Final presentation on Hacking Strategies

Download Report

Transcript Final presentation on Hacking Strategies

By Carlos G. Coca


Originally a person who was skilled at
programming language who was able to
create/alter web content.
Now: “A person who illegally gains access to
and sometimes tampers with information in a
computer system.”

Merriam-Webster definition


White Hat
Help prevent weak
systems from being
hacked.
Make web safer for
individuals.


Black Hat
Cause problems for
individuals,
companies and
government.
Steal identities,
money and add
viruses.

SQL injections

Worms

Encryption

SQL = Structured Query Language




Used to interact with databases.
Step 1: Hackers find holes in coding design.
Step 2: Add their own SQL into a database.
Step 3: Obtain information.


Whitelisting
Enables a program to
check through a list of
allowed characters.
Harder to give the
database orders since
they’re not allowed in
the application.

Blacklisting
Tells program to
immediately deny:
Certain characters.
 Combinations of
characters.




Infect systems and search for other systems to
infect without user interaction.
Starts slow then “snowballs” and becomes
more and more devastating.
Conflicker worm.


Encryption is used to hide passwords.
Hackers attack in three ways.

Brute force attack:
 Program goes through every possible combination.

Dictionary attack:
 Uses a downloaded list of common passwords and
enters them rapidly.

Cryptanalysis attack:
 Takes a long hash and breaks it down into smaller
segments and tries answering smaller pieces of the
puzzle at one time.