Published on March 1, 2014
HACKING, HACKERS & HACKTIVISM • Ankit Singh Baliyan (1109713018)
TOPICS COVERED IN THIS PRESENTATION DEFINITIONS OF HACKING TYPES OF HACKING EFFECT OF HACKING PURPOSE OF HACKING DEFINITION OF HACKER HACKERS AND CRACKERS HACKTIVISM CONCLUSION
What is the meaning of Hack/Hacking? Dictionary – To cut, notch, slice, chop, or sever (something) with or as with heavy, irregular blows (often followed by up or down ): to hack meat; to hack down trees. Computing Dictionary – Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.
Definition of Hacking : Authorized or unauthorized attempts to bypass the security mechanisms of an information system or network. Stealing of the data and information from someone else’s computer or network without the prior permission of the owner. Breaking into someone else’s Computer System, Often on a network. Bypasses password or licenses in computer program.
Types of Hacking Website Hacking. E-mail Hacking. Network Hacking. Password Hacking. Online Banking Hacking. Computer Hacking.
SQL Injection Attacks – Using SQL injections, attackers can: Add new data to the database Could be embarrassing to find yourself selling politically incorrect items on an eCommerce site Username – 1’ or ‘1’=‘1 Password - 1’ or ‘1’=‘1 Modify data currently in the database Could be very costly to have an expensive item suddenly be deeply ‘discounted’ Perform an UPDATE in the injected SQL
Online Banking Hacking..
Who is a “HACKER” ?
INTRODUCTION • A person who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers. • Hacker is a person who access computer system and network without authorization. • There are 3 types of hacker which are white hat, black hat and grey hat
Types of Hackers
White-hat Hackers The good guys who identify the security weakness of the system or network and inform the owner about them.
Black Hat Hackers A black hat hacker is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.
Grey hat Hackers A grey hat hacker, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers.
The difference of Hacking and Cracking Hack A hacker is a person who is proficient with computers and/or programming to an elite level where they know all of the in's and out's of a system. Crack A cracker is a hacker who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses etc.
World’s Most Famous Hacker Kevin Mitnick Stephen Wozniak Tsutomu Shimomura At the time of his arrest, he was the most-wanted computer criminal in the United States.
PURPOSE OF HACKING • To steal Money Important data / information • To test their knowledge in understanding network and computer system • To harm someone’s privacy • To become a cyber warrior • To espionage other people
• Data loss • Increasing maintenance cost • Negative reputation
HACKTIVISM The act of hacking, or breaking into computer system, for a political or socially motivated purpose. The individual who performs an act of Hacktivism is said to be a Hacktivist. They uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause.
Hacktivism (The war on…)
What is Hacktivism?
What is Hacktivism Well it’s a portmanteau of…
What is Hacktivism Well it’s a portmanteau of… Hacking…
What is Hacktivism Well it’s a portmanteau of… Hacking… and activism.
So what is hacking?
Learning and Sharing the Knowledge Information wants to be free!
Hacking + Activism =
Hacking + Activism =
So what is hacktivism? Involves… 1. Repurposing of Technology
So what is hacktivism? Involves… 1. Repurposing of Technology 2. Better understanding of technology (including traditional technologies)
So what is hacktivism? Involves… 1. Repurposing of Technology 2. Better understanding of technology (including traditional technologies) 3. Promoting education of these technologies (they should not be foreign to us).
So what is hacktivism? Involves… 1. Repurposing of Technology 2. Better understanding of technology (including traditional technologies) 3. Promoting education of these technologies (they should not be foreign to us). 4. Possibly with a sense of whimsy
So what is hacktivism? Involves… 1. Repurposing of Technology 2. Better understanding of technology (including traditional technologies) 3. Promoting education of these technologies (they should not be foreign to us). 4. Possibly with a sense of whimsy 5. Done for a social cause.
