SlideShare a Scribd company logo
Hackers, Crackers, and
Network Intruders
ANAND KUMAR MISHRA
141321300X
Agenda
• Hackers and their vocabulary
• Threats and risks
• Types of hackers
• Gaining access
• Intrusion detection and prevention
• Legal and ethical issues
Hacker Terms
• Hacking - showing computer expertise
• Cracking - breaching security on software or systems
• Phreaking - cracking telecom networks
• Spoofing - faking the originating IP address in a datagram
• Denial of Service (DoS) - flooding a host with sufficient
network traffic so that it can’t respond anymore
• Port Scanning - searching for vulnerabilities
Hacking through the ages
• 1969 - Unix ‘hacked’ together
• 1971 - Cap ‘n Crunch phone exploit discovered
• 1988 - Morris Internet worm crashes 6,000 servers
• 1994 - $10 million transferred from CitiBank accounts
• 1995 - Kevin Mitnick sentenced to 5 years in jail
• 2000 - Major websites succumb to DDoS
• 2000 - 15,700 credit and debit card numbers stolen from Western Union (hacked
while web database was undergoing maintenance)
• 2001 Code Red
– exploited bug in MS IIS to penetrate & spread
– probes random IPs for systems running IIS
– had trigger time for denial-of-service attack
– 2nd
wave infected 360000 servers in 14 hours
• Code Red 2 - had backdoor installed to allow remote control
• Nimda -used multiple infection mechanisms email, shares, web client, IIS
• 2002 – Slammer Worm brings web to its knees by attacking MS SQL Server
The threats
• Denial of Service (Yahoo, eBay, CNN, MS)
• Defacing, Graffiti, Slander, Reputation
• Loss of data (destruction, theft)
• Divulging private information (AirMiles,
corporate espionage, personal financial)
• Loss of financial assets (CitiBank)
CIA.gov defacement example
Web site defacement example
Types of hackers
• Professional hackers
– Black Hats – the Bad Guys
– White Hats – Professional Security Experts
• Script kiddies
– Mostly kids/students
• User tools created by black hats,
– To get free stuff
– Impress their peers
– Not get caught
• Underemployed Adult Hackers
– Former Script Kiddies
• Can’t get employment in the field
• Want recognition in hacker community
• Big in eastern european countries
• Ideological Hackers
– hack as a mechanism to promote some political or ideological purpose
– Usually coincide with political events
Types of Hackers
• Criminal Hackers
– Real criminals, are in it for whatever they can get no matter who it
hurts
• Corporate Spies
– Are relatively rare
• Disgruntled Employees
– Most dangerous to an enterprise as they are “insiders”
– Since many companies subcontract their network services a
disgruntled vendor could be very dangerous to the host enterprise
Top intrusion justifications
• I’m doing you a favor pointing out your vulnerabilities
• I’m making a political statement
• Because I can
• Because I’m paid to do it
Gaining access
• Front door
– Password guessing
– Password/key stealing
• Back doors
– Often left by original developers as debug and/or diagnostic tools
– Forgot to remove before release
• Trojan Horses
– Usually hidden inside of software that we download and install
from the net (remember nothing is free)
– Many install backdoors
• Software vulnerability exploitation
– Often advertised on the OEMs web site along with security
patches
– Fertile ground for script kiddies looking for something to do
Back doors & Trojans
• e.g. Whack-a-mole / NetBus
• Cable modems / DSL very vulnerable
• Protect with Virus Scanners, Port Scanners,
Personal Firewalls
Software vulnerability exploitation
• Buffer overruns
• HTML / CGI scripts
• Poor design of web applications
– Javascript hacks
– PHP/ASP/ColdFusion URL hacks
• Other holes / bugs in software and services
• Tools and scripts used to scan ports for vulnerabilities
Password guessing
• Default or null passwords
• Password same as user name (use finger)
• Password files, trusted servers
• Brute force
– make sure login attempts audited!
Password/key theft
• Dumpster diving
– Its amazing what people throw in the trash
• Personal information
• Passwords
• Good doughnuts
– Many enterprises now shred all white paper trash
