. Hacker: Person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. Hacker definition controversy: Good Hacking vs. Bad Hacking

3 Kinds of Hackers Black Hat: White Hat: Grey Hat: Script Kiddie:
Specialize in accessing networks, remote computers, and/or uses of technology without interest in legality of action. White Hat: Specialize in penetration testing, such as testing own security system, often work as security consultants. Grey Hat: Hacker with borderline ethics may or may not commit crimes during course of exploits. Script Kiddie: Derogatory term used to describe those who use programs developed by others to attack computer systems.

4 Common Programs Vulnerabilty Scanner: Packet Sniffer: Trojan Horse:
Check computers on a network for know weaknesses, Comparable to a port scanner which looks for open “ports” on a computer. Packet Sniffer: Captures data packets used to capture passwords and other data. Trojan Horse: Sets up a back door in a system which allows the intruder access later. Keyloggers: Tool designed to record keystrokes, usually combined with virus, worm, or Trojan horse to remain hidden.

5 Tech Model Railroad Club
Tech Model Railroad Club (TMRC) Where “hackers” originated. Signals and Power Subcomittee would literally ‘hack’ into the power and relays to either improve performance or fix a problem. TMRC “hackers” became the nucleus of MIT’S Artificial Intelligence Lab in early 80’s.

6 Phreaking Phreaking : Phone + Freak Single Frequency Phone Lines
Multi-Frequency Phone Lines 1957, Joe Engressia discovered whistling forth E above middle C or 2600HZ would cause the switch to think the call was over which left the system open to exploitation. Provided free long-distance and international calls

7 Bulletin Board Systems
Computerized Bulletin Board System Started in Chicago 1978 by Ward Christensen and Randy Suess. Went online in Feb 16, 1978 Computer system running software that allows users to connect and log into system. Predecessor to internet forums/chat rooms. Accessed only over a phone line using a modem.

8 Dawn of modern computational hacking
BBS became popular, served as a meeting ground for previously scattered phreakers to share discoveries and experiments. Since BBS was accessed through phone lines, early hackers would use phreaking methods to find open lines and modem numbers belonging to businesses .

9 Kevin Mitnick Black Hat
Started exploiting bus punch cards to get free rides. Hacked: Computers Stole corporate secrets Scrambled phone networks National defense warning system

10 Aftermath… 2 ½ year coast-to-coast hacking spree
“The most wanted computer criminal in United States history” –The Department of Justice Arrested in 1995 Charged with breaking into the Digital Equipment Corporation’s network and stealing software. 5 years in prison (8 months of solitary confinement)

11 Today Inspired 2 movies: Computer security consultant Author/Speaker
Freedom Downtime Takedown Computer security consultant Author/Speaker The Art of Intrusion The Art of Deception

12 Tsutomu Shimomura Research scientist in computational physics
Got hacked by Kevin Mitnick White Hat Helped FBI track down Mitnick Computer security expert for NSA.

13 Tim Berners-Lee Computer scientist MIT Professor World Wide Web
Works for UK govt. to help make data more open and accessible on the web Net Neutrality: “Connectivity with no strings attached.”

14 References http://dictionary.reference.com/browse/hack?&qsrc=2939


Download ppt "Presented by: Kevin Regaldo Phillip Dai"

Similar presentations


Ads by Google