by carlos g. coca. originally a person who was skilled at programming language who was able to...

9
HACKING STRATEGIES: By Carlos G. Coca

Upload: arron-waters

Post on 24-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally

HACKING STRATEGIES:By Carlos G. Coca

Page 2: By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally

“Hacker”Then and now

Originally a person who was skilled at programming language who was able to create/alter web content.

Now: “A person who illegally gains access to and sometimes tampers with information in a computer system.” Merriam-Webster definition

Page 3: By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally

Types of Hackers

White Hat Help prevent weak

systems from being hacked.

Make web safer for individuals.

Black Hat Cause problems for

individuals, companies and government.

Steal identities, money and add viruses.

Page 4: By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally

Ways to hack:

SQL injections

Worms

Encryption

Page 5: By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally

SQL Injections

SQL = Structured Query Language Used to interact with databases.

Step 1: Hackers find holes in coding design.

Step 2: Add their own SQL into a database.

Step 3: Obtain information.

Page 6: By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally

Ways to prevent

Whitelisting Enables a program

to check through a list of allowed characters.

Harder to give the database orders since they’re not allowed in the application.

Blacklisting Tells program to

immediately deny: Certain characters. Combinations of

characters.

Page 7: By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally

Malware – Worms

Infect systems and search for other systems to infect without user interaction.

Starts slow then “snowballs” and becomes more and more devastating.

Conflicker worm.

Page 8: By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally

Encryption

Encryption is used to hide passwords. Hackers attack in three ways.

Brute force attack: Program goes through every possible

combination. Dictionary attack:

Uses a downloaded list of common passwords and enters them rapidly.

Cryptanalysis attack: Takes a long hash and breaks it down into

smaller segments and tries answering smaller pieces of the puzzle at one time.

Page 9: By Carlos G. Coca.  Originally a person who was skilled at programming language who was able to create/alter web content.  Now: “A person who illegally

Questions?