• Inside jobs
– Disgruntled employees
– Terminated employees (about 50% of intrusions
resulting in significant loss)
Once inside, the hacker can...
• Modify logs
– To cover their tracks
– To mess with you
• Steal files
– Sometimes destroy after stealing
– A pro would steal and cover their tracks so to be undetected
• Modify files
– To let you know they were there
– To cause mischief
• Install back doors
– So they can get in again
• Attack other systems
Intrusion detection systems (IDS)
• A lot of research going on at universities
– Doug Somerville- EE Dept, Viktor Skorman – EE Dept
• Big money available due to 9/11 and Dept of Homeland
Security
• Vulnerability scanners
– pro-actively identifies risks
– User use pattern matching
• When pattern deviates from norm should be investigated
• Network-based IDS
– examine packets for suspicious activity
– can integrate with firewall
– require one dedicated IDS server per segment
Intrusion detection systems (IDS)
• Host-based IDS
– monitors logs, events, files, and packets sent to
the host
– installed on each host on network
• Honeypot
– decoy server
– collects evidence and alerts admin
Intrusion prevention
• Patches and upgrades (hardening)
• Disabling unnecessary software
• Firewalls and Intrusion Detection Systems
• ‘Honeypots’
• Recognizing and reacting to port scanning
Risk management
Probability
Impact
Ignore
(e.g. delude yourself)
Prevent
(e.g. firewalls, IDS,
patches)
Backup Plan
(e.g. redundancies)
Contain & Control
(e.g. port scan)
Legal and ethical questions
• ‘Ethical’ hacking?
• How to react to mischief or nuisances?
• Is scanning for vulnerabilities legal?
– Some hackers are trying to use this as a business model
• Here are your vulnerabilities, let us help you
• Can private property laws be applied on the Internet?
Port scanner example
Computer Crimes
• Financial Fraud
• Credit Card Theft
• Identity Theft
• Computer specific crimes
– Denial-of-service
– Denial of access to information
– Viruses Melissa virus cost New Jersey man 20 months in jail
• Melissa caused in excess of $80 Million
• Intellectual Property Offenses
– Information theft
– Trafficking in pirated information
– Storing pirated information
– Compromising information
– Destroying information
• Content related Offenses
– Hate crimes
– Harrassment
– Cyber-stalking
• Child privacy
Federal Statutes
• Computer Fraud and Abuse Act of 1984
– Makes it a crime to knowingly access a federal computer
• Electronic Communications Privacy Act of 1986
– Updated the Federal Wiretap Act act to include electronically stored data
• U.S. Communications Assistance for Law Enforcement Act of 1996
– Ammended the Electronic Communications Act to require all
communications carriers to make wiretaps possible
• Economic and Protection of Proprietary Information Act of 1996
– Extends definition of privacy to include proprietary economic information
, theft would constitute corporate or industrial espionage
• Health Insurance Portability and Accountability Act of 1996
– Standards for the electronic transmission of healthcare information
• National Information Infrastructure Protection Act of 1996
– Amends Computer Fraud and Abuse Act to provide more protection to
computerized information and systems used in foreign and interstate
commerce or communications
• The Graham-Lynch-Bliley Act of 1999
– Limits instances of when financial institution can disclose nonpublic
information of a customer to a third party
Legal Recourse
• Average armed robber will get $2500-$7500 and risk
being shot or killed; 50-60% will get caught , convicted
and spent an average of 5 years of hard time
• Average computer criminal will net $50K-$500K with a
risk of being fired or going to jail; only 10% are caught, of
those only 15% will be turned in to authorities; less than
50% of them will do jail time
• Prosecution
– Many institutions fail to prosecute for fear of advertising
• Many banks absorb the losses fearing that they would lose more if
their customers found out and took their business elsewhere
– Fix the vulnerability and continue on with business as usual

