SlideShare a Scribd company logo
professional hackers
jim geovedi
information security troublemaker, professional script kiddy
hackers
are hackers getting
paid now, like a pro?
professional hackers
corporate hackers
corporate hackers


programmer
   deals with programming operating
   systems or applications
corporate hackers


administrator
    responsible for running special
    equipment or whole infrastructures
corporate hackers

operator
    sitting in front of a monitor (or several)
    all days and evaluating output of logs
    and system messages
corporate hackers
security officer
     writing the security policies and
     procedures for the company

     decides what to do when security
     incident is happening

     defining security and access roles
corporate hackers

it auditor
     independent organ within the
     organisation which ensures the
     adequateness of it controls
corporate hackers

consultant
    works for a consultant company
    (general consultant companies, it
    consultant companies, or it security
    companies)
corporate hackers

hacker
    check security of networks, review
    source code, etc.

    hired to show to customers or press the
    company employ cool person
independent hackers
independent hackers


operating system/software hacker
    develop and improve system based on
    personal interest
independent hackers


intrusion specialist
     concentrate primarily on how to break-
     in the system or network
independent hackers


vulnerability researcher
    discovering the vulnerability and how to
    take advantage of it
independent hackers

botnet owner
    take control of thousands of hosts

    rent the botnet for ddos, anonymous
    proxy, spam, phising etc.
independent hackers


rootkit/trojan/virus writer
    sometime work together with intrusion
    specialists and botnet owner
independent hackers


spammer/fraudster
    intend to result in financial or personal
    gain
local hacking scene
local hacking scene

 how many professional hackers in
 indonesia?

 a question of ethics: hackers behaviour

 real hackers vs. media whores
local hacking scene

 skill development

 certification for professional hackers

 valuing our own skills
fin.

More Related Content

PDF
Hacking Cracking 2008
PDF
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
PPTX
The Making of a simple Cyber Threat Intelligence Gathering System
PPTX
Cyber Threat Intelligence
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PPTX
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
PDF
Cyber intelligence for corporate security
PPTX
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Hacking Cracking 2008
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
The Making of a simple Cyber Threat Intelligence Gathering System
Cyber Threat Intelligence
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Cyber intelligence for corporate security
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015

What's hot (20)

PPTX
Threat intelligence in security
PPTX
IOT Security FUN-damental
PPTX
Threat Intelligence Data Collection & Acquisition
PDF
Evidence-Based Security: The New Top Five Controls
PDF
Akila srinivasan microsoft-bug_bounty-(publish)
PDF
Enfilade: Tool to Detect Infections in MongoDB Instances
PDF
Cyber Intelligence Vision Information Sheet 20Nov2013
PPTX
Actionable Threat Intelligence
PPSX
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
PDF
Security by Design: An Introduction to Drupal Security
PPTX
Malware: To The Realm of Malicious Code (Training)
PDF
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
PPTX
2016 ISSA Conference Threat Intelligence Keynote philA
PDF
20171106 - Privacy Design Lab - LINDDUN
PDF
Physical Penetration Testing (RootedCON 2015)
PDF
Threat Intelligence Workshop
PDF
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
PPT
Brucon presentation
PDF
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
PPTX
Ethical Hacking Presentation
Threat intelligence in security
IOT Security FUN-damental
Threat Intelligence Data Collection & Acquisition
Evidence-Based Security: The New Top Five Controls
Akila srinivasan microsoft-bug_bounty-(publish)
Enfilade: Tool to Detect Infections in MongoDB Instances
Cyber Intelligence Vision Information Sheet 20Nov2013
Actionable Threat Intelligence
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Security by Design: An Introduction to Drupal Security
Malware: To The Realm of Malicious Code (Training)
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
2016 ISSA Conference Threat Intelligence Keynote philA
20171106 - Privacy Design Lab - LINDDUN
Physical Penetration Testing (RootedCON 2015)
Threat Intelligence Workshop
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Brucon presentation
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Ethical Hacking Presentation

Viewers also liked (20)

PDF
Satellite Hacking — Intro by Indianz (2012)
PDF
Wireless Hotspot Security
PDF
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
PDF
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
PDF
Satellite Telephony Security
PDF
Warezzman - DVB-Satellite Hacking
PDF
Hacking Satellite: A New Universe to Discover
PDF
Internet Worms
PDF
Wireless Hotspot: The Hackers Playground
PDF
IDS & Log Management
PDF
Hacking Trust
PDF
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
PDF
AI & NLP pada @begobet
PDF
Cheating the 10,000 hour rule
PDF
Hacking a Bird in the Sky: The Revenge of Angry Birds
PDF
Waluku: Answering Astronomy Questions through Social Media
PDF
The 21st Century Bank Job
PDF
Is Cyber-offence the New Cyber-defence?
PDF
Hacking a Bird in the Sky: Hijacking VSAT Connection
PDF
Cloud Security - Security Aspects of Cloud Computing
Satellite Hacking — Intro by Indianz (2012)
Wireless Hotspot Security
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Satellite Telephony Security
Warezzman - DVB-Satellite Hacking
Hacking Satellite: A New Universe to Discover
Internet Worms
Wireless Hotspot: The Hackers Playground
IDS & Log Management
Hacking Trust
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
AI & NLP pada @begobet
Cheating the 10,000 hour rule
Hacking a Bird in the Sky: The Revenge of Angry Birds
Waluku: Answering Astronomy Questions through Social Media
The 21st Century Bank Job
Is Cyber-offence the New Cyber-defence?
Hacking a Bird in the Sky: Hijacking VSAT Connection
Cloud Security - Security Aspects of Cloud Computing

Similar to Professional Hackers (20)

PPT
CO1-Concept of ethical hacking Explained
PDF
10 types of_hackers
PPTX
Hacking and Hackers
PPT
Course on Ehtical Hacking - Introduction
PPTX
Ethical hacking
PDF
Unit ii-hackers and cyber crimes
PDF
Hackers and cyber crimes
PPTX
Ethical hacking 2016
PPTX
Ethical hacking
PPTX
Ethical hacking
PPT
Introduction to hackers
PPT
Ethical hacking
PPTX
Ethical hacking
PPT
Computer hacking
PPT
Hacking And Its Prevention
PPTX
Windows Hacking
PPTX
Hacking Presentation v2 By Raffi
PPTX
Ethical hacking : Beginner to advanced
PPSX
Ethical hacking and System administration
CO1-Concept of ethical hacking Explained
10 types of_hackers
Hacking and Hackers
Course on Ehtical Hacking - Introduction
Ethical hacking
Unit ii-hackers and cyber crimes
Hackers and cyber crimes
Ethical hacking 2016
Ethical hacking
Ethical hacking
Introduction to hackers
Ethical hacking
Ethical hacking
Computer hacking
Hacking And Its Prevention
Windows Hacking
Hacking Presentation v2 By Raffi
Ethical hacking : Beginner to advanced
Ethical hacking and System administration

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
cuic standard and advanced reporting.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation_ Review paper, used for researhc scholars
The Rise and Fall of 3GPP – Time for a Sabbatical?
Understanding_Digital_Forensics_Presentation.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25 Week I
Review of recent advances in non-invasive hemoglobin estimation
sap open course for s4hana steps from ECC to s4
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cuic standard and advanced reporting.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Approach and Philosophy of On baking technology
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx

Professional Hackers