Presentation is loading. Please wait.

Presentation is loading. Please wait.

By Kevin Eldridge, Brady Doherty, and Jacob Ratajczak

Similar presentations


Presentation on theme: "By Kevin Eldridge, Brady Doherty, and Jacob Ratajczak"— Presentation transcript:

1 By Kevin Eldridge, Brady Doherty, and Jacob Ratajczak
Hackers and Hacks By Kevin Eldridge, Brady Doherty, and Jacob Ratajczak

2 Definition: Hacking Unauthorized intrusion into a computer or a network. The individual engaged in the hacking activities is known as the “hacker.”

3 Common Techniques Amongst Hackers
Vulnerability Scanner - Trojan Horse Password Cracking - Viruses Packet Sniffer - Keyloggers Spoofing Attack - DoS & DDoS Root Kit ** However, not all hackers and hacking techniques involve malevolent intentions.

4 White-Hat Hackers Ethical Hackers Good guys
Remove a virus and conduct penetration testing Permission to engage a target and comprise the system Use ethical hacking tools techniques and methodologies Disclose every vulnerability in order to secure the organization’s network or system and Fix the issue before it is exploited by a malicious hacker

5 Black-Hat Hackers Bad guys – no permission & evil intentions
Try to find weaknesses within other companies or banks with weak security Practice of what they learned early on

6 Grey-Hat Hackers Will not steal money or information
Make up most of the hacking world Will disclose loophole or vulnerabilities to law enforcement or the intelligence agencies Notify the administrator or owner of the system about the vulnerability Offer to nominal fee in order to fix the vulnerability Breaking laws depending on where they are & where their targets are

7 Red-Hat Hackers Vigilantes
Mostly are like White Hat Hacker as they halt Black Hat Hackers Shut that person down with uploading a virus, doing a DoS attack or try to access their computer destroying it Levels of hacking in government agencies, top-secret informations hubs Their aggressive methods can force the cracker into having to get a new computer

8 Script Kiddies •Do not care about hacking
•Use code and can use it as a virus or for other purposes Never hacks for themselves and just download the software Will watch YouTube videos in order to learn about the tool

9 Prominent Hacking Groups
Homebrew Computer Club Legion of Doom Chaos Computer Club Lizard Squad Anonymous

10 Homebrew Computer Club
Informal hacking group No longer in existence Produced numerous computer engineers and distinguished hackers

11 Legion of Doom One of the most influential groups within technology history Hacker Manifesto Contributed significantly to the pantheon of world hacking knowledge

12 Chaos Computer Club Europe’s largest hacking group.
Strong advocates for government transparency and computer/information access.

13 Lizard Squad Black hat hacking group, primarily known for DDoS attacks. Disbanded on September , only to return later on and claim responsibility for various attacks.

14 Anonymous One of the most iconic and popular hacking groups today.
Primary guiding value is ‘anti- oppression’.

15 Infamous Hackers: Kevin Mitnick

16 Infamous Hackers: Jonathan James

17 Infamous Hackers: Paras Jha

18 Phases of a Hack RECONNAISSANCE SCANNING GAINING ACCESS
MAINTAINING ACCESS CLEARING TRACKS

19 Target Data Breach Hacking Technique Used: PHISHING
110 million users and 41 million retail card accounts Phishing attack against HVAC vendor Fazio Mechanical Service (FMS)

20 GitHub DDoS Attack Hacking Technique Used: DDoS
1.3Tbps nailed GitHub for minutes Hacker compromises 100,000 unauthenticated servers that are exposed online

21 References https://www.techopedia.com/definition/26361/hacking


Download ppt "By Kevin Eldridge, Brady Doherty, and Jacob Ratajczak"

Similar presentations


Ads by Google