introduction to hacking, hackers & hacktivism

58
HACKING, HACKERS & HACKTIVISM Ankit Singh Baliyan (1109713018)

Upload: ankit-baliyan

Post on 13-Apr-2017

2.060 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Introduction to Hacking, Hackers & Hacktivism

HACKING, HACKERS & HACKTIVISM

• Ankit Singh Baliyan (1109713018)

Page 2: Introduction to Hacking, Hackers & Hacktivism

TOPICS COVERED IN THIS PRESENTATION

DEFINITIONS OF HACKING TYPES OF HACKING EFFECT OF HACKING PURPOSE OF HACKING DEFINITION OF HACKER HACKERS AND CRACKERS HACKTIVISM CONCLUSION

Page 3: Introduction to Hacking, Hackers & Hacktivism

What is the meaning of Hack/Hacking? Dictionary –

To cut, notch, slice, chop, or sever (something) with or as with heavy, irregular blows (often followed by up  or down  ): to hack meat; to hack down trees.

Computing Dictionary – Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.

Page 4: Introduction to Hacking, Hackers & Hacktivism

Definition of Hacking :

Authorized or unauthorized attempts to bypass the security mechanisms of an information system or network.

Stealing of the data and information from someone else’s computer or network without the prior permission of the owner.

Breaking into someone else’s Computer System, Often on a network.

Bypasses password or licenses in computer program.

Page 5: Introduction to Hacking, Hackers & Hacktivism

Types of Hacking

Website Hacking. E-mail Hacking. Network Hacking. Password Hacking. Online Banking Hacking. Computer Hacking.

Page 6: Introduction to Hacking, Hackers & Hacktivism

Website Hacking..

Page 7: Introduction to Hacking, Hackers & Hacktivism

SQL Injection Attacks – Using SQL injections, attackers can:

Add new data to the databaseCould be embarrassing to find yourself selling politically incorrect

items on an eCommerce siteUsername – 1’ or ‘1’=‘1 Password - 1’ or ‘1’=‘1

Modify data currently in the databaseCould be very costly to have an expensive item suddenly be deeply

‘discounted’Perform an UPDATE in the injected SQL

Page 8: Introduction to Hacking, Hackers & Hacktivism

E-mail Hacking…

Page 9: Introduction to Hacking, Hackers & Hacktivism

Network Hacking...

Page 10: Introduction to Hacking, Hackers & Hacktivism

Password Cracking….

Page 11: Introduction to Hacking, Hackers & Hacktivism

Online Banking Hacking..

Page 12: Introduction to Hacking, Hackers & Hacktivism

Computer Hacking..

Page 13: Introduction to Hacking, Hackers & Hacktivism

Who is a “HACKER” ?

Page 14: Introduction to Hacking, Hackers & Hacktivism

INTRODUCTION

• A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers.

• Hacker is a person who access computer system and network without authorization.

• There are 3 types of hacker which are white hat, black hat and grey hat

Page 15: Introduction to Hacking, Hackers & Hacktivism

Types of Hackers

Page 16: Introduction to Hacking, Hackers & Hacktivism

White-hat Hackers The good guys who identify the security

weakness of the system or network and inform the owner about them.

Page 17: Introduction to Hacking, Hackers & Hacktivism

Black Hat Hackers A black hat hacker is the villain or bad guy, who

crash into victim’s security to steal information and destroy the victims security network.

Page 18: Introduction to Hacking, Hackers & Hacktivism

Grey hat Hackers A grey hat hacker, in the hacking community,

refers to a skilled hacker who is somewhere in between white and black hat hackers.

Page 19: Introduction to Hacking, Hackers & Hacktivism

The difference of Hacking and CrackingHack

A hacker is a person who is proficient with computers and/or programming to an elite level where they know all of the in's and out's of a system.

CrackA cracker is a hacker who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses etc.

Page 20: Introduction to Hacking, Hackers & Hacktivism

World’s Most Famous Hacker

Stephen Wozniak

Tsutomu Shimomura

Kevin Mitnick

At the time of his arrest, he was the most-wanted computer criminal in the United States.

Page 21: Introduction to Hacking, Hackers & Hacktivism

PURPOSE OF HACKING• To steal

Money Important data / information

• To test their knowledge in understanding network and computer system

• To harm someone’s privacy

• To become a cyber warrior

• To espionage other people

Page 22: Introduction to Hacking, Hackers & Hacktivism

• Data loss

• Increasing maintenance cost

• Negative reputation

Page 23: Introduction to Hacking, Hackers & Hacktivism

Hacktivism

Page 24: Introduction to Hacking, Hackers & Hacktivism

HACKTIVISM

The act of hacking, or breaking into computer system,for a political or socially motivated purpose. The individual who performs an act of Hacktivism is said to be a Hacktivist.

They uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause.

Page 25: Introduction to Hacking, Hackers & Hacktivism

Hacktivism(The war on…)

Page 26: Introduction to Hacking, Hackers & Hacktivism

What is Hacktivism?

Page 27: Introduction to Hacking, Hackers & Hacktivism

What is Hacktivism

Well it’s a portmanteau of…

Page 28: Introduction to Hacking, Hackers & Hacktivism

What is Hacktivism

Well it’s a portmanteau of…

Hacking…

Page 29: Introduction to Hacking, Hackers & Hacktivism

What is Hacktivism

Well it’s a portmanteau of…

Hacking…

and activism.

Page 30: Introduction to Hacking, Hackers & Hacktivism

So what is hacking?

Page 31: Introduction to Hacking, Hackers & Hacktivism

Not This.

Page 32: Introduction to Hacking, Hackers & Hacktivism
Page 33: Introduction to Hacking, Hackers & Hacktivism

Learning and Sharing the KnowledgeInformation wants to be free!

