1 / 14

Hackers

Hackers. Presented by: Kevin Regaldo Phillip Dai. Hacker Defined…. Hack (used with computers) verb : to devise or modify (a computer program), usually skillfully. Hacker:

pisces
Download Presentation

Hackers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hackers Presented by: Kevin Regaldo Phillip Dai

  2. Hacker Defined… • Hack (used with computers) verb : • to devise or modify (a computer program), usually skillfully. • Hacker: • Person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. • Hacker definition controversy: • Good Hacking vs. Bad Hacking

  3. Kinds of Hackers • Black Hat: • Specialize in accessing networks, remote computers, and/or uses of technology without interest in legality of action. • White Hat: • Specialize in penetration testing, such as testing own security system, often work as security consultants. • Grey Hat: • Hacker with borderline ethics may or may not commit crimes during course of exploits. • Script Kiddie: • Derogatory term used to describe those who use programs developed by others to attack computer systems.

  4. Common Programs • Vulnerabilty Scanner: • Check computers on a network for know weaknesses, Comparable to a port scanner which looks for open “ports” on a computer. • Packet Sniffer: • Captures data packets used to capture passwords and other data. • Trojan Horse: • Sets up a back door in a system which allows the intruder access later. • Keyloggers: • Tool designed to record keystrokes, usually combined with virus, worm, or Trojan horse to remain hidden.

  5. Tech Model Railroad Club • Tech Model Railroad Club (TMRC) • Where “hackers” originated. • Signals and Power Subcomittee would literally ‘hack’ into the power and relays to either improve performance or fix a problem. • TMRC “hackers” became the nucleus of MIT’S Artificial Intelligence Lab in early 80’s.

  6. Phreaking • Phreaking : Phone + Freak • Single Frequency Phone Lines • Multi-Frequency Phone Lines • 1957, Joe Engressia discovered whistling forth E above middle C or 2600HZ would cause the switch to think the call was over which left the system open to exploitation. Provided free long-distance and international calls

  7. Bulletin Board Systems • Computerized Bulletin Board System • Started in Chicago 1978 by Ward Christensen and Randy Suess. • Went online in Feb 16, 1978 • Computer system running software that allows users to connect and log into system. • Predecessor to internet forums/chat rooms. • Accessed only over a phone line using a modem.

  8. Dawn of modern computational hacking • BBS became popular, served as a meeting ground for previously scattered phreakers to share discoveries and experiments. • Since BBS was accessed through phone lines, early hackers would use phreaking methods to find open lines and modem numbers belonging to businesses .

  9. Kevin Mitnick • Black Hat • Started exploiting bus punch cards to get free rides. • Hacked: • Computers • Stole corporate secrets • Scrambled phone networks • National defense warning system

  10. Aftermath… • 2 ½ year coast-to-coast hacking spree • “The most wanted computer criminal in United States history” –The Department of Justice • Arrested in 1995 • Charged with breaking into the Digital Equipment Corporation’s network and stealing software. • 5 years in prison (8 months of solitary confinement)

  11. Today • Inspired 2 movies: • Freedom Downtime • Takedown • Computer security consultant • Author/Speaker • The Art of Intrusion • The Art of Deception

  12. Tsutomu Shimomura • Research scientist in computational physics • Got hacked by Kevin Mitnick • White Hat • Helped FBI track down Mitnick • Computer security expert for NSA.

  13. Tim Berners-Lee • Computer scientist • MIT Professor • World Wide Web • Works for UK govt. to help make data more open and accessible on the web • Net Neutrality: • “Connectivity with no strings attached.”

  14. References • http://dictionary.reference.com/browse/hack?&qsrc=2939 • http://en.wikipedia.org/wiki/Phreaking#Computer_hacking • http://en.wikipedia.org/wiki/Bulletin_board_systems#Content_and_access • http://www.itsecurity.com/features/top-10-famous-hackers-042407/ • http://en.wikipedia.org/wiki/Kevin_Mitnick • http://en.wikipedia.org/wiki/Tsutomu_Shimomura • http://en.wikipedia.org/wiki/Tim_Burners_Lee

More Related