More Related Content

PPT
Hackers Cracker Network Intruder
PPT
PPT
Cyberterrorism
PDF
General Aware Ness On Cyber Security & Ethical
PPTX
Protecting Client Data 11.09.11
PPT
All about Hacking
PPTX
Ethical Hacking
PPTX
Introduction to Cyber Forensics Module 1
Hackers Cracker Network Intruder
Cyberterrorism
General Aware Ness On Cyber Security & Ethical
Protecting Client Data 11.09.11
All about Hacking
Ethical Hacking
Introduction to Cyber Forensics Module 1

What's hot (20)

KEY
Computer crime hacking
PPTX
Computer crimes and forensics
PPT
Introduction To Computer Security
PPTX
Trends in electronic crimes and its impact on businesses like yours
PPTX
Hacker risks presentation to ACFE PR Chapter
PPTX
I want to be a cyber forensic examiner
PPTX
2014-09-03 Cybersecurity and Computer Crimes
PPTX
cyber security and forensic tools
PPTX
Etical hacking
PPT
Basic security concepts_chapter_1
PDF
DNS Cybersecurity in 2012-2015
PPTX
Fundamental of ethical hacking
PDF
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
PPT
Cyber crime and forensic
PPTX
Cybercrime And Cyber forensics
PPTX
ethical hacking
PDF
ISACA Ethical Hacking Presentation 10/2011
PPTX
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
PPTX
Ethics,security and privacy control
PDF
Intro to information security
Computer crime hacking
Computer crimes and forensics
Introduction To Computer Security
Trends in electronic crimes and its impact on businesses like yours
Hacker risks presentation to ACFE PR Chapter
I want to be a cyber forensic examiner
2014-09-03 Cybersecurity and Computer Crimes
cyber security and forensic tools
Etical hacking
Basic security concepts_chapter_1
DNS Cybersecurity in 2012-2015
Fundamental of ethical hacking
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Cyber crime and forensic
Cybercrime And Cyber forensics
ethical hacking
ISACA Ethical Hacking Presentation 10/2011
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Ethics,security and privacy control
Intro to information security

Similar to How to become Hackers . (20)

PPT
Introduction to hackers
PPT
9. Computer Ethics.ppt
PPT
Hackers
PPT
PPT
Hackers
PPT
Security for database administrator to enhance security
PPT
Ethical hacking
PPT
Web security
PPTX
Ethical hacking (legal)
PPTX
9 - Security
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PPT
Hacking
PPT
Computer ethics
PPT
MIS part 4_CH 11.ppt
PPT
Chapter5.ppt
PPTX
cybersecurity notes important points.pptx
PPTX
2014-09-03 Cybersecurity and Computer Crimes
PPT
Ethical Hacking - Introduction to Computer Security
PPT
Ethical Hacking - Introduction to Computer Security
Introduction to hackers
9. Computer Ethics.ppt
Hackers
Hackers
Security for database administrator to enhance security
Ethical hacking
Web security
Ethical hacking (legal)
9 - Security
Track 5 session 1 - st dev con 2016 - need for security for iot
Hacking
Computer ethics
MIS part 4_CH 11.ppt
Chapter5.ppt
cybersecurity notes important points.pptx
2014-09-03 Cybersecurity and Computer Crimes
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security

More from Greater Noida Institute Of Technology (20)

PDF
Airline Analysis of Data Using Hadoop
PPTX
College Administration Management System
PPT
Virtual Private Network
PPTX
Sentimental Analysis of twitter data .
PPT
Hacking Question and Answer
PPT
Hacking and its Defence
PPTX
BroadBand Over powerline .
PPT
Modern Networking Hacking
PPT
Hack wireless internet connections or wifi
PPT
Hacking step (Methodology)
PPTX
Cyber crime and Security
Airline Analysis of Data Using Hadoop
College Administration Management System
Virtual Private Network
Sentimental Analysis of twitter data .
Hacking Question and Answer
Hacking and its Defence
BroadBand Over powerline .
Modern Networking Hacking
Hack wireless internet connections or wifi
Hacking step (Methodology)
Cyber crime and Security

Recently uploaded (20)

