23

Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

Embed Size (px)

Citation preview

Page 1: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system
Page 2: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

Hacker, Cracker?!

Are they the same?

Page 3: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

No!!!

Page 4: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

Hacker

programmers intensely interested in the arcane and recondite

workings of any computer operating system. advanced knowledge of operating systems and

programming languages.– know of holes within systems and the reasons for such holes.

Hackers constantly seek further knowledge, freely share what they have discovered, and never, ever intentionally damage data.

Page 5: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

Cracker

breaks into or otherwise violates the system integrity of remote machines, with malicious intent.

having gained unauthorized access, destroy vital data, deny legitimate users service, or basically cause problems for their targets.

can easily be identified because their actions are malicious.

Page 6: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

Tools for hacking

Scanners

Trojan Horses

Packet sniffing

Password Cracker

Page 7: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

Scanners

In Internet security, no hacking tool is more celebrated than the scanner.

good TCP port scanner is worth a thousand user passwords.

Page 8: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

What Is a Scanner?

program – automatically detects security weaknesses in a

remote or local host.

important to Internet security – reveal weaknesses in the network

Page 9: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

How Do Scanners Work?

Every PC has 65535 port TCP port scanners programs which

– attack TCP/IP ports and services (Telnet or FTP, for example) and record the response from the target.

– glean valuable information about the target host

Page 10: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

What Will a Scanner Tell Me?

reveal certain inherent weaknesses within the target host. – These might be key factors in implementing an

actual compromise of the target's security.

Page 11: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

What Won't a Scanner Tell Me?

A step-by-step method of breaking in

The degree to which your scanning activity has been logged

Page 12: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

Password Cracker

Program – can decrypt passwords or otherwise disable

password protection.– Most of them need not decrypt anything.Real

encrypted passwords cannot be reverse-decrypted.

Page 13: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

Packet sniffing

program captures data from information packets as they travel over the network. data may include

user names, passwords, and proprietary information that travels over the network in clear text.

With perhaps hundreds or thousands of passwords captured by the packet sniffer, intruders can launch widespread attacks on systems.

Installing a packet sniffer does not necessarily require administrator-level access.

Page 14: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

Trojan horse

program – containing hidden functions

can exploit the privileges of the user [running the program], with a resulting security threat.

– does things that the program user did not intend rely on users to install them can be installed by intruders who have gained

unauthorized access by other means.

Page 15: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

What do Trojan horses do?

can do anything that the user executing the program has the privileges to do.Include: – deleting files that the user can delete – transmitting to the intruder any files that the user

can read – changing any files the user can modify installing

viruses – installing other Trojan horses

Page 16: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

– installing other programs with the privileges of the user

programs that provide unauthorized network access

– executing privilege-elevation attacks

Page 17: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

Example of Trojans

Back Orifice NetBus

Page 18: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

The most common attack

DDoS

Page 19: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

DDoS

DDoS(distributed denial-of-service) DoS

– is called a attack(denial-of-service DoS) causes your computer to crash or to become so busy

processing data that you are unable to use it

Page 20: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

Ping of Death

Sending too large ping request. Fragmentation allow to send this large packet.

– When packet re-combine,this will overload the buffer.

Page 21: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

SYN Flooding

Send tons of SYN(SYNchronize) request to server When server send SYN-ACK(ACKnowledge) response,

it can’t send the last acknowledgment request. Result- use up the network buffer.

Page 22: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

Contributes of hacker??

Linux is written by hacker!!

Page 23: Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system

The End