SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
We want this Internet, this global cyberspace, to be completely  free , completely open. Everyone does. I do. But we also want to conduct business there, and we want to relax there and have our children be educated there and seek entertainment there. Those kinds of activities require law enforcement, require international treaties, require responsibility, corporate responsibility and personal responsibility. So we have a long way to go before cyberspace is as safe, even, as the highways. And as you know, the highways aren't all that safe.  Computer Crime: Horses, Hacking and Hell Raising
Source:  2007 CSI Computer Crime and Security Survey
 
 
Viruses: List of Recent Viruses, Worms and Horses Viruses  - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.  E-mail viruses  - An e-mail virus moves around in  e-mail messages , and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.  Worms  - A worm is a small piece of software that uses  computer networks  and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.  Code Red is an example of a nasty worm . Trojan horses  - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your  hard disk ). Trojan horses have no way to replicate automatically.
Horses: A destructive  program  that masquerades as a benign application. Unlike  viruses , Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.  The term comes from a story in Homer's Iliad, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.
Hacking: ,[object Object],[object Object],[object Object],[object Object],Cases of Hacking: http://www.cybercrime.gov/gorshkovSent.htm http://www. cybercrime . gov/doppsPlea . htm
Hell Raising: Denial of Service  attacks (DoS) are a type of attack on a  network  that is designed to bring the network to its knees by flooding it with useless  traffic . Two types of DoS are called a Zombie and Pulsing Zombie. Excellent description of this technology and how it works at  http://grc.com/dos/drdos.htm IP Spoofing  is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an  IP address  indicating that the message is coming from a trusted host. Port Scanning  is the act of systematically scanning a computer's  ports . Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing  networks , but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.
CERT - The Experts Established in 1988, the CERT® Coordination Center (CERT/CC) is a center of Internet security expertise, located at the  Software Engineering Institute , a federally funded research and development center operated by  Carnegie Mellon University .  Find out more at  http://www.cert.org
Wireless Security Insertion Attacks  Unauthorized devices on the wireless network.  This can be clients or base stations.  Interception and monitoring wireless traffic  Wireless Sniffer , Hijacking the session, Broadcast Monitoring, ArpSpoof Monitoring and Hijacking, BaseStation Clone (Evil Twin) intercept traffic ( more ). Client to Client Attacks   Two wireless clients can talk directly to each other by-passing the base station. Because of this, each client must protect itself from other clients.
Jamming  Denial of service attacks for wired networks are popular. This same principle can be applied to wireless traffic, where legitimate traffic gets jammed because illegitimate traffic overwhelms the frequencies, and legitimate traffic can not get through.  2.4 GHz Interfering Technology  An attacker with the proper equipment and tools can easily flood the 2.4 GHz frequency, so that the signal to noise drops so low, that the wireless network ceases to function. This can be a risk with even non-malicious intent as more technologies use the same frequencies and cause blocking. Cordless phones, baby monitors, and other devices like Bluetooth that operate on the 2.4 GHz frequency can disrupt a wireless network.  Wireless (continued)
Configuration errors Use of default SIDs is often an issue. Base stations come with default SSIDs. Attackers can use these default SSIDs to attempt to penetrate base stations that are still in their default configuration. Here are some default SSIDs:  * “tsunami” - Cisco * “101” – 3Com  * “RoamAbout Default Network Name” - Lucent/Cabletron  * “Default SSID" * “Compaq” - Compaq  * “WLAN” – Addtron, a popular AP  * “intel” - Intel  * “linksys” – Linksys  * “Wireless”  Wireless (continued)
War Chalking: Using chalk to place a special symbol on a sidewalk or other surface that indicates a nearby wireless network, especially one that offers Internet access. Based on old hobo  language
 
