16

Hacking training

Embed Size (px)

DESCRIPTION

Learn hacking from the best hacking training institute\nOur award-winning trainers are active members of the information Security community. Information security trainers, practicing on live simulations in our on-demand lab environment will train you. The best way to learn is doing practice, not by reading a book or searching hacking tricks online.\nIf you’re a beginner and want to learn ethical hacking, the data provided in this website will assist you out. For simple and straightforward understanding I actually have published this website within the type of question and answer with a number of the frequently asked questions for beginners and enthusiasts. - PowerPoint PPT Presentation

Citation preview

AgendaAgenda

What is a hackerWhat is a hacker What motivates a hackerWhat motivates a hacker The hacking training communityThe hacking training community

Who belongs?Who belongs? The “rules” of the game (aka Hacker The “rules” of the game (aka Hacker

Ethic)Ethic) ConclusionsConclusions

What is a hacker?What is a hacker?

Many ways to describe hackers:Many ways to describe hackers:1.1. Creates and modifies.Creates and modifies.

-computer software and computer hardware-computer software and computer hardware

2.2. Exploits systems and gains unauthorized access. Exploits systems and gains unauthorized access. -through clever tactics and detailed -through clever tactics and detailed

knowledge.knowledge.

3.3. Computer enthusiast/person who enjoys learning Computer enthusiast/person who enjoys learning programming languages.programming languages.

4.4. Someone who breaks into computers.Someone who breaks into computers.5.5. Can make a computer do what they want Can make a computer do what they want 6.6. Anyone who ‘breaks open’ code and manipulates Anyone who ‘breaks open’ code and manipulates

it in a clever or originalit in a clever or original-Not necessarily illegal.-Not necessarily illegal.

Types of Hackers- white Types of Hackers- white hathat

““White Hat”- hired by large White Hat”- hired by large corporations, or governments corporations, or governments Usually as a “Tiger Team”Usually as a “Tiger Team”

Tiger Team is a team that is hired to test Tiger Team is a team that is hired to test the security of networks/find flaws or the security of networks/find flaws or loopholesloopholes

Will snoop around networks, trying to Will snoop around networks, trying to find loopholesfind loopholes If such loophole(s) is/are found – report If such loophole(s) is/are found – report

created explaining how hack was achievedcreated explaining how hack was achieved

Types of Hackers- grey Types of Hackers- grey hathat

““Grey Hat”Grey Hat” UnhiredUnhired People who break into networks for funPeople who break into networks for fun

Usually don’t intentionally cause harm Usually don’t intentionally cause harm (following hacker ethic)(following hacker ethic)

Enjoy doing thisEnjoy doing this Perceived as challengePerceived as challenge Want kudos from hacker peersWant kudos from hacker peers

Want to “test security to prevent such Want to “test security to prevent such attacks in future”attacks in future”

Types of Hackers- black Types of Hackers- black hathat

““Black hat”/crackersBlack hat”/crackers Stereotypical hacker you hear about in the Stereotypical hacker you hear about in the

mediamedia Break into systems and damage themBreak into systems and damage them

May write things like “you just got served by X May write things like “you just got served by X group”group”

May delete files, erase portions of code, etc.May delete files, erase portions of code, etc. ““Crackers” fall under this categoryCrackers” fall under this category

Use reverse engineering of assembly code to make Use reverse engineering of assembly code to make it open source, or to customize it to their likingit open source, or to customize it to their liking

Also known as pirates, or “warez writers”Also known as pirates, or “warez writers”

What motivates a hackerWhat motivates a hacker

To help others To help others ‘‘Hooliganism’Hooliganism’ Criminal intentCriminal intent Financial gain Financial gain Most hacker activity is of a nature where Most hacker activity is of a nature where

money is rarely involved money is rarely involved CuriosityCuriosity Intellectual ChallengeIntellectual Challenge Security heads-up!Security heads-up!

The hacking community- The hacking community- who belongswho belongs

To join, have to be recognizedTo join, have to be recognized Sharing your creations (time, creativity, Sharing your creations (time, creativity,

open source programs)open source programs) Learn to code efficientlyLearn to code efficiently

Hackers like “well-coded” programsHackers like “well-coded” programs Better the program- more kudosBetter the program- more kudos

Become recognized when top hackers Become recognized when top hackers recognize yourecognize you

1.1. reject hierarchies reject hierarchies

2.2. mistrust authority mistrust authority

3.3. promote decentralization promote decentralization

4.4. share information share information 5.5. serve your community (i.e. the hacker serve your community (i.e. the hacker

community)community)

The hacking community- The hacking community- the Hacker Ethicthe Hacker Ethic

Reject HierarchiesReject Hierarchies

User no less important than authorUser no less important than author User may be able to improve productUser may be able to improve product Authors are also users of other’s productsAuthors are also users of other’s products

People are only judged on skillPeople are only judged on skill No social class, age, gender, race restrictionsNo social class, age, gender, race restrictions Open source programsOpen source programs Hacking into secure networksHacking into secure networks

Hackers ignore what society says about classHackers ignore what society says about class Have their own communityHave their own community Have their own systemHave their own system

Mistrust Authority Mistrust Authority

Believe in libertarian environmentBelieve in libertarian environment Everyman for himselfEveryman for himself Government shouldn’t dictate our boundariesGovernment shouldn’t dictate our boundaries

A rule is meant to be brokenA rule is meant to be broken If said can’t be done; green light to do itIf said can’t be done; green light to do it

Increased security= better “problem to Increased security= better “problem to solve”solve” Increased security is better reason to find Increased security is better reason to find

loopholesloopholes

Hacker Joke of the day!!Hacker Joke of the day!!Not your typical hacker

Promote Promote DecentralizationDecentralization

Every man for himself mentalityEvery man for himself mentality Segregation from society goodSegregation from society good

Keeps your identity more secureKeeps your identity more secure More efficient work can be doneMore efficient work can be done

Cooperation can occur over internetCooperation can occur over internet Don’t need to be physically near each otherDon’t need to be physically near each other Communities operate worldwideCommunities operate worldwide

Share InformationShare Information

Believe all info should be freeBelieve all info should be free no restricted infono restricted info

no “top secret” filesno “top secret” files Governments should NOT hide things Governments should NOT hide things

software should be “open source”software should be “open source” Open source= free/no copyrightsOpen source= free/no copyrights Increases awareness of software “out there”Increases awareness of software “out there”

Value of info increases when sharedValue of info increases when shared Data can be basis for learning Data can be basis for learning software can be improved collectivelysoftware can be improved collectively

Serve Your CommunityServe Your Community Contribute to open source projectsContribute to open source projects

Become beta testerBecome beta tester Code new projects to shareCode new projects to share Make improvements to existing onesMake improvements to existing ones

Keep Hacker infrastructure intactKeep Hacker infrastructure intact Make FAQ’s on how to be a hackerMake FAQ’s on how to be a hacker Establish websites/meeting places for Establish websites/meeting places for

hackershackers ““Boring” jobs: maintain mailing lists, Boring” jobs: maintain mailing lists,

project databases/archives, moderate project databases/archives, moderate hacker news groupshacker news groups

ConclusionConclusion

Gave broad overview of Gave broad overview of hackers/hacker culturehackers/hacker culture what is a hacker?what is a hacker?

White hatWhite hat Grey hatGrey hat Black hat/crackerBlack hat/cracker

Hacker motivationsHacker motivations Hacker CommunityHacker Community

Who belongsWho belongs The “rules” of the game (aka Hacker Ethic)The “rules” of the game (aka Hacker Ethic)