What is hacking? Taeho Oh ohhara [email protected].
-
Upload
chad-derrick-hampton -
Category
Documents
-
view
216 -
download
1
Transcript of What is hacking? Taeho Oh ohhara [email protected].
![Page 2: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/2.jpg)
Contents (1)
• Who is hacker?• History of hacking• Types of hacking• Hacking accidents• Why do hackers hack?• What hackers do after hacking?• What do hackers know?
![Page 3: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/3.jpg)
Contents (2)
• How can kid hack?• Why can’t Korean kid hack?• How can be a real hacker?• Why can’t defend against hackers?• How can protect the system?• What should do after hacked?
![Page 4: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/4.jpg)
Contents (3)
• How to translate the hackers’ language
![Page 5: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/5.jpg)
Who is hacker? (1)
• Hack– Cut with repeated irregular blows– Examine something very minutely
• Hacker– The person who hacks
• Cracker– System intruder/destroyer
![Page 6: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/6.jpg)
Who is hacker? (2)
• Hacker means cracker nowadays– Meaning has been changed
![Page 7: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/7.jpg)
History of hacking
• Telephone hacking– Use telephone freely– It’s called phreaking
• Computer virus– Destroy many computers
• Network hacking– Hack the important server remotely and des
troy/modify/disclose the information
![Page 8: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/8.jpg)
Types of hackingNormal
data transfer
Interruption Interception
Modification Fabrication
![Page 9: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/9.jpg)
Hacking accidents (1)
• Internet Worm– Robert T. Morris made an internet
worm. It spread through the internet and crashed about 6000 systems.
• Cuckoo’s Egg– Clifford Stoll caught the hackers who
are the German hackers applied by KGB
![Page 10: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/10.jpg)
Hacking accidents (2)
• IP Spoof– Kevin Mitnick was caught by Tsutomu Shim
omura who was security expert. Kevin Mitnick uses the IP Spoof attack in this accident
![Page 11: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/11.jpg)
Why do hackers hack?
• Just for fun• Show off• Hack other systems secretly• Notify many people their thought• Steal important information• Destroy enemy’s computer
network during the war
![Page 12: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/12.jpg)
What do hackers do after hacking? (1)
• Patch security hole– The other hackers can’t intrude
• Clear logs and hide themselves• Install rootkit ( backdoor )
– The hacker who hacked the system can use the system later
– It contains trojan ls, ps, and so on
![Page 13: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/13.jpg)
What do hackers do after hacking? (2)
• Install irc related program– identd, irc, bitchx, eggdrop, bnc
• Install scanner program– mscan, sscan, nmap
• Install exploit program• Install denial of service program• Use all of installed programs silently
![Page 14: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/14.jpg)
What do hackers know?
• Don’t know how to use vi• Don’t know what unix is• Don’t know what they do• Know how to intrude the system• Know how to crash the system• Know where the hacking programs are
![Page 15: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/15.jpg)
How can kid hack?
• Kid has much of time– Kid can search for longer time than
other people
• All hacking program is easy to use• Kid doesn’t have to know how the
hacking program works• These kids are called script kiddies
![Page 16: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/16.jpg)
Why can’t Korean kid hack?
• Almost all Korean kids don’t know English well
• Almost all hacking program manuals are written in English– However, many hacking program
manuals are being translated
![Page 17: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/17.jpg)
How can be a real hacker?
• Study C/C++/assembly language• Study computer architecture• Study operating system• Study computer network• Examine the hacking tools for a
month• Think the problem of the computer
![Page 18: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/18.jpg)
Why can’t defend against hackers?
• There are many unknown security hole
• Hackers need to know only one security hole to hack the system
• Admin need to know all security holes to defend the system
![Page 19: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/19.jpg)
How can protect the system? (1)
• Patch security hole often• Encrypt important data
– Ex) pgp, ssh• Do not run unused daemon• Remove unused setuid/setgid program• Setup loghost
![Page 20: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/20.jpg)
How can protect the system? (2)
• Use switch hub• Setup firewall
– Ex) ipchains• Setup IDS
– Ex) snort• Check unintentional changes
– Ex) tripwire
![Page 21: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/21.jpg)
How can protect the system? (3)
• Backup the system often
![Page 22: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/22.jpg)
What should do after hacked?
• Shutdown the system– Or turn off the system
• Separate the system from network• Restore the system with the backup
– Or reinstall all programs
• Connect the system to the network• It can be good to call the police
![Page 23: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/23.jpg)
How to translate the hackers’ language (1)
1 -> i or l3 -> e4 -> a7 -> t9 -> g0 -> o$ -> s| -> i or l
|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x
![Page 24: What is hacking? Taeho Oh ohhara ohhara@postech.edu.](https://reader033.fdocuments.net/reader033/viewer/2022051415/56649d215503460f949f635f/html5/thumbnails/24.jpg)
How to translate the hackers’ language (2)
• Ex)– 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1
s wh3n 1 h4ck3d 1n
– I did not hack this page, it was like this when I hacked in