Hackers are those people who attack your computer systems for their own gain. Learn about the evolution of hacking and become familiar with some of the early and now infamous hackers in this video.
- [Instructor] Before getting started with cyber security tools, let's have a look at why cyber security has become so important over the last two decades. Robert Morris was one of the earliest hackers to mount a public attack. When in 1988, he released the Christmas Tree Worm onto the internet. Within a day, 2,000 systems were infected. And in total it caused over 6,000 computers to crash. Morris was charged and fined $10,000 rather a lot in those days. This case was somewhat controversial. Because Morris senior, was a cyber security expert from the National Security Agency. The Worm infected DEC and son systems. It contained what was known as a portable c grappling hook, which was used to download the main payload. And also to move across to other operating systems. This is an approach not uncommon even now. A positive outcome from the incident, was that the Defense Advanced Research Projects Agency, funded the first computer emergency response teams CERT CC at Carnegie Mellon University. The Legion of Doom was a hacker group active in the late 1980s and it was considered to be the most capable hacking group in the world. They published The Legion of Doom technical journal, and contributed to the overall pool of hacking knowledge. While it did mount attacks to take over phone and computer systems, it saw itself as inquisitive rather than harmful. A key person in the group, was Vince Gelormine. Known by the name, Lex Luthor. Another well known hacker group sprang up as a result of disagreement within the Legion of Doom. The new group called itself the Masters of Deception. One of the key people in MOD was Mark Abene, who was known in the group as Phiber Optik. Mark had originally joined the Legion of Doom, but was thrown out, after arguments with other hackers in the group. In 1990, the Legion of Doom and the Masters of Deception were reported as having declared war on each other and were mounting attacks over the internet on each others computers. A nationwide investigation by a joint FBI secret service task force, resulted in five of MODs members being indicted. All five pleaded guilty, and were sentenced to either probation or prison. Interestingly, in a panel debate of the next HOPE conference in 2010, Mark Abene stated that the rumored gang war in cyber space, between LOD and MOD never happened. And that it was a complete fabrication by the US Attorney's Office and some sensational media. Nevertheless, the war between LOD and MOD has become one of the great cyber legends. Another high profile hacker active in the 1990s, was Kevin Mitnick. Otherwise known as Condor, who used social engineering and dumpster diving techniques to get information. This allowed him to hack into systems. Over the years, he was in and out of jail as a result of hacking. In his early years, he broke into DEC's computer network and copied their software. For which he was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, he hacked into Pacific Bell voicemail computers. He was again detected. But this time he took flight, becoming a fugitive for 2 1/2 years. His exploits have been documented in a book called Take Down by John Markoff, and Tsutomu Shimomura. And by Mitnick himself in his books, The Art of Deception and Ghosts in the Wires. After his release, he eventually became an author on cyber security, acted as a CIA agent in ABC's TV spy thriller, Alias, and is now a security consultant. During the 1980s and '90s, hackers were more a novelty than a significant problem. However, by the late 1990s, the number of servers on the internet began to skyrocket, as individuals and businesses started to take advantage of the benefits of an online society. As soon as money could be exchanged online, and banking systems became internet accessible, organized crime began to take an interest. Over the next decade, online crime became a significanter problem for society and as lucrative an activity for organized crime as illegal drugs. Criminals were not the only groups starting to take notice of an increased online society. So did Nation State Agencies, with an interest both in monitoring their own people, and espionage against foreign targets.
- Hackers and the kill chain
- Viruses, spyware, and adware
- Detecting malware with Windows Defender
- Using Windows Firewall and Linux iptables
- Scanning with Nmap
- Monitoring network communications with Netcat
- Combating application-level threats
- Scanning a website to check for vulnerabilities
- Capturing intruders through packet inspection