hacking training - PowerPoint PPT Presentation

slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
hacking training PowerPoint Presentation
Download Presentation
hacking training

play fullscreen
1 / 16
Download Presentation
hacking training
118 Views
Download Presentation

hacking training

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Hacking Training hackasoftware.com

  2. Agenda • What is a hacker • What motivates a hacker • The hacking training community • Who belongs? • The “rules” of the game (aka Hacker Ethic) • Conclusions

  3. What is a hacker? Many ways to describe hackers: 1. Creates and modifies. -computer software and computer hardware 2. Exploits systems and gains unauthorized access. -through clever tactics and detailed knowledge. 3. Computer enthusiast/person who enjoys learning programming languages. 4. Someone who breaks into computers. 5. Can make a computer do what they want 6. Anyone who ‘breaks open’ code and manipulates it in a clever or original -Not necessarily illegal.

  4. Types of Hackers- white hat • “White Hat”- hired by large corporations, or governments • Usually as a “Tiger Team” • Tiger Team is a team that is hired to test the security of networks/find flaws or loopholes • Will snoop around networks, trying to find loopholes • If such loophole(s) is/are found – report created explaining how hack was achieved

  5. Types of Hackers- grey hat • “Grey Hat” • Unhired • People who break into networks for fun • Usually don’t intentionally cause harm (following hacker ethic) • Enjoy doing this • Perceived as challenge • Want kudos from hacker peers • Want to “test security to prevent such attacks in future”

  6. Types of Hackers- black hat • “Black hat”/crackers • Stereotypical hacker you hear about in the media • Break into systems and damage them • May write things like “you just got served by X group” • May delete files, erase portions of code, etc. • “Crackers” fall under this category • Use reverse engineering of assembly code to make it open source, or to customize it to their liking • Also known as pirates, or “warez writers”

  7. What motivates a hacker • To help others • ‘Hooliganism’ • Criminal intent • Financial gain • Most hacker activity is of a nature where money is rarely involved • Curiosity • Intellectual Challenge • Security heads-up!

  8. The hacking community- who belongs • To join, have to be recognized • Sharing your creations (time, creativity, open source programs) • Learn to code efficiently • Hackers like “well-coded” programs • Better the program- more kudos • Become recognized when top hackers recognize you

  9. The hacking community- the Hacker Ethic • reject hierarchies • mistrust authority • promote decentralization • share information • serve your community (i.e. the hacker community)

  10. Reject Hierarchies • User no less important than author • User may be able to improve product • Authors are also users of other’s products • People are only judged on skill • No social class, age, gender, race restrictions • Open source programs • Hacking into secure networks • Hackers ignore what society says about class • Have their own community • Have their own system

  11. Mistrust Authority • Believe in libertarian environment • Everyman for himself • Government shouldn’t dictate our boundaries • A rule is meant to be broken • If said can’t be done; green light to do it • Increased security= better “problem to solve” • Increased security is better reason to find loopholes

  12. Hacker Joke of the day!! Not your typical hacker

  13. Promote Decentralization • Every man for himself mentality • Segregation from society good • Keeps your identity more secure • More efficient work can be done • Cooperation can occur over internet • Don’t need to be physically near each other • Communities operate worldwide

  14. Share Information • Believe all info should be free • no restricted info • no “top secret” files • Governments should NOT hide things • software should be “open source” • Open source= free/no copyrights • Increases awareness of software “out there” • Value of info increases when shared • Data can be basis for learning • software can be improved collectively

  15. Serve Your Community • Contribute to open source projects • Become beta tester • Code new projects to share • Make improvements to existing ones • Keep Hacker infrastructure intact • Make FAQ’s on how to be a hacker • Establish websites/meeting places for hackers • “Boring” jobs: maintain mailing lists, project databases/archives, moderate hacker news groups

  16. Conclusion • Gave broad overview of hackers/hacker culture • what is a hacker? • White hat • Grey hat • Black hat/cracker • Hacker motivations • Hacker Community • Who belongs • The “rules” of the game (aka Hacker Ethic)