Page 34: Introduction to Hacking, Hackers & Hacktivism

Hacking + Activism =

Page 35: Introduction to Hacking, Hackers & Hacktivism

Hacking + Activism =

Page 36: Introduction to Hacking, Hackers & Hacktivism

Expecting this…

Page 37: Introduction to Hacking, Hackers & Hacktivism

So what is hacktivism?

Involves…1. Repurposing of Technology

Page 38: Introduction to Hacking, Hackers & Hacktivism

So what is hacktivism?

Involves…1. Repurposing of Technology2. Better understanding of technology (including traditional

technologies)

Page 39: Introduction to Hacking, Hackers & Hacktivism

So what is hacktivism?

Involves…1. Repurposing of Technology2. Better understanding of technology (including traditional

technologies)3. Promoting education of these technologies (they should not be

foreign to us).

Page 40: Introduction to Hacking, Hackers & Hacktivism

So what is hacktivism?

Involves…1. Repurposing of Technology2. Better understanding of technology (including traditional

technologies)3. Promoting education of these technologies (they should not be

foreign to us).4. Possibly with a sense of whimsy

Page 41: Introduction to Hacking, Hackers & Hacktivism

So what is hacktivism?

Involves…1. Repurposing of Technology2. Better understanding of technology (including traditional

technologies)3. Promoting education of these technologies (they should not be

foreign to us).4. Possibly with a sense of whimsy5. Done for a social cause.

Page 42: Introduction to Hacking, Hackers & Hacktivism

A brief history of Hacktivism

Page 43: Introduction to Hacking, Hackers & Hacktivism

WANK Worm

According to Julian Assange, the WANK worm is the first instance of hacktivism. On Oct. 16, 1989, during the Cold War when nuclear war was an immediate possibility, hackers hit the NASA computers with the WANK Worm. Two days prior to the launch of the plutonium-fueled Galileo space probe from the Kennedy Space Station, NASA employees logged on to see a humorous yet frightening welcome screen: "Your computer has been officially WANKed. You talk of times of peace for all, and then prepare for war," and "Remember, even if you win the rat race, you're still a rat." The machines of the U.S. Department of Energy and NASA worldwide had been penetrated by the anti-nuclear WANK (WORMS AGAINST NUCLEAR KILLERS) worm.

Page 44: Introduction to Hacking, Hackers & Hacktivism

The Rise of Hacktivism

The Mentor

Page 45: Introduction to Hacking, Hackers & Hacktivism

The Mentor 1

But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?

I am a hacker, enter my world...

Page 46: Introduction to Hacking, Hackers & Hacktivism

The Mentor 2

Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me...

Damn underachiever. They're all alike.

Page 47: Introduction to Hacking, Hackers & Hacktivism

The Mentor 3

Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.

That year…Julian Assange get’s his first computerJeremy Hammond is Born

Page 48: Introduction to Hacking, Hackers & Hacktivism

Electronic Disturbance Theater

Page 49: Introduction to Hacking, Hackers & Hacktivism

Wikileaks

Leaking site Developed by Julian Assange Background as a hacker Endorses Hacktivist ethic: information wants to be free.

22:50 https://www.youtube.com/watch?v=PvmfOaZ34Pk

Page 50: Introduction to Hacking, Hackers & Hacktivism

Anonymous• Suddenly emerged in 2008

• At the beginning it was composed of professionals → Now anyone can participate

Page 51: Introduction to Hacking, Hackers & Hacktivism

Anonymous• GOALS: end with the oppression from governments and other

organizations on the Interneto “We want to fight the powers-that-be when they overstep the lines.”

• Conciousness o "I'm not under the illusion that we're going to change the world,but if we can make a

big enough noise for people to notice there's a problem and scream loud enough, someone's going to take notice. That's what Anonymous is."

Scottish Activist

Page 52: Introduction to Hacking, Hackers & Hacktivism

Questions

How can we influence policy decisions on surveillance & protest our invasion of privacy?

Page 53: Introduction to Hacking, Hackers & Hacktivism

Questions

How can we influence policy decisions on surveillance & protest our invasion of privacy?

: First we have to educate our peers.

Page 54: Introduction to Hacking, Hackers & Hacktivism

Questions

How can we influence policy decisions on surveillance & protest our invasion of privacy?

: First we have to educate our peers. Keep Talking. Spread the word.

Page 55: Introduction to Hacking, Hackers & Hacktivism

Conclusion

Hacking is a good computing skill that can be used for good or bad intention.

Hacking does not mean using your computing skills to do bad. Society have forgotten the difference between

crackers and hackers.

Learning skills of hacking is only for the greater good.

The End

Page 56: Introduction to Hacking, Hackers & Hacktivism
Page 57: Introduction to Hacking, Hackers & Hacktivism

References

http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking.htm http://whatishacking.org/ http://whatismyipaddress.com/hacking http://dictionary.reference.com/browse/hacker?s=t http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_cracking http://answers.yahoo.com/question/index?qid=20071206182542AA3JzNy http://www.huffingtonpost.co.uk/eva-blumdumontet/29c3-hacking-politics_b_25125

73.html http://answers.yahoo.com/question/index?qid=20110801131429AAFTktO http://www.cs.berkeley.edu/~bh/hacker.html http://www.ehow.com/about_4673738_why-do-people-hack.html http://venturebeat.com/2011/12/28/anonymous-stratfor-hack-10-things-to-know/ http://www.slideshare.net/TerroWhite/ethical-hacking-and-it-security-training http://www.switched.com/2011/02/24/what-to-do-email-account-hacked/

Thank You

Page 58: Introduction to Hacking, Hackers & Hacktivism

Any **Queries ?

**Ask@Your Own Risk