Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Wanna be a h4ck3r

eslam
November 14, 2010

Wanna be a h4ck3r

A snapshot of security
concept

eslam

November 14, 2010
Tweet

More Decks by eslam

Other Decks in Technology

Transcript

  1. Wanna be h4ck3r • Agenda – Security policy – Attackers

    – Type of attacks – So am I a looser ? – Live demo – ؟ نيدعب و بط – هدك ةيافك صلخ
  2. Security policy • Document describing the way computer equipment may/may

    not be used • Security policy aspects: – Physical security – Network security – Authentication – Authorization
  3. Physical Security • Ensure that nobody can access computer hardware

    – Locks on doors – Access codes – Signing-in of staff – Physical protection of cabling
  4. Physical Security • Physical environment – Uninterruptible Power Supply (UPS)

    – Fire suppression system – Air Conditioning (heat, moisture) • Physical breakdown of computer hardware – Spare components – Backups (consider off-site storage)
  5. Network Security • Ensure that no unauthorized user can access

    the system – over the network – Internet – other WAN – LAN • Needs to be done for every networked system
  6. Attackers • Hackers – A hacker is someone who wants

    to satisfy his curiosity • Means no harm • May cause harm accidentally
  7. Attackers • Crackers – A cracker is someone who wants

    to gain something • Access to your system to use resources • Access to data (e.g. credit card numbers) • Publicity • Revenge
  8. Attackers • Script Kiddies – A Script Kiddie is someone

    who uses hackers tools without understanding what they do
  9. Types of Attack (1) • Scanning – Which services are

    enabled – Which software and version is used • Sniffing – Monitoring data (e.g. passwords) in transit • Break-in – Gain access to a computer, preferably as superuser
  10. Types of Attack (1) • Brute Force – Try every

    possible combination until one works • Man-in-the-Middle – Act as the server to a client – Act as a client to the server
  11. Types of Attack (1) • Denial of Service (DoS) –

    Prevent legitimate users from working – Usually done by crashing or overloading the system or network • Distributed Denial of Service (DDoS) – DoS attack from many different sources simultaneously
  12. Types of Attack (2) • Maleware • Worm • Virus

    • Spyware • Trojan • Adware
  13. Types of Attack (2) • Virus – Malicious program that

    attaches itself to other programs • Worm – Self-replicating malicious program • Trojan Horse – Apparently useful program with a malicious component
  14. What You Have to Lose • Loss of resources –

    Disk space – Bandwidth – CPU time • Loss or alteration of data • Loss or impairment of service • Loss of reputation, goodwill, trust
  15. What You Have to Lose • Disclosure of personal, proprietary

    or confidential • information • Financial loss • Stolen credit card numbers • Legal, criminal action against you