Cybercrime Recent Cases http://www.crime-research.org/links/ A list of recent convictions of cybercrimes can be found at:
How It’s Done Let’s take a look at a simple example of how it might be done:  1)  First we look for something that is “trusted” by computer systems. Email 2) We learn how email REALLY works RFC 821
A Typical SMTP Transaction Scenario R: 220 BBN-UNIX.ARPA Simple Mail Transfer Service Ready S: HELO USC-ISIF.ARPA R: 250 BBN-UNIX.ARPA S: MAIL FROM:<Smith@USC-ISIF.ARPA> R: 250 OK S: RCPT TO:<Jones@BBN-UNIX.ARPA> R: 250 OK S: RCPT TO:<Green@BBN-UNIX.ARPA> R: 550 No such user here S: RCPT TO:<Brown@BBN-UNIX.ARPA> R: 250 OK S: DATA R: 354 Start mail input; end with <CRLF>.<CRLF> S: Blah blah blah... S: ...etc. etc. etc. S: . R: 250 OK S: QUIT R: 221 BBN-UNIX.ARPA Service closing transmission channel
[Jim-Greenbergs-Computer:~] jimgreen%  telnet smtp.oneonta.edu 25 Trying 137.141.15.30... Connected to smtp.oneonta.edu. Escape character is '^]'. 220 EXCHANGEN1.oneonta.edu Microsoft ESMTP MAIL Service, Version: 5.0.2195.5329 ready at  Tue, 5 Nov 2002 08:10:23 -0500  helo 250 EXCHANGEN1.oneonta.edu Hello [137.141.12.36] mail from:<santa@north.pole> 250 2.1.0 santa@north.pole....Sender OK rcpt to:<greenbjb@oneonta.edu> 250 2.1.5 greenbjb@oneonta.edu  data  354 Start mail input; end with <CRLF>.<CRLF> Hey Joe What'a know? . 250 2.6.0 <EXCHANGE1RxwfhMvmKc00012a4b@EXCHANGEN1.oneonta.edu> Queued mail for delivery quit 221 2.0.0 EXCHANGEN1.oneonta.edu Service closing transmission channel Connection closed by foreign host. [Jim-Greenbergs-Computer:~] jimgreen%
What is this and why should I care?  Mass Victimization Some links about this:  http://www.theregister.co.uk/2001/04/19/online_mass_victimization_inevitable_study/ http://www.maricopacountyattorney.org/Newsletters/rrcomments/rrarct.asp
CALEA and Terrorism In October 1994, Congress took action to protect public safety and ensure national security by enacting the  Communications Assistance for Law Enforcement Act of 1994 (CALEA), Pub. L. No. 103-414, 108 Stat. 4279 . The law further defines the existing statutory obligation of telecommunications carriers to assist law enforcement in executing electronic surveillance pursuant to court order or other lawful authorization.The objective of CALEA implementation is to preserve law enforcement's ability to conduct lawfully-authorized electronic surveillance while preserving public safety, the public's right to privacy, and the telecommunications industry's competitiveness.
 
 
Privacy Concerns? RFID, GPS, Software tools, data security and CALEA Have a number of groups worried about privacy and possible  Victimization.

Más contenido relacionado

La actualidad más candente

SSL MITM Attack Over Wireless
SSL MITM Attack Over WirelessSSL MITM Attack Over Wireless
SSL MITM Attack Over WirelessSecurityTube.Net
 
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherPankaj Dubey
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
Mitm(man in the middle) ssl proxy attacks
Mitm(man in the middle) ssl proxy attacksMitm(man in the middle) ssl proxy attacks
Mitm(man in the middle) ssl proxy attacksJaeYeoul Ahn
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hackingjignesh khunt
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing AttacksPECB
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersSomyos U.
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using itRajesh Porwal
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKINGNAWAZ KHAN
 
Network Security fundamentals
Network Security fundamentalsNetwork Security fundamentals
Network Security fundamentalsTariq kanher
 
Holland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_videoHolland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_videorobbuddingh
 

La actualidad más candente (20)

SSL MITM Attack Over Wireless
SSL MITM Attack Over WirelessSSL MITM Attack Over Wireless
SSL MITM Attack Over Wireless
 
Web spoofing
Web spoofingWeb spoofing
Web spoofing
 
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
I P S P O O F I N G
I P  S P O O F I N GI P  S P O O F I N G
I P S P O O F I N G
 
Mitm(man in the middle) ssl proxy attacks
Mitm(man in the middle) ssl proxy attacksMitm(man in the middle) ssl proxy attacks
Mitm(man in the middle) ssl proxy attacks
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Spoofing
SpoofingSpoofing
Spoofing
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
 
Network Security
Network SecurityNetwork Security
Network Security
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
 
Web spoofing (1)
Web spoofing (1)Web spoofing (1)
Web spoofing (1)
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Network Security fundamentals
Network Security fundamentalsNetwork Security fundamentals
Network Security fundamentals
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Holland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_videoHolland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_video
 

