Upload
harold-giddings
View
71
Download
8
Embed Size (px)
DESCRIPTION
What is hacking? Is it really a crime or something more?
Citation preview
What Most People Don’t Know What Most People Don’t Know About Hacking And HackersAbout Hacking And Hackers
Ethical HackingEthical Hacking
Hacking Is Two FacedHacking Is Two Faced IllegalIllegal
Hackers can:Hackers can:
Steal Credit Cards, Steal Credit Cards, Identities, Money, etcIdentities, Money, etc
Destroy ComputersDestroy Computersand networksand networks
LegalLegal
Hackers Can:Hackers Can:
Secure your computerSecure your computer Protect you from Protect you from
virusesviruses Create new Create new
technologytechnology Make products betterMake products better And So Much More!And So Much More!
Hacking Is LegalHacking Is Legal(For The Most Part)(For The Most Part)
Hacking is used Hacking is used everyday to keep everyday to keep you safe and you safe and securesecure
Just like a car, its Just like a car, its legal to drive, but legal to drive, but its illegal to speedits illegal to speed
Hacking is legal, Hacking is legal, until you use that until you use that skill to commit a skill to commit a crimecrime
Hackers Make:Hackers Make: Anti-Virus Anti-Virus
ProgramsPrograms Security SuitesSecurity Suites Firewall SoftwareFirewall Software Encryption Encryption
AlgorithmsAlgorithms And so much more!And so much more!
What Its Really AboutWhat Its Really About Hacking is NOT about stealingHacking is NOT about stealingIt’s about:It’s about:
Learning how technology works and using Learning how technology works and using that information to better protect that information to better protect ourselvesourselves
Modifying technology to make it betterModifying technology to make it better Creating software used to protect us on Creating software used to protect us on
and offlineand offline The excitement of learning how something The excitement of learning how something
works to gain a better perspectiveworks to gain a better perspective
What Is a Hacker?What Is a Hacker?
Hackers are Hackers are classified by their classified by their skill, and what they skill, and what they do with that skilldo with that skill
To the right you To the right you will see the will see the different types of different types of hackershackers
White HatWhite Hat
Black HatBlack Hat
Grey HatGrey Hat
The HatsThe Hats White HatWhite Hat
A hacker who hacks their own A hacker who hacks their own security in order to fix holes in that security. They security in order to fix holes in that security. They also hack to learn how technology works and also hack to learn how technology works and better that technology with the skills learned.better that technology with the skills learned.
Black HatBlack HatA hacker who hacks in order to A hacker who hacks in order to
commit a crime, ex: steal credit card informationcommit a crime, ex: steal credit card information
Grey HatGrey HatA hacker who is a mix of the two A hacker who is a mix of the two
above, they hack legally but may also break the above, they hack legally but may also break the law in order to learnlaw in order to learn
Hacking In Computer SecurityHacking In Computer Security
We Will Cover:We Will Cover:
RFID – Radio Frequency IdentificationRFID – Radio Frequency Identification Wireless Security – WiFiWireless Security – WiFi
Wireless SecurityWireless SecurityWiFiWiFi
WiFi by default is open and insecureWiFi by default is open and insecure You can protect yourselfYou can protect yourself
Lock your wireless router down with WEP Lock your wireless router down with WEP or WPAor WPA
WPA is much more secure than WEPWPA is much more secure than WEP
It is possible to crack this security, but it is It is possible to crack this security, but it is much more secure than being openmuch more secure than being open
The best way to secure your wireless The best way to secure your wireless network. Is to use a WIRED networknetwork. Is to use a WIRED network
RFIDRFIDYour Credit Cards Are NOT SafeYour Credit Cards Are NOT Safe
RFID:RFID: Radio Frequency Radio Frequency
IdentificationIdentification
Used in credit cards Used in credit cards such as those that use such as those that use paypasspaypass
Constantly sends your Constantly sends your unencrypted unencrypted information into the information into the airair
Hackers have:Hackers have:
Learned that this can Learned that this can be done easily can be done easily can cheaplycheaply
Learned that Learned that insulating your wallet insulating your wallet with tinfoil will shield with tinfoil will shield your information from your information from transmissiontransmission
Learned how easy it is Learned how easy it is to clone such cards, to clone such cards, and how to protect and how to protect yourselfyourself
Hacking As A HobbyHacking As A Hobby
Hacking is fun.Hacking is fun. It is the practice of learning and It is the practice of learning and
experimentingexperimenting Using the knowledge acquired to Using the knowledge acquired to
create/invent and make current create/invent and make current products betterproducts better
Hacking can be a hobbyHacking can be a hobby
Hacking Game ConsolesHacking Game Consoles
NOTENOTE: Hacking a game console can : Hacking a game console can open it to software piracy, this is for open it to software piracy, this is for the most part why companies do not the most part why companies do not like it, and will void your warranty for like it, and will void your warranty for doing so.doing so.
The purpose of hacking a game The purpose of hacking a game console for the most part is: console for the most part is: Homebrew!Homebrew!
HomebrewHomebrew Homebrew is:Homebrew is:
The creation of software to be run on a device that was not The creation of software to be run on a device that was not intended to run on.intended to run on.
Ex: With the PSP you can hack it, allowing it to execute Ex: With the PSP you can hack it, allowing it to execute code not signed by Sony.code not signed by Sony.
What does this mean?What does this mean? It means you can make:It means you can make: Your own gamesYour own games Your own updatesYour own updates Your own applicationsYour own applications
You can make it better, and you can do what you want with You can make it better, and you can do what you want with your hardware, this is what makes it so appealingyour hardware, this is what makes it so appealing
Not Just About ComputersNot Just About Computers
Hacking is not just for Hacking is not just for computers and computers and electronicselectronics
You can “hack” You can “hack” anything that sparks anything that sparks your interestyour interest
Learn how it works Learn how it works and why it worksand why it works
Examples to your rightExamples to your right
LocksLocks• Learning how to pick Learning how to pick
themthem• Using that knowledge to Using that knowledge to
create un-pickable lockscreate un-pickable locks
PhonesPhones• Experiment and learn Experiment and learn
its securitiesits securities• Use that knowledge to Use that knowledge to
increase the products increase the products securitysecurity
Discovery NewsDiscovery NewsHackers vs. Cyber CrimeHackers vs. Cyber Crime