Telechargé par rmc18887

Hacking (IT): History, Types, and Security

publicité
WELCOME
INTRODUCTION
INTRODUCTION
The story of hacking
INTRODUCTION
The story of hacking
The termes refer to hacking
INTRODUCTION
The story of hacking
The termes refer to hacking
What haching consist in ?
INTRODUCTION
The story of hacking
The termes refer to hacking
What haching consist in ?
Advantages of hacking
INTRODUCTION
The story of hacking
The termes refer to hacking
What haching consist in ?
Advantages of hacking
Drawbacks of hacking
INTRODUCTION
The story of hacking
The termes refer to hacking
What haching consist in ?
Advantages of hacking
Drawbacks of hacking
CONCLUSION
INTRODUCTION
Hacking originally refers to tinkering and experimentation, motivated in
particular by passion, play, plea sure, exchange, need, and sharing. This
practice, established by hackers, appeared with the first home computers and
inherited traditions from electronics and amateur radio. More generally, hacking
is a set of techniques allowing the exploitation of possibilities, flaws, and
vulnerabilities in an element or a group of hardware or human elements. It also
includes repairing, maintaining, or improving old hardware or software whose
documentation is no longer available, through reverse engineering.
The story of hacking 1/4
Computer hacking began in the 1960s, when researchers and enthusiasts
explored computer systems out of simple curiosity. Over the decades, it evolved
from mere experiments to sophisticated cyberattacks carried out by criminal
groups, governments, and also by ethical cybersecurity experts working to
protect systems.
The story of hacking 2/4

In 1969, John Draper managed, using a whistle that had the same tone as the
American telephone net work, to make long distance calls for free by
whistling into the receiver. This technique was called phreaking by its creator
and inspired a new wave of computer hackers who sought to modify and
develop early computers.

It was not until 1980 that the media began publishing articles about hacking.
They reported on Kevin Poulsen, who managed to infiltrate a network
reserved for the military, universities, and companies. In 1983, the film
Wargames was released, centered on a hacker who accesses the U.S. military
computer system. The first computer virus also appeared during these years.
The story of hacking 3/4

Many crackers began their activity by trying to break copy protection
restrictions or bypass rules of video games. But when the media revealed in
the early 1990s that Chaos Computer Club France was a fake hacker group
collaborating with the police, the French hacker community shifted toward
free software and many independent communities emerged.

The birth of the Internet in the 1990s was accompanied by the first cases of
cybercrime. Practitioners w ere initially divided: black hats carried out
criminal activities, while white hats sought vulnerabilities in order to disclose
and fix theme.
The story of hacking 4/4

In the 2000s, hackers again aimed to push technology further and “break the locks
imposed by manufacturers.” For example, Jon Johansen managed to bypass DVD
protections and copy their contents. Another trend that appeared in the 2000s was
the use of hacking for activism, such as groups like Anony mous, RTMark, or the
Chaos Computer Club.

In 2017, hackers continued to make resources available, often in the form of wikis or
repositories. Attacks in the era of Kevin Mitnick, Kevin Poulsen, or Jon Johansen
were few compared with those launched in the 2000s. By 2017 the threat was less
virulent but far more massive, especially due to the increasing number of “script
kiddies,” or novice hackers.
The terms refer to hacking 1/2

Hacker - pirate informatique :
The person who practise hacking .

Cybersecurity – Cybersécurité:
Measures and practices used to protect computers, networks, and data from
attacks or unauthorized access.

Cyberattack – Cyberattaque:
An attempt by hackers to damage, disrupt, or gain unauthorized access to a
computer system or network.
The terms refer to hacking 2/2

Vulnerability – Vulnérabilité:
A weakness in a system or software that can be exploited by hackers to gain
unauthorized access.

Malware – Logiciel malveillant :
Software designed to harm or exploit computers, networks, or users. Examples
include viruses, worms, and ransomware.

Data Privacy – Protection des données :
Ensuring that personal or sensitive information is collected, stored, and used
safely, without unauthorized access.
What hacking consist in? 1/2

General definition:
Hacking is the act of exploring, manipulating, or exploiting computer
systems and networks to access information or disrupt their operation.

Purpose of hacking:

Access personal or sensitive data

Test the security of a system (ethical hacking)

Cause disruptions or attack targets (malicious hacking)

Defend or promote a cause (hacktivism)

Worldwide, encrypting their files and demanding a ransom to recover them.
What hacking consist in? 2/2

Common methods:

Phishing → sending fake emails to steal passwords

Malware / Viruses → infecting a computer to control it or steal data

Brute force → trying all possible combinations to find a password

Exploiting vulnerabilities → taking advantage of software or network flaws

Social engineering → manipulating a person to obtain confidential
information
Advantages of hacking 1/2

Security improvement (Renforcement de la sécurité) :
Ethical hackers help companies identify vulnerabilities before attackers can
exploit them.

Early threat detection(Détection précoce des menaces) :
Hacking allows discovering flaws that might have gone unnoticed and fixing
them quickly.
Advantages of hacking 2/2

Innovation and system improvement (Innovation et amélioration des
systèmes) :
Hacking tests encourage developers to improve software security and
functionality.

Awareness( Sensibilisation ) :
Ethical hacking raises awareness among companies and the public about
cybersecurity risks.
Drawbacks of hacking 1/2

Data theft( Vol de données ) :
Malicious hackers can steal personal, banking, or confidential information.

Financial losses(Pertes financières) :
Cyberattacks can cause significant financial losses for businesses and individuals.

Privacy violations(Atteinte à la vie privée) :
Private information can be exposed or misused.
Drawbacks of hacking 2/2

Service disruption(Perturbation des services) :
Critical systems like hospitals, banks, or power grids can be paralyzed.
Conclusion
In summary, hacking is a double-edged sword. It can be dangerous, but it can
also help improve security. It depends on how it is used.
THANK YOU FOR YOUR LISTENING
Kevin mitnick
Kevin poulsen
John johanser
Add to our exposé
 Types of Hackers
Black Hat Hackers: criminals who exploit vulnerabilities to steal
data, extort money, or disrupt systems.
White Hat Hackers: cybersecurity experts who use the same
techniques but legally, for penetration testing and audits.
Gray Hat Hackers: intermediaries who may reveal flaws without
authorization, sometimes to gain recognition or rewards.
Hacktivists: hackers motivated by political or social causes.
Script Kiddies: amateurs who rely on existing tools without real
technical expertise.
Tools Used by Professionals

Burp Suite, Metasploit, Nmap: standard tools for scanning, exploiting, and
testing vulnerabilities.

Wireshark: network traffic analysis to detect sensitive data or anomalies.

Kali Linux: a specialized distribution that includes hundreds of hacking and
penetration testing tools.

Automation frameworks: custom scripts to automate repetitive or largescale attacks.
Téléchargement