Similar a Hacking

Similar a Hacking (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
IBPS SO
IBPS SOIBPS SO
IBPS SO
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
RAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalRAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan Bansal
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
cyber crime
cyber crimecyber crime
cyber crime
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
Recognizing security threats
Recognizing security threatsRecognizing security threats
Recognizing security threats
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
31.ppt
31.ppt31.ppt
31.ppt
 
31.ppt
31.ppt31.ppt
31.ppt
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
 

Más de SUNY Oneonta

Society and animals sample assignment
Society and animals sample assignmentSociety and animals sample assignment
Society and animals sample assignmentSUNY Oneonta
 
ConnectYard Pilot CIT 2010
ConnectYard Pilot CIT 2010ConnectYard Pilot CIT 2010
ConnectYard Pilot CIT 2010SUNY Oneonta
 
Suny faculty senate
Suny faculty senateSuny faculty senate
Suny faculty senateSUNY Oneonta
 
Data Integration Lecture
Data Integration LectureData Integration Lecture
Data Integration LectureSUNY Oneonta
 

Más de SUNY Oneonta (8)

Society and animals sample assignment
Society and animals sample assignmentSociety and animals sample assignment
Society and animals sample assignment
 
Cit2002 scap-talk
Cit2002 scap-talkCit2002 scap-talk
Cit2002 scap-talk
 
ConnectYard Pilot CIT 2010
ConnectYard Pilot CIT 2010ConnectYard Pilot CIT 2010
ConnectYard Pilot CIT 2010
 
Suny faculty senate
Suny faculty senateSuny faculty senate
Suny faculty senate
 
Podcasting
PodcastingPodcasting
Podcasting
 
Cit2006
Cit2006Cit2006
Cit2006
 
Data Integration Lecture
Data Integration LectureData Integration Lecture
Data Integration Lecture
 