PPT
Mechanical Engineering MATERIALS Selection
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Digital Logic Computer Design lecture notes
PPTX
web development for engineering and engineering
DOCX
573137875-Attendance-Management-System-original
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Sustainable Sites - Green Building Construction
PPT
Project quality management in manufacturing
PDF
composite construction of structures.pdf
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
PPT on Performance Review to get promotions
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
Mechanical Engineering MATERIALS Selection
bas. eng. economics group 4 presentation 1.pptx
Internet of Things (IOT) - A guide to understanding
Digital Logic Computer Design lecture notes
web development for engineering and engineering
573137875-Attendance-Management-System-original
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Sustainable Sites - Green Building Construction
Project quality management in manufacturing
composite construction of structures.pdf
Lesson 3_Tessellation.pptx finite Mathematics
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
UNIT 4 Total Quality Management .pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPT on Performance Review to get promotions
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CYBER-CRIMES AND SECURITY A guide to understanding

How to become Hackers .

  • 1. Hackers, Crackers, and Network Intruders ANAND KUMAR MISHRA 141321300X
  • 2. Agenda • Hackers and their vocabulary • Threats and risks • Types of hackers • Gaining access • Intrusion detection and prevention • Legal and ethical issues
  • 3. Hacker Terms • Hacking - showing computer expertise • Cracking - breaching security on software or systems • Phreaking - cracking telecom networks • Spoofing - faking the originating IP address in a datagram • Denial of Service (DoS) - flooding a host with sufficient network traffic so that it can’t respond anymore • Port Scanning - searching for vulnerabilities
  • 4. Hacking through the ages • 1969 - Unix ‘hacked’ together • 1971 - Cap ‘n Crunch phone exploit discovered • 1988 - Morris Internet worm crashes 6,000 servers • 1994 - $10 million transferred from CitiBank accounts • 1995 - Kevin Mitnick sentenced to 5 years in jail • 2000 - Major websites succumb to DDoS • 2000 - 15,700 credit and debit card numbers stolen from Western Union (hacked while web database was undergoing maintenance) • 2001 Code Red – exploited bug in MS IIS to penetrate & spread – probes random IPs for systems running IIS – had trigger time for denial-of-service attack – 2nd wave infected 360000 servers in 14 hours • Code Red 2 - had backdoor installed to allow remote control • Nimda -used multiple infection mechanisms email, shares, web client, IIS • 2002 – Slammer Worm brings web to its knees by attacking MS SQL Server
  • 5. The threats • Denial of Service (Yahoo, eBay, CNN, MS) • Defacing, Graffiti, Slander, Reputation • Loss of data (destruction, theft) • Divulging private information (AirMiles, corporate espionage, personal financial) • Loss of financial assets (CitiBank)
  • 8. Types of hackers • Professional hackers – Black Hats – the Bad Guys – White Hats – Professional Security Experts • Script kiddies – Mostly kids/students • User tools created by black hats, – To get free stuff – Impress their peers – Not get caught • Underemployed Adult Hackers – Former Script Kiddies • Can’t get employment in the field • Want recognition in hacker community • Big in eastern european countries • Ideological Hackers – hack as a mechanism to promote some political or ideological purpose – Usually coincide with political events
  • 9. Types of Hackers • Criminal Hackers – Real criminals, are in it for whatever they can get no matter who it hurts • Corporate Spies – Are relatively rare • Disgruntled Employees – Most dangerous to an enterprise as they are “insiders” – Since many companies subcontract their network services a disgruntled vendor could be very dangerous to the host enterprise
  • 10. Top intrusion justifications • I’m doing you a favor pointing out your vulnerabilities • I’m making a political statement • Because I can • Because I’m paid to do it
  • 11. Gaining access • Front door – Password guessing – Password/key stealing • Back doors – Often left by original developers as debug and/or diagnostic tools – Forgot to remove before release • Trojan Horses – Usually hidden inside of software that we download and install from the net (remember nothing is free) – Many install backdoors • Software vulnerability exploitation – Often advertised on the OEMs web site along with security patches – Fertile ground for script kiddies looking for something to do
  • 12. Back doors & Trojans • e.g. Whack-a-mole / NetBus • Cable modems / DSL very vulnerable • Protect with Virus Scanners, Port Scanners, Personal Firewalls
