Hacking: Don't Learn To Hack - Hack To Learn
Hacking: Don't Learn To Hack - Hack To Learn
Hacking: Don't Learn To Hack - Hack To Learn
Meaning of "Hacking"
The word "Hacking" is one of the most common words used in the field of Cyber Crimes. In fact it is more or less a generic term used to represent Cyber Crimes. According to the global understanding, "Hacking" refers to "Unauthorized Access to a Computer Network" which may otherwise be called an "Unauthorized Intrusion". A finer distinction is made when such "Intrusion" is with a criminal intention of causing harm. In such cases the "Unauthorized Intrusion" may be called "Cracking". On the other hand, access undertaken to check the security vulnerability of a system though Unauthorized, is also called "Hacking" and is considered a part of the IT security testing. Such a Hacker has no intention of causing harm. Some times such hackers also act under the knowledge and permission (without access privileges being shared) of the Information Asset owners.
Who is a hacker?
There are at least two common interpretations:
Someone who bypasses the systems access controls by taking advantage of security weaknesses left in the system by developers Someone who is both knowledgeable and skilled at computer programming, and who is a member of the hacker subculture, one with its own philosophy and code of ethics
Hackers techniques
System hacking Network hacking Software hacking
What is SSL?
A protocol developed by Netscape. It is a whole new layer of protocol which operates above the Internet TCP protocol and below high-level application protocols. SSL is a communications protocol layer which can be placed between TCP/IP and HTTP It intercepts web traffic and provides security between browser and server Encryption is used to guarantee secure communication in an insecure environment SSL uses public-key cryptography
SSL Working
An SSL certificate allows sensitive information to be encrypted during online transactions Authenticated information about the owner of the certificate is also contained in it. The identity of the owner of the certificate is verified by the certificate Authority at the time of its issue
SSL includes two sub-protocols: the SSL Record Protocol and the SSL Handshake Protocol. Record Protocol -- defines the format used to transmit data. Handshake Protocol -- using the Record protocol to exchange messages b/t an SSL-enable server and an SSL-enable client.
SSL usage
Any online store Anyone who accepts online orders & payments through credit cards A site that offers a login or sign in Anyone processing sensitive data such as the address ,birth date ,license or ID Numbers Anyone who is required to comply with privacy & Security requirements Anyone who values privacy & security requirements Anyone who values privacy & expects others to trust them
The End
Ensure the use of the best security practices and system design techniques to protect all legitimate parties in an electronic commerce transaction Create a protocol that neither depends on transport security mechanisms nor prevents their use Facilitate and encourage interoperability among software and network providers
SET Transactions
SET Transactions
The customer opens an account with a card issuer.
MasterCard, Visa, etc.
A merchant who accepts a certain brand of card must possess two X.509 V3 certificates.
One for signing & one for key exchange
The customer places an order for a product or service with a merchant. The merchant sends a copy of its certificate for verification.