Final presentation on Hacking Strategies
Download
Report
Transcript Final presentation on Hacking Strategies
By Carlos G. Coca
Originally a person who was skilled at
programming language who was able to
create/alter web content.
Now: “A person who illegally gains access to
and sometimes tampers with information in a
computer system.”
Merriam-Webster definition
White Hat
Help prevent weak
systems from being
hacked.
Make web safer for
individuals.
Black Hat
Cause problems for
individuals,
companies and
government.
Steal identities,
money and add
viruses.
SQL injections
Worms
Encryption
SQL = Structured Query Language
Used to interact with databases.
Step 1: Hackers find holes in coding design.
Step 2: Add their own SQL into a database.
Step 3: Obtain information.
Whitelisting
Enables a program to
check through a list of
allowed characters.
Harder to give the
database orders since
they’re not allowed in
the application.
Blacklisting
Tells program to
immediately deny:
Certain characters.
Combinations of
characters.
Infect systems and search for other systems to
infect without user interaction.
Starts slow then “snowballs” and becomes
more and more devastating.
Conflicker worm.
Encryption is used to hide passwords.
Hackers attack in three ways.
Brute force attack:
Program goes through every possible combination.
Dictionary attack:
Uses a downloaded list of common passwords and
enters them rapidly.
Cryptanalysis attack:
Takes a long hash and breaks it down into smaller
segments and tries answering smaller pieces of the
puzzle at one time.