A brief history of Hacktivism
WANK Worm According to Julian Assange, the WANK worm is the first instance of hacktivism. On Oct. 16, 1989, during the Cold War when nuclear war was an immediate possibility, hackers hit the NASA computers with the WANK Worm. Two days prior to the launch of the plutoniumfueled Galileo space probe from the Kennedy Space Station, NASA employees logged on to see a humorous yet frightening welcome screen: "Your computer has been officially WANKed. You talk of times of peace for all, and then prepare for war," and "Remember, even if you win the rat race, you're still a rat." The machines of the U.S. Department of Energy and NASA worldwide had been penetrated by the anti-nuclear WANK (WORMS AGAINST NUCLEAR KILLERS) worm.
The Rise of Hacktivism The Mentor
The Mentor 1 But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world...
The Mentor 2 Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike.
The Mentor 3 Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. That year… Julian Assange get’s his first computer Jeremy Hammond is Born
Electronic Disturbance Theater
Wikileaks Leaking site Developed by Julian Assange Background as a hacker Endorses Hacktivist ethic: information wants to be free. 22:50 https://www.youtube.com/watch?v=PvmfOaZ34Pk
Anonymous • Suddenly emerged in 2008 • At the beginning it was composed of professionals → Now anyone can participate
Anonymous • GOALS: end with the oppression from governments and other organizations on the Internet o “We want to fight the powers-that-be when they overstep the lines.” • Conciousness o "I'm not under the illusion that we're going to change the world,but if we can make a big enough noise for people to notice there's a problem and scream loud enough, someone's going to take notice. That's what Anonymous is." Scottish Activist
Questions How can we influence policy decisions on surveillance & protest our invasion of privacy?
Questions How can we influence policy decisions on surveillance & protest our invasion of privacy? : First we have to educate our peers.
Questions How can we influence policy decisions on surveillance & protest our invasion of privacy? : First we have to educate our peers. Keep Talking. Spread the word.
Conclusion Hacking is a good computing skill that can be used for good or bad intention. Hacking does not mean using your computing skills to do bad. Society have forgotten the difference between crackers and hackers. Learning skills of hacking is only for the greater good. The End
References http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking.htm http://whatishacking.org/ http://whatismyipaddress.com/hacking http://dictionary.reference.com/browse/hacker?s=t http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_cracking http://answers.yahoo.com/question/index?qid=20071206182542AA3JzNy http://www.huffingtonpost.co.uk/eva-blumdumontet/29c3-hacking-politics_b_2512573.html http://answers.yahoo.com/question/index?qid=20110801131429AAFTktO http://www.cs.berkeley.edu/~bh/hacker.html http://www.ehow.com/about_4673738_why-do-people-hack.html http://venturebeat.com/2011/12/28/anonymous-stratfor-hack-10-things-to-know/ http://www.slideshare.net/TerroWhite/ethical-hacking-and-it-security-training http://www.switched.com/2011/02/24/what-to-do-email-account-hacked/ Thank You
Any **Queries ? **Ask@Your Own Risk
Editorial: introduction to hacking and hacktivism ... good or bad? Are hackers the heroes or villains of cyberspace? Are
Hacking, Hackers, and Hacktivism. ... Spend five minutes with anyone who studies “hackers” and you will quickly learn ... Introduction to the Computer ...
Hacking, Hackers, and Hacktivism. ... Introduction to the ... especially the theatrical aspect of modern internet hacking. While hackers were once ...
... Introduction to hacking and hacktivism on ResearchGate, ... Hackers have reintroduced an element of conflict and antagonism into otherwise ...
Introduction to Web Hacking. ... This hacktivism attempted to find members of ISIS and the KKK and ... This is a good introduction to hacking and hackers.
Hacking Book 1: Attack Phases ... Understand hacktivism. ... Introduction to Ethical Hacking Hackers have various motivations for breaking into
Ethical Hacking, Ethics, and Legality ... ÛÛList the five stages of ethical hacking ÛÛWhat is hacktivism? ... the ethical hackers who use their hacking ...
Ethical Hacking , Ethics, and ... Hacking and Listing the Five Stages of Ethical Hacking What Is Hacktivism? ... the ethical hackers who use their hacking ...