Hacking Training - PowerPoint PPT Presentation

About This Presentation
Title:

Hacking Training

Description:

Learn hacking from the best hacking training institute Our award-winning trainers are active members of the information Security community. Information security trainers, practicing on live simulations in our on-demand lab environment will train you. The best way to learn is doing practice, not by reading a book or searching hacking tricks online. If you’re a beginner and want to learn ethical hacking, the data provided in this website will assist you out. For simple and straightforward understanding I actually have published this website within the type of question and answer with a number of the frequently asked questions for beginners and enthusiasts. – PowerPoint PPT presentation

Number of Views:134
Slides: 17
Provided by: hackingtraining

less

Transcript and Presenter's Notes

Title: Hacking Training


1
Hacking Training hackasoftware.com
2
Agenda
  • What is a hacker
  • What motivates a hacker
  • The hacking training community
  • Who belongs?
  • The rules of the game (aka Hacker Ethic)
  • Conclusions

3
What is a hacker?
  • Many ways to describe hackers
  • 1. Creates and modifies.
  • -computer software and computer hardware
  • 2. Exploits systems and gains unauthorized
    access. -through clever tactics and detailed
    knowledge.
  • 3. Computer enthusiast/person who enjoys learning
    programming languages.
  • 4. Someone who breaks into computers.
  • 5. Can make a computer do what they want
  • 6. Anyone who breaks open code and manipulates
    it in a clever or original
  • -Not necessarily illegal.

4
Types of Hackers- white hat
  • White Hat- hired by large corporations, or
    governments
  • Usually as a Tiger Team
  • Tiger Team is a team that is hired to test the
    security of networks/find flaws or loopholes
  • Will snoop around networks, trying to find
    loopholes
  • If such loophole(s) is/are found report created
    explaining how hack was achieved

5
Types of Hackers- grey hat
  • Grey Hat
  • Unhired
  • People who break into networks for fun
  • Usually dont intentionally cause harm (following
    hacker ethic)
  • Enjoy doing this
  • Perceived as challenge
  • Want kudos from hacker peers
  • Want to test security to prevent such attacks in
    future

6
Types of Hackers- black hat
  • Black hat/crackers
  • Stereotypical hacker you hear about in the media
  • Break into systems and damage them
  • May write things like you just got served by X
    group
  • May delete files, erase portions of code, etc.
  • Crackers fall under this category
  • Use reverse engineering of assembly code to make
    it open source, or to customize it to their
    liking
  • Also known as pirates, or warez writers

7
What motivates a hacker
  • To help others
  • Hooliganism
  • Criminal intent
  • Financial gain
  • Most hacker activity is of a nature where money
    is rarely involved
  • Curiosity
  • Intellectual Challenge
  • Security heads-up!

8
The hacking community- who belongs
  • To join, have to be recognized
  • Sharing your creations (time, creativity, open
    source programs)
  • Learn to code efficiently
  • Hackers like well-coded programs
  • Better the program- more kudos
  • Become recognized when top hackers recognize you

9
The hacking community- the Hacker Ethic
  1. reject hierarchies
  2. mistrust authority
  3. promote decentralization
  4. share information
  5. serve your community (i.e. the hacker community)

10
Reject Hierarchies
  • User no less important than author
  • User may be able to improve product
  • Authors are also users of others products
  • People are only judged on skill
  • No social class, age, gender, race restrictions
  • Open source programs
  • Hacking into secure networks
  • Hackers ignore what society says about class
  • Have their own community
  • Have their own system

11
Mistrust Authority
  • Believe in libertarian environment
  • Everyman for himself
  • Government shouldnt dictate our boundaries
  • A rule is meant to be broken
  • If said cant be done green light to do it
  • Increased security better problem to solve
  • Increased security is better reason to find
    loopholes

12
Hacker Joke of the day!!
Not your typical hacker
13
Promote Decentralization
  • Every man for himself mentality
  • Segregation from society good
  • Keeps your identity more secure
  • More efficient work can be done
  • Cooperation can occur over internet
  • Dont need to be physically near each other
  • Communities operate worldwide

14
Share Information
  • Believe all info should be free
  • no restricted info
  • no top secret files
  • Governments should NOT hide things
  • software should be open source
  • Open source free/no copyrights
  • Increases awareness of software out there
  • Value of info increases when shared
  • Data can be basis for learning
  • software can be improved collectively

15
Serve Your Community
  • Contribute to open source projects
  • Become beta tester
  • Code new projects to share
  • Make improvements to existing ones
  • Keep Hacker infrastructure intact
  • Make FAQs on how to be a hacker
  • Establish websites/meeting places for hackers
  • Boring jobs maintain mailing lists, project
    databases/archives, moderate hacker news groups

16
Conclusion
  • Gave broad overview of hackers/hacker culture
  • what is a hacker?
  • White hat
  • Grey hat
  • Black hat/cracker
  • Hacker motivations
  • Hacker Community
  • Who belongs
  • The rules of the game (aka Hacker Ethic)
Write a Comment
User Comments (0)
About PowerShow.com