Vous êtes sur la page 1sur 21

http://www.hackingmobilephones.

com

HACKED!!!
Network Security

Hacked!!!

http://www.hackingmobilephones.com

How to become a Computer Security Expert?

Hacking
HackingAttitude
Attitude

Programming
ProgrammingLanguage
Language

Networking
NetworkingGuru
Guru

Basics
BasicsofofUnix
Unix

http://www.hackingmobilephones.com

Hacker VS Cracker

Hacker
Cracker
Lots of Knowledge & Lots of Knowledge &
Experience.
Experience.
Good Guy
Bad Guy
Strong Ethics

Poor Ethics

No Crime

Commits crime

Fights Criminals.

Is the criminal

http://www.hackingmobilephones.com

FACTS and FIGURES

FBI INTELLIGENCE REPORT : HIGH RISK INCIDENTS

1,000,000

840,350

800,000
600,000
400,000
200,000

250,675
52,658 64,981 87,770 101,311

0
2002

2003

2004

2005

2006

2007

http://www.hackingmobilephones.com

TOP 6 CORPORATE ESPIONAGE ATTACKS

TOP 6 Corporate Espionage Attacks:


9

Privacy Attacks

Email Forging Attacks

Sniffer Attacks

Input Validation Attacks

DOS Attacks

Password Attacks

http://www.hackingmobilephones.com

Individual Internet User

Mumbai Lady Case

A lady based in Mumbai, India lived in a 1


room apartment.

Was a techno-freak and loved chatting on


the Internet.

Attacker broke into her computer &


switched her web camera on!

Biggest cyber crime involving privacy


invasion in the world!

http://www.hackingmobilephones.com

Government Sector

NASA

The premier space research agency in the


world.

Had just finished a successful spaceship


launch, when the unexpected happened.

The path of the spaceship was changed


remotely by a 11 year old Russian teenager.

Loss of money. Unnecessary Worry.

http://www.hackingmobilephones.com

TROJANS

TROJANS
Definition:
Trojans act as RATs or Remote Administration Tools that allow remote
control and remote access to the attacker.
Working: See Demo.
Threats:
Corporate Espionage, Password Stealing, IP Violation, Spying etc.
Tools:
9Netbus, Girlfriend, Back Orrifice and many others.

http://www.hackingmobilephones.com

TOP 5 CORPORATE ESPIONAGE ATTACKS

TOP 5 Corporate Espionage Attacks:


9

Privacy Attacks

Email Forging Attacks

Sniffer Attacks

Input Validation Attacks

DOS Attacks

Password Attacks

http://www.hackingmobilephones.com

Consumer Electronic Goods Sector

TV Group

One of the largest manufacturers of


televisions and other electronic goods in the
world.

Attacker sent an abusive forged email to all


investors, employees and partners
worldwide from the Chairmans account.

Tainted relations.

http://www.hackingmobilephones.com

Email Forging

Email Forging
Definition:
Email Forging is the art of sending an email from the victims email account
without knowing the password.
Working:
ATTACKER-----Sends Forged email----- FROM VICTIM
Tools:
9None required! DEMO

http://www.hackingmobilephones.com

Email Forging

COUNTERMEASURES

NOTHING can stop the attacker.

Use Secure email systems like PGP.

Digitally sign your emails.

http://www.hackingmobilephones.com

Is Internet Banking Safer than ATM Machines?

ATM MACHINES VS INTERNET BANKING


ATM Machines

Internet Banking

Easier to crack.

Difficult to crack, if latest SSL used.

Soft Powdery Substance.

Earlier SSL standards quite weak.

Unencrypted PIN Number.


Software/ Hardware Sniffer.
Fake ATM Machine

http://www.hackingmobilephones.com

ATM Hacking

http://www.hackingmobilephones.com

ATM Hacking

http://www.hackingmobilephones.com

ATM Hacking

http://www.hackingmobilephones.com

ATM Hacking

http://www.hackingmobilephones.com

Mobile Phone Hacking

Mobile Phone Attacks

Different Types:
9
9
9
9
9
9
9
9
9
9

BlueJacking
BlueSnarfing
BlueBug Attacks
Failed Authentication Attacks
Malformed OBEX Attack
Malformed SMS Text Message Attack
Malformed MIDI File DOS Attack
Jamming
Viruses and Worms
Secret Codes: *#92702689# or #3370*

http://www.hackingmobilephones.com

6 BEST SECURITY PRACTICES

Install a Firewall
ZoneAlarm (FREE DOWNLOAD from Google Search)

Install an Antivirus
UPDATE IT on a WEEKLY basis.

Install an AntiSpyware (SpySweeper or PrevX $30)


UPDATE IT on a WEEKLY basis.

Patch your OS every 15 DAYS.


Strong Password
Combination of Alphabets, Numbers & Special
characters Try to use both Lowercase and
Uppercase. (A.n.K.i.T007)

http://www.hackingmobilephones.com

6 BEST SECURITY PRACTICES

Install a Key Scrambler


Just do a Google Search.

OPTIONAL SECURITY PRACTICES

Enable Encryption on your Wireless Network.

Anonymous Surfing using www.cooltunnel.com

Use an Intrusion Detection System or Intrusion


Prevent System For Example, SNORT.

http://www.hackingmobilephones.com

HACKED!!!
Network Security

Questions?

Vous aimerez peut-être aussi