Education 206
Education 206Education 206
Education 206
 

Último

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 

Último (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 

Hacking

  • 1. We want this Internet, this global cyberspace, to be completely free , completely open. Everyone does. I do. But we also want to conduct business there, and we want to relax there and have our children be educated there and seek entertainment there. Those kinds of activities require law enforcement, require international treaties, require responsibility, corporate responsibility and personal responsibility. So we have a long way to go before cyberspace is as safe, even, as the highways. And as you know, the highways aren't all that safe. Computer Crime: Horses, Hacking and Hell Raising
  • 2. Source: 2007 CSI Computer Crime and Security Survey
  • 3.  
  • 4.  
  • 5. Viruses: List of Recent Viruses, Worms and Horses Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc. E-mail viruses - An e-mail virus moves around in e-mail messages , and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. Code Red is an example of a nasty worm . Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk ). Trojan horses have no way to replicate automatically.
  • 6. Horses: A destructive program that masquerades as a benign application. Unlike viruses , Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. The term comes from a story in Homer's Iliad, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.
  • 7.
  • 8. Hell Raising: Denial of Service attacks (DoS) are a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic . Two types of DoS are called a Zombie and Pulsing Zombie. Excellent description of this technology and how it works at http://grc.com/dos/drdos.htm IP Spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. Port Scanning is the act of systematically scanning a computer's ports . Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks , but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.
  • 9. CERT - The Experts Established in 1988, the CERT® Coordination Center (CERT/CC) is a center of Internet security expertise, located at the Software Engineering Institute , a federally funded research and development center operated by Carnegie Mellon University . Find out more at http://www.cert.org
  • 10. Wireless Security Insertion Attacks Unauthorized devices on the wireless network. This can be clients or base stations. Interception and monitoring wireless traffic Wireless Sniffer , Hijacking the session, Broadcast Monitoring, ArpSpoof Monitoring and Hijacking, BaseStation Clone (Evil Twin) intercept traffic ( more ). Client to Client Attacks Two wireless clients can talk directly to each other by-passing the base station. Because of this, each client must protect itself from other clients.
  • 11. Jamming Denial of service attacks for wired networks are popular. This same principle can be applied to wireless traffic, where legitimate traffic gets jammed because illegitimate traffic overwhelms the frequencies, and legitimate traffic can not get through. 2.4 GHz Interfering Technology An attacker with the proper equipment and tools can easily flood the 2.4 GHz frequency, so that the signal to noise drops so low, that the wireless network ceases to function. This can be a risk with even non-malicious intent as more technologies use the same frequencies and cause blocking. Cordless phones, baby monitors, and other devices like Bluetooth that operate on the 2.4 GHz frequency can disrupt a wireless network. Wireless (continued)
  • 12. Configuration errors Use of default SIDs is often an issue. Base stations come with default SSIDs. Attackers can use these default SSIDs to attempt to penetrate base stations that are still in their default configuration. Here are some default SSIDs: * “tsunami” - Cisco * “101” – 3Com * “RoamAbout Default Network Name” - Lucent/Cabletron * “Default SSID&quot; * “Compaq” - Compaq * “WLAN” – Addtron, a popular AP * “intel” - Intel * “linksys” – Linksys * “Wireless” Wireless (continued)
  • 13. War Chalking: Using chalk to place a special symbol on a sidewalk or other surface that indicates a nearby wireless network, especially one that offers Internet access. Based on old hobo language
  • 14.  
  • 15. Cybercrime Recent Cases http://www.crime-research.org/links/ A list of recent convictions of cybercrimes can be found at:
  • 16. How It’s Done Let’s take a look at a simple example of how it might be done: 1) First we look for something that is “trusted” by computer systems. Email 2) We learn how email REALLY works RFC 821
  • 17. A Typical SMTP Transaction Scenario R: 220 BBN-UNIX.ARPA Simple Mail Transfer Service Ready S: HELO USC-ISIF.ARPA R: 250 BBN-UNIX.ARPA S: MAIL FROM:<Smith@USC-ISIF.ARPA> R: 250 OK S: RCPT TO:<Jones@BBN-UNIX.ARPA> R: 250 OK S: RCPT TO:<Green@BBN-UNIX.ARPA> R: 550 No such user here S: RCPT TO:<Brown@BBN-UNIX.ARPA> R: 250 OK S: DATA R: 354 Start mail input; end with <CRLF>.<CRLF> S: Blah blah blah... S: ...etc. etc. etc. S: . R: 250 OK S: QUIT R: 221 BBN-UNIX.ARPA Service closing transmission channel
  • 18. [Jim-Greenbergs-Computer:~] jimgreen% telnet smtp.oneonta.edu 25 Trying 137.141.15.30... Connected to smtp.oneonta.edu. Escape character is '^]'. 220 EXCHANGEN1.oneonta.edu Microsoft ESMTP MAIL Service, Version: 5.0.2195.5329 ready at Tue, 5 Nov 2002 08:10:23 -0500 helo 250 EXCHANGEN1.oneonta.edu Hello [137.141.12.36] mail from:<santa@north.pole> 250 2.1.0 santa@north.pole....Sender OK rcpt to:<greenbjb@oneonta.edu> 250 2.1.5 greenbjb@oneonta.edu data 354 Start mail input; end with <CRLF>.<CRLF> Hey Joe What'a know? . 250 2.6.0 <EXCHANGE1RxwfhMvmKc00012a4b@EXCHANGEN1.oneonta.edu> Queued mail for delivery quit 221 2.0.0 EXCHANGEN1.oneonta.edu Service closing transmission channel Connection closed by foreign host. [Jim-Greenbergs-Computer:~] jimgreen%
  • 19. What is this and why should I care? Mass Victimization Some links about this: http://www.theregister.co.uk/2001/04/19/online_mass_victimization_inevitable_study/ http://www.maricopacountyattorney.org/Newsletters/rrcomments/rrarct.asp
  • 20. CALEA and Terrorism In October 1994, Congress took action to protect public safety and ensure national security by enacting the Communications Assistance for Law Enforcement Act of 1994 (CALEA), Pub. L. No. 103-414, 108 Stat. 4279 . The law further defines the existing statutory obligation of telecommunications carriers to assist law enforcement in executing electronic surveillance pursuant to court order or other lawful authorization.The objective of CALEA implementation is to preserve law enforcement's ability to conduct lawfully-authorized electronic surveillance while preserving public safety, the public's right to privacy, and the telecommunications industry's competitiveness.
  • 21.  
  • 22.  
  • 23. Privacy Concerns? RFID, GPS, Software tools, data security and CALEA Have a number of groups worried about privacy and possible Victimization.