SlideShare a Scribd company logo
Hackers, Crackers, and
Network Intruders
Sponser
www.harshpchacks.blogspot.com
By Harsh Sharma
Agenda
• Hackers and their vocabulary
• Threats and risks
• Types of hackers
• Gaining access
• Intrusion detection and prevention
• Legal and ethical issues
Hacker Terms
• Hacking - showing computer expertise
• Cracking - breaching security on software or systems
• Phreaking - cracking telecom networks
• Spoofing - faking the originating IP address in a datagram
• Denial of Service (DoS) - flooding a host with sufficient
network traffic so that it can’t respond anymore
• Port Scanning - searching for vulnerabilities
Hacking through the ages
• 1969 - Unix ‘hacked’ together
• 1971 - Cap ‘n Crunch phone exploit discovered
• 1988 - Morris Internet worm crashes 6,000 servers
• 1994 - $10 million transferred from CitiBank accounts
• 1995 - Kevin Mitnick sentenced to 5 years in jail
• 2000 - Major websites succumb to DDoS
• 2000 - 15,700 credit and debit card numbers stolen from Western Union (hacked
while web database was undergoing maintenance)
• 2001 Code Red
– exploited bug in MS IIS to penetrate & spread
– probes random IPs for systems running IIS
– had trigger time for denial-of-service attack
– 2nd
wave infected 360000 servers in 14 hours
• Code Red 2 - had backdoor installed to allow remote control
• Nimda -used multiple infection mechanisms email, shares, web client, IIS
• 2002 – Slammer Worm brings web to its knees by attacking MS SQL Server
The threats
• Denial of Service (Yahoo, eBay, CNN, MS)
• Defacing, Graffiti, Slander, Reputation
• Loss of data (destruction, theft)
• Divulging private information (AirMiles,
corporate espionage, personal financial)
• Loss of financial assets (CitiBank)
Types of hackers
• Professional hackers
– Black Hats – the Bad Guys
– White Hats – Professional Security Experts
• Script kiddies
– Mostly kids/students
• User tools created by black hats,
– To get free stuff
– Impress their peers
– Not get caught
• Underemployed Adult Hackers
– Former Script Kiddies
• Can’t get employment in the field
• Want recognition in hacker community
• Big in eastern european countries
• Ideological Hackers
– hack as a mechanism to promote some political or ideological purpose
– Usually coincide with political events
Types of Hackers
• Criminal Hackers
– Real criminals, are in it for whatever they can get no matter who it
hurts
• Corporate Spies
– Are relatively rare
• Disgruntled Employees
– Most dangerous to an enterprise as they are “insiders”
– Since many companies subcontract their network services a
disgruntled vendor could be very dangerous to the host enterprise
Top intrusion justifications
• I’m doing you a favor pointing out your vulnerabilities
• I’m making a political statement
• Because I can
• Because I’m paid to do it
Gaining access
• Front door
– Password guessing
– Password/key stealing
• Back doors
– Often left by original developers as debug and/or diagnostic tools
– Forgot to remove before release
• Trojan Horses
– Usually hidden inside of software that we download and install
from the net (remember nothing is free)
– Many install backdoors
• Software vulnerability exploitation
– Often advertised on the OEMs web site along with security
patches
– Fertile ground for script kiddies looking for something to do
Back doors & Trojans
• e.g. Whack-a-mole / NetBus
• Cable modems / DSL very vulnerable
• Protect with Virus Scanners, Port Scanners,
Personal Firewalls
Software vulnerability exploitation
• Buffer overruns
• HTML / CGI scripts
• Poor design of web applications
– Javascript hacks
– PHP/ASP/ColdFusion URL hacks
• Other holes / bugs in software and services
• Tools and scripts used to scan ports for vulnerabilities
Password guessing
• Default or null passwords
• Password same as user name (use finger)
• Password files, trusted servers
• Brute force
– make sure login attempts audited!
Password/key theft
• Dumpster diving
– Its amazing what people throw in the trash
• Personal information
• Passwords
• Good doughnuts
– Many enterprises now shred all white paper trash
• Inside jobs
– Disgruntled employees
– Terminated employees (about 50% of intrusions
resulting in significant loss)
Once inside, the hacker can...
• Modify logs
– To cover their tracks
– To mess with you
• Steal files
– Sometimes destroy after stealing
– A pro would steal and cover their tracks so to be undetected
• Modify files
– To let you know they were there
– To cause mischief
• Install back doors
– So they can get in again
• Attack other systems
Intrusion detection systems (IDS)
• A lot of research going on at universities
– Doug Somerville- EE Dept, Viktor Skorman – EE Dept
• Big money available due to 9/11 and Dept of Homeland
Security
• Vulnerability scanners
– pro-actively identifies risks
– User use pattern matching
• When pattern deviates from norm should be investigated
• Network-based IDS
– examine packets for suspicious activity
– can integrate with firewall
– require one dedicated IDS server per segment
Intrusion detection systems (IDS)
• Host-based IDS
– monitors logs, events, files, and packets sent to
the host
– installed on each host on network
• Honeypot
– decoy server
– collects evidence and alerts admin
Intrusion prevention
• Patches and upgrades (hardening)
• Disabling unnecessary software
• Firewalls and Intrusion Detection Systems
• ‘Honeypots’
• Recognizing and reacting to port scanning
Risk management
Probability
Impact
Ignore
(e.g. delude yourself)
Prevent
(e.g. firewalls, IDS,
patches)
Backup Plan
(e.g. redundancies)
Contain & Control
(e.g. port scan)
Legal and ethical questions
• ‘Ethical’ hacking?
• How to react to mischief or nuisances?
• Is scanning for vulnerabilities legal?
– Some hackers are trying to use this as a business model
• Here are your vulnerabilities, let us help you
• Can private property laws be applied on the Internet?
Port scanner example
Computer Crimes
• Financial Fraud
• Credit Card Theft
• Identity Theft
• Computer specific crimes
– Denial-of-service
– Denial of access to information
– Viruses Melissa virus cost New Jersey man 20 months in jail
• Melissa caused in excess of $80 Million
• Intellectual Property Offenses
– Information theft
– Trafficking in pirated information
– Storing pirated information
– Compromising information
– Destroying information
• Content related Offenses
– Hate crimes
– Harrassment
– Cyber-stalking
• Child privacy
Federal Statutes
• Computer Fraud and Abuse Act of 1984
– Makes it a crime to knowingly access a federal computer
• Electronic Communications Privacy Act of 1986
– Updated the Federal Wiretap Act act to include electronically stored data
• U.S. Communications Assistance for Law Enforcement Act of 1996
– Ammended the Electronic Communications Act to require all
communications carriers to make wiretaps possible
• Economic and Protection of Proprietary Information Act of 1996
– Extends definition of privacy to include proprietary economic information
, theft would constitute corporate or industrial espionage
• Health Insurance Portability and Accountability Act of 1996
– Standards for the electronic transmission of healthcare information
• National Information Infrastructure Protection Act of 1996
– Amends Computer Fraud and Abuse Act to provide more protection to
computerized information and systems used in foreign and interstate
commerce or communications
• The Graham-Lynch-Bliley Act of 1999
– Limits instances of when financial institution can disclose nonpublic
information of a customer to a third party

