1 / 9

Hacking Strategies:

Hacking Strategies:. By Carlos G. Coca. “Hacker” Then and now. Originally a person who was skilled at programming language who was able to create/alter web content. Now: “A person who illegally gains access to and sometimes tampers with information in a computer system.”

marlo
Download Presentation

Hacking Strategies:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hacking Strategies: By Carlos G. Coca

  2. “Hacker”Then and now • Originally a person who was skilled at programming language who was able to create/alter web content. • Now: “A person who illegally gains access to and sometimes tampers with information in a computer system.” • Merriam-Webster definition

  3. Types of Hackers White Hat • Help prevent weak systems from being hacked. • Make web safer for individuals. Black Hat • Cause problems for individuals, companies and government. • Steal identities, money and add viruses.

  4. Ways to hack: • SQL injections • Worms • Encryption

  5. SQL Injections • SQL = Structured Query Language • Used to interact with databases. • Step 1: Hackers find holes in coding design. • Step 2: Add their own SQL into a database. • Step 3: Obtain information.

  6. Ways to prevent Whitelisting • Enables a program to check through a list of allowed characters. • Harder to give the database orders since they’re not allowed in the application. Blacklisting • Tells program to immediately deny: • Certain characters. • Combinations of characters.

  7. Malware – Worms • Infect systems and search for other systems to infect without user interaction. • Starts slow then “snowballs” and becomes more and more devastating. • Conflicker worm.

  8. Encryption • Encryption is used to hide passwords. • Hackers attack in three ways. • Brute force attack: • Program goes through every possible combination. • Dictionary attack: • Uses a downloaded list of common passwords and enters them rapidly. • Cryptanalysis attack: • Takes a long hash and breaks it down into smaller segments and tries answering smaller pieces of the puzzle at one time.

  9. Questions?

More Related