14
What Most People Don’t What Most People Don’t Know About Hacking And Know About Hacking And Hackers Hackers Ethical Hacking Ethical Hacking

Ethical hacking

Embed Size (px)

DESCRIPTION

What is hacking? Is it really a crime or something more?

Citation preview

Page 1: Ethical hacking

What Most People Don’t Know What Most People Don’t Know About Hacking And HackersAbout Hacking And Hackers

Ethical HackingEthical Hacking

Page 2: Ethical hacking

Hacking Is Two FacedHacking Is Two Faced IllegalIllegal

Hackers can:Hackers can:

Steal Credit Cards, Steal Credit Cards, Identities, Money, etcIdentities, Money, etc

Destroy ComputersDestroy Computersand networksand networks

LegalLegal

Hackers Can:Hackers Can:

Secure your computerSecure your computer Protect you from Protect you from

virusesviruses Create new Create new

technologytechnology Make products betterMake products better And So Much More!And So Much More!

Page 3: Ethical hacking

Hacking Is LegalHacking Is Legal(For The Most Part)(For The Most Part)

Hacking is used Hacking is used everyday to keep everyday to keep you safe and you safe and securesecure

Just like a car, its Just like a car, its legal to drive, but legal to drive, but its illegal to speedits illegal to speed

Hacking is legal, Hacking is legal, until you use that until you use that skill to commit a skill to commit a crimecrime

Hackers Make:Hackers Make: Anti-Virus Anti-Virus

ProgramsPrograms Security SuitesSecurity Suites Firewall SoftwareFirewall Software Encryption Encryption

AlgorithmsAlgorithms And so much more!And so much more!

Page 4: Ethical hacking

What Its Really AboutWhat Its Really About Hacking is NOT about stealingHacking is NOT about stealingIt’s about:It’s about:

Learning how technology works and using Learning how technology works and using that information to better protect that information to better protect ourselvesourselves

Modifying technology to make it betterModifying technology to make it better Creating software used to protect us on Creating software used to protect us on

and offlineand offline The excitement of learning how something The excitement of learning how something

works to gain a better perspectiveworks to gain a better perspective

Page 5: Ethical hacking

What Is a Hacker?What Is a Hacker?

Hackers are Hackers are classified by their classified by their skill, and what they skill, and what they do with that skilldo with that skill

To the right you To the right you will see the will see the different types of different types of hackershackers

White HatWhite Hat

Black HatBlack Hat

Grey HatGrey Hat

Page 6: Ethical hacking

The HatsThe Hats White HatWhite Hat

A hacker who hacks their own A hacker who hacks their own security in order to fix holes in that security. They security in order to fix holes in that security. They also hack to learn how technology works and also hack to learn how technology works and better that technology with the skills learned.better that technology with the skills learned.

Black HatBlack HatA hacker who hacks in order to A hacker who hacks in order to

commit a crime, ex: steal credit card informationcommit a crime, ex: steal credit card information

Grey HatGrey HatA hacker who is a mix of the two A hacker who is a mix of the two

above, they hack legally but may also break the above, they hack legally but may also break the law in order to learnlaw in order to learn

Page 7: Ethical hacking

Hacking In Computer SecurityHacking In Computer Security

We Will Cover:We Will Cover:

RFID – Radio Frequency IdentificationRFID – Radio Frequency Identification Wireless Security – WiFiWireless Security – WiFi

Page 8: Ethical hacking

Wireless SecurityWireless SecurityWiFiWiFi

WiFi by default is open and insecureWiFi by default is open and insecure You can protect yourselfYou can protect yourself

Lock your wireless router down with WEP Lock your wireless router down with WEP or WPAor WPA

WPA is much more secure than WEPWPA is much more secure than WEP

It is possible to crack this security, but it is It is possible to crack this security, but it is much more secure than being openmuch more secure than being open

The best way to secure your wireless The best way to secure your wireless network. Is to use a WIRED networknetwork. Is to use a WIRED network

Page 9: Ethical hacking

RFIDRFIDYour Credit Cards Are NOT SafeYour Credit Cards Are NOT Safe

RFID:RFID: Radio Frequency Radio Frequency

IdentificationIdentification

Used in credit cards Used in credit cards such as those that use such as those that use paypasspaypass

Constantly sends your Constantly sends your unencrypted unencrypted information into the information into the airair

Hackers have:Hackers have:

Learned that this can Learned that this can be done easily can be done easily can cheaplycheaply

Learned that Learned that insulating your wallet insulating your wallet with tinfoil will shield with tinfoil will shield your information from your information from transmissiontransmission

Learned how easy it is Learned how easy it is to clone such cards, to clone such cards, and how to protect and how to protect yourselfyourself

Page 10: Ethical hacking

Hacking As A HobbyHacking As A Hobby

Hacking is fun.Hacking is fun. It is the practice of learning and It is the practice of learning and

experimentingexperimenting Using the knowledge acquired to Using the knowledge acquired to

create/invent and make current create/invent and make current products betterproducts better

Hacking can be a hobbyHacking can be a hobby

Page 11: Ethical hacking

Hacking Game ConsolesHacking Game Consoles

NOTENOTE: Hacking a game console can : Hacking a game console can open it to software piracy, this is for open it to software piracy, this is for the most part why companies do not the most part why companies do not like it, and will void your warranty for like it, and will void your warranty for doing so.doing so.

The purpose of hacking a game The purpose of hacking a game console for the most part is: console for the most part is: Homebrew!Homebrew!

Page 12: Ethical hacking

HomebrewHomebrew Homebrew is:Homebrew is:

The creation of software to be run on a device that was not The creation of software to be run on a device that was not intended to run on.intended to run on.

Ex: With the PSP you can hack it, allowing it to execute Ex: With the PSP you can hack it, allowing it to execute code not signed by Sony.code not signed by Sony.

What does this mean?What does this mean? It means you can make:It means you can make: Your own gamesYour own games Your own updatesYour own updates Your own applicationsYour own applications

You can make it better, and you can do what you want with You can make it better, and you can do what you want with your hardware, this is what makes it so appealingyour hardware, this is what makes it so appealing

Page 13: Ethical hacking

Not Just About ComputersNot Just About Computers

Hacking is not just for Hacking is not just for computers and computers and electronicselectronics

You can “hack” You can “hack” anything that sparks anything that sparks your interestyour interest

Learn how it works Learn how it works and why it worksand why it works

Examples to your rightExamples to your right

LocksLocks• Learning how to pick Learning how to pick

themthem• Using that knowledge to Using that knowledge to

create un-pickable lockscreate un-pickable locks

PhonesPhones• Experiment and learn Experiment and learn

its securitiesits securities• Use that knowledge to Use that knowledge to

increase the products increase the products securitysecurity

Page 14: Ethical hacking

Discovery NewsDiscovery NewsHackers vs. Cyber CrimeHackers vs. Cyber Crime