by carlos g. coca. originally a person who was skilled at programming language who was able to...
TRANSCRIPT
![Page 1: By Carlos G. Coca. Originally a person who was skilled at programming language who was able to create/alter web content. Now: “A person who illegally](https://reader036.vdocuments.mx/reader036/viewer/2022082710/56649dc55503460f94ab969b/html5/thumbnails/1.jpg)
HACKING STRATEGIES:By Carlos G. Coca
![Page 2: By Carlos G. Coca. Originally a person who was skilled at programming language who was able to create/alter web content. Now: “A person who illegally](https://reader036.vdocuments.mx/reader036/viewer/2022082710/56649dc55503460f94ab969b/html5/thumbnails/2.jpg)
“Hacker”Then and now
Originally a person who was skilled at programming language who was able to create/alter web content.
Now: “A person who illegally gains access to and sometimes tampers with information in a computer system.” Merriam-Webster definition
![Page 3: By Carlos G. Coca. Originally a person who was skilled at programming language who was able to create/alter web content. Now: “A person who illegally](https://reader036.vdocuments.mx/reader036/viewer/2022082710/56649dc55503460f94ab969b/html5/thumbnails/3.jpg)
Types of Hackers
White Hat Help prevent weak
systems from being hacked.
Make web safer for individuals.
Black Hat Cause problems for
individuals, companies and government.
Steal identities, money and add viruses.
![Page 4: By Carlos G. Coca. Originally a person who was skilled at programming language who was able to create/alter web content. Now: “A person who illegally](https://reader036.vdocuments.mx/reader036/viewer/2022082710/56649dc55503460f94ab969b/html5/thumbnails/4.jpg)
Ways to hack:
SQL injections
Worms
Encryption
![Page 5: By Carlos G. Coca. Originally a person who was skilled at programming language who was able to create/alter web content. Now: “A person who illegally](https://reader036.vdocuments.mx/reader036/viewer/2022082710/56649dc55503460f94ab969b/html5/thumbnails/5.jpg)
SQL Injections
SQL = Structured Query Language Used to interact with databases.
Step 1: Hackers find holes in coding design.
Step 2: Add their own SQL into a database.
Step 3: Obtain information.
![Page 6: By Carlos G. Coca. Originally a person who was skilled at programming language who was able to create/alter web content. Now: “A person who illegally](https://reader036.vdocuments.mx/reader036/viewer/2022082710/56649dc55503460f94ab969b/html5/thumbnails/6.jpg)
Ways to prevent
Whitelisting Enables a program
to check through a list of allowed characters.
Harder to give the database orders since they’re not allowed in the application.
Blacklisting Tells program to
immediately deny: Certain characters. Combinations of
characters.
![Page 7: By Carlos G. Coca. Originally a person who was skilled at programming language who was able to create/alter web content. Now: “A person who illegally](https://reader036.vdocuments.mx/reader036/viewer/2022082710/56649dc55503460f94ab969b/html5/thumbnails/7.jpg)
Malware – Worms
Infect systems and search for other systems to infect without user interaction.
Starts slow then “snowballs” and becomes more and more devastating.
Conflicker worm.
![Page 8: By Carlos G. Coca. Originally a person who was skilled at programming language who was able to create/alter web content. Now: “A person who illegally](https://reader036.vdocuments.mx/reader036/viewer/2022082710/56649dc55503460f94ab969b/html5/thumbnails/8.jpg)
Encryption
Encryption is used to hide passwords. Hackers attack in three ways.
Brute force attack: Program goes through every possible
combination. Dictionary attack:
Uses a downloaded list of common passwords and enters them rapidly.
Cryptanalysis attack: Takes a long hash and breaks it down into
smaller segments and tries answering smaller pieces of the puzzle at one time.
![Page 9: By Carlos G. Coca. Originally a person who was skilled at programming language who was able to create/alter web content. Now: “A person who illegally](https://reader036.vdocuments.mx/reader036/viewer/2022082710/56649dc55503460f94ab969b/html5/thumbnails/9.jpg)
Questions?