Upload
hackingtraining
View
40
Download
0
Embed Size (px)
DESCRIPTION
Learn hacking from the best hacking training institute\nOur award-winning trainers are active members of the information Security community. Information security trainers, practicing on live simulations in our on-demand lab environment will train you. The best way to learn is doing practice, not by reading a book or searching hacking tricks online.\nIf you’re a beginner and want to learn ethical hacking, the data provided in this website will assist you out. For simple and straightforward understanding I actually have published this website within the type of question and answer with a number of the frequently asked questions for beginners and enthusiasts. - PowerPoint PPT Presentation
Citation preview
AgendaAgenda
What is a hackerWhat is a hacker What motivates a hackerWhat motivates a hacker The hacking training communityThe hacking training community
Who belongs?Who belongs? The “rules” of the game (aka Hacker The “rules” of the game (aka Hacker
Ethic)Ethic) ConclusionsConclusions
What is a hacker?What is a hacker?
Many ways to describe hackers:Many ways to describe hackers:1.1. Creates and modifies.Creates and modifies.
-computer software and computer hardware-computer software and computer hardware
2.2. Exploits systems and gains unauthorized access. Exploits systems and gains unauthorized access. -through clever tactics and detailed -through clever tactics and detailed
knowledge.knowledge.
3.3. Computer enthusiast/person who enjoys learning Computer enthusiast/person who enjoys learning programming languages.programming languages.
4.4. Someone who breaks into computers.Someone who breaks into computers.5.5. Can make a computer do what they want Can make a computer do what they want 6.6. Anyone who ‘breaks open’ code and manipulates Anyone who ‘breaks open’ code and manipulates
it in a clever or originalit in a clever or original-Not necessarily illegal.-Not necessarily illegal.
Types of Hackers- white Types of Hackers- white hathat
““White Hat”- hired by large White Hat”- hired by large corporations, or governments corporations, or governments Usually as a “Tiger Team”Usually as a “Tiger Team”
Tiger Team is a team that is hired to test Tiger Team is a team that is hired to test the security of networks/find flaws or the security of networks/find flaws or loopholesloopholes
Will snoop around networks, trying to Will snoop around networks, trying to find loopholesfind loopholes If such loophole(s) is/are found – report If such loophole(s) is/are found – report
created explaining how hack was achievedcreated explaining how hack was achieved
Types of Hackers- grey Types of Hackers- grey hathat
““Grey Hat”Grey Hat” UnhiredUnhired People who break into networks for funPeople who break into networks for fun
Usually don’t intentionally cause harm Usually don’t intentionally cause harm (following hacker ethic)(following hacker ethic)
Enjoy doing thisEnjoy doing this Perceived as challengePerceived as challenge Want kudos from hacker peersWant kudos from hacker peers
Want to “test security to prevent such Want to “test security to prevent such attacks in future”attacks in future”
Types of Hackers- black Types of Hackers- black hathat
““Black hat”/crackersBlack hat”/crackers Stereotypical hacker you hear about in the Stereotypical hacker you hear about in the
mediamedia Break into systems and damage themBreak into systems and damage them
May write things like “you just got served by X May write things like “you just got served by X group”group”
May delete files, erase portions of code, etc.May delete files, erase portions of code, etc. ““Crackers” fall under this categoryCrackers” fall under this category
Use reverse engineering of assembly code to make Use reverse engineering of assembly code to make it open source, or to customize it to their likingit open source, or to customize it to their liking
Also known as pirates, or “warez writers”Also known as pirates, or “warez writers”
What motivates a hackerWhat motivates a hacker
To help others To help others ‘‘Hooliganism’Hooliganism’ Criminal intentCriminal intent Financial gain Financial gain Most hacker activity is of a nature where Most hacker activity is of a nature where
money is rarely involved money is rarely involved CuriosityCuriosity Intellectual ChallengeIntellectual Challenge Security heads-up!Security heads-up!
The hacking community- The hacking community- who belongswho belongs
To join, have to be recognizedTo join, have to be recognized Sharing your creations (time, creativity, Sharing your creations (time, creativity,
open source programs)open source programs) Learn to code efficientlyLearn to code efficiently
Hackers like “well-coded” programsHackers like “well-coded” programs Better the program- more kudosBetter the program- more kudos
Become recognized when top hackers Become recognized when top hackers recognize yourecognize you
1.1. reject hierarchies reject hierarchies
2.2. mistrust authority mistrust authority
3.3. promote decentralization promote decentralization
4.4. share information share information 5.5. serve your community (i.e. the hacker serve your community (i.e. the hacker
community)community)
The hacking community- The hacking community- the Hacker Ethicthe Hacker Ethic
Reject HierarchiesReject Hierarchies
User no less important than authorUser no less important than author User may be able to improve productUser may be able to improve product Authors are also users of other’s productsAuthors are also users of other’s products
People are only judged on skillPeople are only judged on skill No social class, age, gender, race restrictionsNo social class, age, gender, race restrictions Open source programsOpen source programs Hacking into secure networksHacking into secure networks
Hackers ignore what society says about classHackers ignore what society says about class Have their own communityHave their own community Have their own systemHave their own system
Mistrust Authority Mistrust Authority
Believe in libertarian environmentBelieve in libertarian environment Everyman for himselfEveryman for himself Government shouldn’t dictate our boundariesGovernment shouldn’t dictate our boundaries
A rule is meant to be brokenA rule is meant to be broken If said can’t be done; green light to do itIf said can’t be done; green light to do it
Increased security= better “problem to Increased security= better “problem to solve”solve” Increased security is better reason to find Increased security is better reason to find
loopholesloopholes
Promote Promote DecentralizationDecentralization
Every man for himself mentalityEvery man for himself mentality Segregation from society goodSegregation from society good
Keeps your identity more secureKeeps your identity more secure More efficient work can be doneMore efficient work can be done
Cooperation can occur over internetCooperation can occur over internet Don’t need to be physically near each otherDon’t need to be physically near each other Communities operate worldwideCommunities operate worldwide
Share InformationShare Information
Believe all info should be freeBelieve all info should be free no restricted infono restricted info
no “top secret” filesno “top secret” files Governments should NOT hide things Governments should NOT hide things
software should be “open source”software should be “open source” Open source= free/no copyrightsOpen source= free/no copyrights Increases awareness of software “out there”Increases awareness of software “out there”
Value of info increases when sharedValue of info increases when shared Data can be basis for learning Data can be basis for learning software can be improved collectivelysoftware can be improved collectively
Serve Your CommunityServe Your Community Contribute to open source projectsContribute to open source projects
Become beta testerBecome beta tester Code new projects to shareCode new projects to share Make improvements to existing onesMake improvements to existing ones
Keep Hacker infrastructure intactKeep Hacker infrastructure intact Make FAQ’s on how to be a hackerMake FAQ’s on how to be a hacker Establish websites/meeting places for Establish websites/meeting places for
hackershackers ““Boring” jobs: maintain mailing lists, Boring” jobs: maintain mailing lists,
project databases/archives, moderate project databases/archives, moderate hacker news groupshacker news groups
ConclusionConclusion
Gave broad overview of Gave broad overview of hackers/hacker culturehackers/hacker culture what is a hacker?what is a hacker?
White hatWhite hat Grey hatGrey hat Black hat/crackerBlack hat/cracker
Hacker motivationsHacker motivations Hacker CommunityHacker Community
Who belongsWho belongs The “rules” of the game (aka Hacker Ethic)The “rules” of the game (aka Hacker Ethic)