Introduction To Hacking
Description
Schedule a Skype Meeting with Eli: https://silicondiscourse.com
Info
Level: Beginner
Presenter: Eli the Computer Guy
Date Created: November 3, 2010
Length of Class: 68 Minutes
Tracks
Hacking
Prerequisites
None
Purpose of Class
This class gives an overview of what hacking is and what hackers do.
Topics Covered
What is Hacking and Who are Hackers
Legal Questions for "Ethical Hackers"
Planning an Attack
Ways to Attack
Protecting Yourself from Discovery
Class Notes
What is Hacking and Who are Hackers
Hacking is Non Convenenal Ways of Interacting with Systems
Hats -- Black is Bad, White is Good, Grey Depends on Who You Ask
"Ethical Hacking" -- is more a marketing term then anything else.
Reasons
Acquire Data
Impersonation
Destruction
Fun
Fog of Law
Corporate Privacy Policy
Who owns the SYSTEM is not the same as who owns the DATA
Beware of HIPPA and other Privacy Laws
Ways to Attack
Physical
Physically Enter a Building for Theft or to Open a Breach
Gaining Entry to a Building
Posing as Computer Tech/ Security
Be a Temp Employee
Hack systems internally
Leave a Device to Allow Hacking into Network
Planning Attacks
What do you want?
Mass Attack is where you go after as many systems as possible.
Semi Targeted attacks mean you go after a group of targets. Such as you attack companies that use a specific program.
Targeted attacks mean you single out a single company for attack
Protecting Yourself
You can be tracked, but it's not usually worth their time
Hack from an Internet Connection that is unattached to you.
Leave no trace on your system -- Temp and Log files will document your activities
Use compromised systems for attacks
Use prepaid credit cards/ phones for transactions and communication
RUN and deny everything if found out
Criminal Justice Funnel -- Approx. 2% of Criminals Caught Receive any kind of punishment