Presented by: Kevin Regaldo Phillip Dai Hackers Presented by: Kevin Regaldo Phillip Dai
Hacker Defined… Hack (used with computers) verb : to devise or modify (a computer program), usually skillfully. Hacker: Person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. Hacker definition controversy: Good Hacking vs. Bad Hacking
Kinds of Hackers Black Hat: White Hat: Grey Hat: Script Kiddie: Specialize in accessing networks, remote computers, and/or uses of technology without interest in legality of action. White Hat: Specialize in penetration testing, such as testing own security system, often work as security consultants. Grey Hat: Hacker with borderline ethics may or may not commit crimes during course of exploits. Script Kiddie: Derogatory term used to describe those who use programs developed by others to attack computer systems.
Common Programs Vulnerabilty Scanner: Packet Sniffer: Trojan Horse: Check computers on a network for know weaknesses, Comparable to a port scanner which looks for open “ports” on a computer. Packet Sniffer: Captures data packets used to capture passwords and other data. Trojan Horse: Sets up a back door in a system which allows the intruder access later. Keyloggers: Tool designed to record keystrokes, usually combined with virus, worm, or Trojan horse to remain hidden.
Tech Model Railroad Club Tech Model Railroad Club (TMRC) Where “hackers” originated. Signals and Power Subcomittee would literally ‘hack’ into the power and relays to either improve performance or fix a problem. TMRC “hackers” became the nucleus of MIT’S Artificial Intelligence Lab in early 80’s.
Phreaking Phreaking : Phone + Freak Single Frequency Phone Lines Multi-Frequency Phone Lines 1957, Joe Engressia discovered whistling forth E above middle C or 2600HZ would cause the switch to think the call was over which left the system open to exploitation. Provided free long-distance and international calls
Bulletin Board Systems Computerized Bulletin Board System Started in Chicago 1978 by Ward Christensen and Randy Suess. Went online in Feb 16, 1978 Computer system running software that allows users to connect and log into system. Predecessor to internet forums/chat rooms. Accessed only over a phone line using a modem.
Dawn of modern computational hacking BBS became popular, served as a meeting ground for previously scattered phreakers to share discoveries and experiments. Since BBS was accessed through phone lines, early hackers would use phreaking methods to find open lines and modem numbers belonging to businesses .
Kevin Mitnick Black Hat Started exploiting bus punch cards to get free rides. Hacked: Computers Stole corporate secrets Scrambled phone networks National defense warning system
Aftermath… 2 ½ year coast-to-coast hacking spree “The most wanted computer criminal in United States history” –The Department of Justice Arrested in 1995 Charged with breaking into the Digital Equipment Corporation’s network and stealing software. 5 years in prison (8 months of solitary confinement)
Today Inspired 2 movies: Computer security consultant Author/Speaker Freedom Downtime Takedown Computer security consultant Author/Speaker The Art of Intrusion The Art of Deception
Tsutomu Shimomura Research scientist in computational physics Got hacked by Kevin Mitnick White Hat Helped FBI track down Mitnick Computer security expert for NSA.
Tim Berners-Lee Computer scientist MIT Professor World Wide Web Works for UK govt. to help make data more open and accessible on the web Net Neutrality: “Connectivity with no strings attached.”
References http://dictionary.reference.com/browse/hack?&qsrc=2939 http://en.wikipedia.org/wiki/Phreaking#Computer_hacking http://en.wikipedia.org/wiki/Bulletin_board_systems#Content_and_access http://www.itsecurity.com/features/top-10-famous-hackers-042407/ http://en.wikipedia.org/wiki/Kevin_Mitnick http://en.wikipedia.org/wiki/Tsutomu_Shimomura http://en.wikipedia.org/wiki/Tim_Burners_Lee