More Related Content

PPT
PPTX
Ethical Hacking
PPTX
Recommending information security measures
PPT
Hacking and its terms
PPT
Top 10 most famous hackers of all time
PPT
Introduction To Computer Security
PDF
General Aware Ness On Cyber Security & Ethical
PPTX
Ethical Hacking
Ethical Hacking
Recommending information security measures
Hacking and its terms
Top 10 most famous hackers of all time
Introduction To Computer Security
General Aware Ness On Cyber Security & Ethical
Ethical Hacking

What's hot (19)

PPTX
Digital property rights
PPTX
Introduction to E commerce
PPT
TYPES OF HACKING
PPTX
Hacking
PPTX
Cybercrime (Computer Hacking)
PPT
hacking
KEY
Computer crime hacking
PPTX
Ethical Hacking
PPTX
The art of deceiving humans a.k.a social engineering
PPTX
ethical hacking
PPT
Basic of Ethical Hacking and Penetration Testing - 1st Module
PDF
Social Engineering 2.0
PPTX
Module 8 security and ethical challenges
 
PPTX
Hacking and Hackers
PPT
What is Ethical hacking
PPTX
Ethical hacking by chandra prakash upadhyay
PPTX
Ethical hacking
PPT
Ethical hacking
PPTX
Intellectual Property in Cyberspace
Digital property rights
Introduction to E commerce
TYPES OF HACKING
Hacking
Cybercrime (Computer Hacking)
hacking
Computer crime hacking
Ethical Hacking
The art of deceiving humans a.k.a social engineering
ethical hacking
Basic of Ethical Hacking and Penetration Testing - 1st Module
Social Engineering 2.0
Module 8 security and ethical challenges
 
