Hacking Presentation
Hacking Presentation
Usability Security
Attacks = Motives + Method + Vulnerability
Main motives
◦ Disruption of Business continuity
◦ Information Theft
◦ Manipulating data
◦ Creating fear and chaos of critical infrastructure
◦ Propagating religious and political beliefs
◦ achieving state military objectives
◦ Damaging reputation of target
◦ Taking revenge
Cloud computing threats
Advance persistent Threats (APT)
Virus and worms
Mobile Threats
Botnet
Insider attack
Network Threat
Host Threat
Application Threat
OS attacks
Misconfiguration attacks
Application level attacks
Shrink wrap code
Hacking refers to exploiting the system
vulnerabilities and compromise security controls
and gain unauthorized access to the system
Class of hackers
◦ Black hats
◦ White hats
◦ Gray Hats
◦ Suicide Hackers
◦ Script kiddies
◦ Cyber terrorist
◦ State sponsored hackers
◦ Hacktivist
Reconnaissance
Scanning
Gaining access
Maintaining access
Clearing tracks
Hacking done with prior approval of the
target, and verify the existence of exploit
vulnerability in the system security