Introduction To Hacking

 
Published on Dec. 12, 2010

NEW CONTENT ON: http://www.FailedNormal.com Info Level: Beginner Presenter: Eli the Computer Guy Date Created: November 3, 2010 Length of Class: 68 Minutes Tracks Hacking Prerequisites None Purpose of Class This class gives an overview of what hacking is and what hackers do. Topics Covered What is Hacking and Who are Hackers Legal Questions for "Ethical Hackers" Planning an Attack Ways to Attack Protecting Yourself from Discovery Class Notes What is Hacking and Who are Hackers Hacking is Non Convenenal Ways of Interacting with Systems Hats -- Black is Bad, White is Good, Grey Depends on Who You Ask "Ethical Hacking" -- is more a marketing term then anything else. Reasons Acquire Data Impersonation Destruction Fun Fog of Law Corporate Privacy Policy Who owns the SYSTEM is not the same as who owns the DATA Beware of HIPPA and other Privacy Laws Ways to Attack Physical Physically Enter a Building for Theft or to Open a Breach Gaining Entry to a Building Posing as Computer Tech/ Security Be a Temp Employee Hack systems internally Leave a Device to Allow Hacking into Network Planning Attacks What do you want? Mass Attack is where you go after as many systems as possible. Semi Targeted attacks mean you go after a group of targets. Such as you attack companies that use a specific program. Targeted attacks mean you single out a single company for attack Protecting Yourself You can be tracked, but it's not usually worth their time Hack from an Internet Connection that is unattached to you. Leave no trace on your system -- Temp and Log files will document your activities Use compromised systems for attacks Use prepaid credit cards/ phones for transactions and communication RUN and deny everything if found out Criminal Justice Funnel -- Approx. 2% of Criminals Caught Receive any kind of punishment