Hacking and Hackers
What is Ethical hacking
Ethical hacking by chandra prakash upadhyay
Ethical hacking
Ethical hacking
Intellectual Property in Cyberspace

Similar to Introduction to hackers (20)

PPT
Hackers Cracker Network Intruder
PPT
How to become Hackers .
PPT
PPT
Hackers
PPT
Hackers
PPT
All about Hacking
PPTX
Hacking presentation
PDF
Introduction of hacking and cracking
PPTX
Ethical hacking
PPT
ETHICAL HACKING
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Ethical Hacking Redefined
PPTX
Dhams hacking
PPTX
hacking basics
PPT
Hacking And Its Prevention
PPT
Ethical Hacking
PPT
001.itsecurity bcp v1
ODP
Ethical hacking ppt
PPT
Course on Ehtical Hacking - Introduction
ODP
Introduction To Hacking
Hackers Cracker Network Intruder
How to become Hackers .
Hackers
Hackers
All about Hacking
Hacking presentation
Introduction of hacking and cracking
Ethical hacking
ETHICAL HACKING
Inetsecurity.in Ethical Hacking presentation
Ethical Hacking Redefined
Dhams hacking
hacking basics
Hacking And Its Prevention
Ethical Hacking
001.itsecurity bcp v1
Ethical hacking ppt
Course on Ehtical Hacking - Introduction
Introduction To Hacking

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Institutional Correction lecture only . . .
PPTX
Cell Structure & Organelles in detailed.
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Cell Types and Its function , kingdom of life
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
RMMM.pdf make it easy to upload and study
Module 4: Burden of Disease Tutorial Slides S2 2025
Institutional Correction lecture only . . .
Cell Structure & Organelles in detailed.
Renaissance Architecture: A Journey from Faith to Humanism
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Insiders guide to clinical Medicine.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPH.pptx obstetrics and gynecology in nursing
Cell Types and Its function , kingdom of life
TR - Agricultural Crops Production NC III.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
STATICS OF THE RIGID BODIES Hibbelers.pdf
Microbial disease of the cardiovascular and lymphatic systems

