Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Hacking

No description
by

robin boucher

on 16 November 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Hacking

Introduction

Famous hackers

Hacking events

Challenges and skills

Demonstration

Conclusion

Bibliography

Summary

A hacker detects technologies' vulnerabilities (computers, smartphones,«connected devices»…)

Introduction
Hacking

- Black Hat : Attack to destroy or misappropriate devices for his own interest. "Pirates"

- White Hat : Participate to protect company or himself against attacks from black hat. "Ethical hacker"

2 types hackers
Famous Hacker
Kevin Mitnick
Gary McKinnon
Anonymous
Challenges and skills
Categories of challenges depends of websites
"Newbie-contest"
"Root-me"
"Hack-this"
Network (Protocols, Ports...)
Coding (depends language)
Cryptography (Decypher or cypher data)
Steganography (audio,picture,text...)
Challenges and skills
Hacker can use many tools :
and even operating system:
Cain&Abel
Burpsuite
Havij
Demonstration
Hacking events
Bibliography
Training and tutorials websites:
https://www.newbiecontest.org/

http://www.root-me.org/

https://www.hackthis.co.uk/

http://hackademics.fr/forum.php

https://www.wechall.net/challs

Some books / magazines:
QUESTION ?
Steganography example
Demonstration
Steganography solution
" Le pass est
image-ctrl+a"
Demonstration
Bypass Windows Session (Easy way):
Challenges and skills
Hacker can use social engineering
Aim : To collect useful information
Conclusion
2 facts considered : Human and machine
Hacking = Necessary mean for company's survival.

8/10 companies which sudden cyber-attacks collapse
Robin Boucher d’Argis de Guillerville
Full transcript