Presentation is loading. Please wait.

Presentation is loading. Please wait.

-Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application.

Similar presentations


Presentation on theme: "-Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application."— Presentation transcript:

1 -Ajay Babu.D y5cs022.

2 Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application hacking. How can protect the system? What should do after hacked?

3 Who is hacker? Hack Examine something very minutely Hacker The person who hacks Cracker System intruder/destroyer

4 History of hacking Telephone hacking Use telephone freely It ’ s called phreaking Computer virus Destroy many computers Network hacking Hack the important server remotely and destroy/modify/disclose the information

5 Types of hacking Normal data transfer InterruptionInterception ModificationFabrication

6 Do you know?  75% of attacks today happen at the Application (Gartner). Desktop augmented by Network and then Web Application Security.  Many “easy hacking recipes” published on web.  3 out of 4 vendor apps that are tested had serious SQL Injection bugs!  “The cost of correcting code in production increases up to 100 times as compared to in development...”

7 What do Hackers do? A few examples of Web application hacks SQL Injection Cross-site Scripting (# 1 threat today!)

8 SQL Injection Attacks “ SQL injection is a security vulnerability that occurs in the database layer of an application. Its source is the incorrect escaping of dynamically- generated string literals embedded in SQL statements. “ (Wikipedia)

9 SQL Injection Attacks Example of attack: SQL Query in Web application code: “SELECT * FROM users WHERE login = ‘” + username + “’ and password= ‘” + password + “’;” Hacker logs in as: ‘ or ‘’ = ‘’; -- SELECT * FROM users WHERE login = ‘’ or ‘’ = ‘’; --'; and password=‘’; Hacker deletes the users table with: ‘ or ‘’ = ‘’; DROP TABLE users; -- SELECT * FROM users WHERE login = ‘’ or ‘’=‘’; DROP TABLE users; --'; and password=‘’; SQL Injection examples are outlined in: http://www.spidynamics.com/papers/SQLInjectionWhitePaper.pdf http://www.unixwiz.net/techtips/sql-injection.html

10 SQL Injection Attacks Demo

11

12

13 Cross-Site Scripting (XSS) Attacks

14 XSS: Script Injection Demo

15

16 Preventing SQL injection and XSS SCRUB Error handling Error messages divulge information that can be used by hacker… VALIDATE all user entered parameters CHECK data types and lengths DISALLOW unwanted data (e.g. HTML tags, JavaScript)

17 How can protect the system?  Encrypt important data  Ex).pgp,.ssh  Do not run unused information  Remove unused programs  Setup firewall  Ex) IP chain  Check unintentional change  Backup the system often

18 What should do after hacked? Shutdown the system Or turn off the system Separate the system from network Restore the system with the backup Or reinstall all programs It can be good to report the police

19 Thank you -Ajay Babu.D Y5cs022.


Download ppt "-Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application."

Similar presentations


Ads by Google