Introduction to hackers

  • 1. Hackers, Crackers, and Network Intruders Sponser www.harshpchacks.blogspot.com By Harsh Sharma
  • 2. Agenda • Hackers and their vocabulary • Threats and risks • Types of hackers • Gaining access • Intrusion detection and prevention • Legal and ethical issues
  • 3. Hacker Terms • Hacking - showing computer expertise • Cracking - breaching security on software or systems • Phreaking - cracking telecom networks • Spoofing - faking the originating IP address in a datagram • Denial of Service (DoS) - flooding a host with sufficient network traffic so that it can’t respond anymore • Port Scanning - searching for vulnerabilities
  • 4. Hacking through the ages • 1969 - Unix ‘hacked’ together • 1971 - Cap ‘n Crunch phone exploit discovered • 1988 - Morris Internet worm crashes 6,000 servers • 1994 - $10 million transferred from CitiBank accounts • 1995 - Kevin Mitnick sentenced to 5 years in jail • 2000 - Major websites succumb to DDoS • 2000 - 15,700 credit and debit card numbers stolen from Western Union (hacked while web database was undergoing maintenance) • 2001 Code Red – exploited bug in MS IIS to penetrate & spread – probes random IPs for systems running IIS – had trigger time for denial-of-service attack – 2nd wave infected 360000 servers in 14 hours • Code Red 2 - had backdoor installed to allow remote control • Nimda -used multiple infection mechanisms email, shares, web client, IIS • 2002 – Slammer Worm brings web to its knees by attacking MS SQL Server
  • 5. The threats • Denial of Service (Yahoo, eBay, CNN, MS) • Defacing, Graffiti, Slander, Reputation • Loss of data (destruction, theft) • Divulging private information (AirMiles, corporate espionage, personal financial) • Loss of financial assets (CitiBank)
  • 6. Types of hackers • Professional hackers – Black Hats – the Bad Guys – White Hats – Professional Security Experts • Script kiddies – Mostly kids/students • User tools created by black hats, – To get free stuff – Impress their peers – Not get caught • Underemployed Adult Hackers – Former Script Kiddies • Can’t get employment in the field • Want recognition in hacker community • Big in eastern european countries • Ideological Hackers – hack as a mechanism to promote some political or ideological purpose – Usually coincide with political events
  • 7. Types of Hackers • Criminal Hackers – Real criminals, are in it for whatever they can get no matter who it hurts • Corporate Spies – Are relatively rare • Disgruntled Employees – Most dangerous to an enterprise as they are “insiders” – Since many companies subcontract their network services a disgruntled vendor could be very dangerous to the host enterprise
  • 8. Top intrusion justifications • I’m doing you a favor pointing out your vulnerabilities • I’m making a political statement • Because I can • Because I’m paid to do it
  • 9. Gaining access • Front door – Password guessing – Password/key stealing • Back doors – Often left by original developers as debug and/or diagnostic tools – Forgot to remove before release • Trojan Horses – Usually hidden inside of software that we download and install from the net (remember nothing is free) – Many install backdoors • Software vulnerability exploitation – Often advertised on the OEMs web site along with security patches – Fertile ground for script kiddies looking for something to do
  • 10. Back doors & Trojans • e.g. Whack-a-mole / NetBus • Cable modems / DSL very vulnerable • Protect with Virus Scanners, Port Scanners, Personal Firewalls
  • 11. Software vulnerability exploitation • Buffer overruns • HTML / CGI scripts • Poor design of web applications – Javascript hacks – PHP/ASP/ColdFusion URL hacks • Other holes / bugs in software and services • Tools and scripts used to scan ports for vulnerabilities
  • 12. Password guessing • Default or null passwords • Password same as user name (use finger) • Password files, trusted servers • Brute force – make sure login attempts audited!
  • 13. Password/key theft • Dumpster diving – Its amazing what people throw in the trash • Personal information • Passwords • Good doughnuts – Many enterprises now shred all white paper trash • Inside jobs – Disgruntled employees – Terminated employees (about 50% of intrusions resulting in significant loss)
  • 14. Once inside, the hacker can... • Modify logs – To cover their tracks – To mess with you • Steal files – Sometimes destroy after stealing – A pro would steal and cover their tracks so to be undetected • Modify files – To let you know they were there – To cause mischief • Install back doors – So they can get in again • Attack other systems
  • 15. Intrusion detection systems (IDS) • A lot of research going on at universities – Doug Somerville- EE Dept, Viktor Skorman – EE Dept • Big money available due to 9/11 and Dept of Homeland Security • Vulnerability scanners – pro-actively identifies risks – User use pattern matching • When pattern deviates from norm should be investigated • Network-based IDS – examine packets for suspicious activity – can integrate with firewall – require one dedicated IDS server per segment
  • 16. Intrusion detection systems (IDS) • Host-based IDS – monitors logs, events, files, and packets sent to the host – installed on each host on network • Honeypot – decoy server – collects evidence and alerts admin
  • 17. Intrusion prevention • Patches and upgrades (hardening) • Disabling unnecessary software • Firewalls and Intrusion Detection Systems • ‘Honeypots’ • Recognizing and reacting to port scanning
  • 18. Risk management Probability Impact Ignore (e.g. delude yourself) Prevent (e.g. firewalls, IDS, patches) Backup Plan (e.g. redundancies) Contain & Control (e.g. port scan)
  • 19. Legal and ethical questions • ‘Ethical’ hacking? • How to react to mischief or nuisances? • Is scanning for vulnerabilities legal? – Some hackers are trying to use this as a business model • Here are your vulnerabilities, let us help you • Can private property laws be applied on the Internet?
  • 21. Computer Crimes • Financial Fraud • Credit Card Theft • Identity Theft • Computer specific crimes – Denial-of-service – Denial of access to information – Viruses Melissa virus cost New Jersey man 20 months in jail • Melissa caused in excess of $80 Million • Intellectual Property Offenses – Information theft – Trafficking in pirated information – Storing pirated information – Compromising information – Destroying information • Content related Offenses – Hate crimes – Harrassment – Cyber-stalking • Child privacy
  • 22. Federal Statutes • Computer Fraud and Abuse Act of 1984 – Makes it a crime to knowingly access a federal computer • Electronic Communications Privacy Act of 1986 – Updated the Federal Wiretap Act act to include electronically stored data • U.S. Communications Assistance for Law Enforcement Act of 1996 – Ammended the Electronic Communications Act to require all communications carriers to make wiretaps possible • Economic and Protection of Proprietary Information Act of 1996 – Extends definition of privacy to include proprietary economic information , theft would constitute corporate or industrial espionage • Health Insurance Portability and Accountability Act of 1996 – Standards for the electronic transmission of healthcare information • National Information Infrastructure Protection Act of 1996 – Amends Computer Fraud and Abuse Act to provide more protection to computerized information and systems used in foreign and interstate commerce or communications • The Graham-Lynch-Bliley Act of 1999 – Limits instances of when financial institution can disclose nonpublic information of a customer to a third party