  • 13. Software vulnerability exploitation • Buffer overruns • HTML / CGI scripts • Poor design of web applications – Javascript hacks – PHP/ASP/ColdFusion URL hacks • Other holes / bugs in software and services • Tools and scripts used to scan ports for vulnerabilities
  • 14. Password guessing • Default or null passwords • Password same as user name (use finger) • Password files, trusted servers • Brute force – make sure login attempts audited!
  • 15. Password/key theft • Dumpster diving – Its amazing what people throw in the trash • Personal information • Passwords • Good doughnuts – Many enterprises now shred all white paper trash • Inside jobs – Disgruntled employees – Terminated employees (about 50% of intrusions resulting in significant loss)
  • 16. Once inside, the hacker can... • Modify logs – To cover their tracks – To mess with you • Steal files – Sometimes destroy after stealing – A pro would steal and cover their tracks so to be undetected • Modify files – To let you know they were there – To cause mischief • Install back doors – So they can get in again • Attack other systems
  • 17. Intrusion detection systems (IDS) • A lot of research going on at universities – Doug Somerville- EE Dept, Viktor Skorman – EE Dept • Big money available due to 9/11 and Dept of Homeland Security • Vulnerability scanners – pro-actively identifies risks – User use pattern matching • When pattern deviates from norm should be investigated • Network-based IDS – examine packets for suspicious activity – can integrate with firewall – require one dedicated IDS server per segment
  • 18. Intrusion detection systems (IDS) • Host-based IDS – monitors logs, events, files, and packets sent to the host – installed on each host on network • Honeypot – decoy server – collects evidence and alerts admin
  • 19. Intrusion prevention • Patches and upgrades (hardening) • Disabling unnecessary software • Firewalls and Intrusion Detection Systems • ‘Honeypots’ • Recognizing and reacting to port scanning
  • 20. Risk management Probability Impact Ignore (e.g. delude yourself) Prevent (e.g. firewalls, IDS, patches) Backup Plan (e.g. redundancies) Contain & Control (e.g. port scan)
  • 21. Legal and ethical questions • ‘Ethical’ hacking? • How to react to mischief or nuisances? • Is scanning for vulnerabilities legal? – Some hackers are trying to use this as a business model • Here are your vulnerabilities, let us help you • Can private property laws be applied on the Internet?
  • 23. Computer Crimes • Financial Fraud • Credit Card Theft • Identity Theft • Computer specific crimes – Denial-of-service – Denial of access to information – Viruses Melissa virus cost New Jersey man 20 months in jail • Melissa caused in excess of $80 Million • Intellectual Property Offenses – Information theft – Trafficking in pirated information – Storing pirated information – Compromising information – Destroying information • Content related Offenses – Hate crimes – Harrassment – Cyber-stalking • Child privacy
  • 24. Federal Statutes • Computer Fraud and Abuse Act of 1984 – Makes it a crime to knowingly access a federal computer • Electronic Communications Privacy Act of 1986 – Updated the Federal Wiretap Act act to include electronically stored data • U.S. Communications Assistance for Law Enforcement Act of 1996 – Ammended the Electronic Communications Act to require all communications carriers to make wiretaps possible • Economic and Protection of Proprietary Information Act of 1996 – Extends definition of privacy to include proprietary economic information , theft would constitute corporate or industrial espionage • Health Insurance Portability and Accountability Act of 1996 – Standards for the electronic transmission of healthcare information • National Information Infrastructure Protection Act of 1996 – Amends Computer Fraud and Abuse Act to provide more protection to computerized information and systems used in foreign and interstate commerce or communications • The Graham-Lynch-Bliley Act of 1999 – Limits instances of when financial institution can disclose nonpublic information of a customer to a third party
  • 25. Legal Recourse • Average armed robber will get $2500-$7500 and risk being shot or killed; 50-60% will get caught , convicted and spent an average of 5 years of hard time • Average computer criminal will net $50K-$500K with a risk of being fired or going to jail; only 10% are caught, of those only 15% will be turned in to authorities; less than 50% of them will do jail time • Prosecution – Many institutions fail to prosecute for fear of advertising • Many banks absorb the losses fearing that they would lose more if their customers found out and took their business elsewhere – Fix the vulnerability and continue on with business as usual