Penggodam (keselamatan komputer)

From Wikipedia

Penggodam (hacker) dalam konteks keselamatan komputer merujuk kepada penggodam komputer yang terlibat dalam keselamatan komputer dan berupaya mengeksploit sistem atau masuk tanpa kebenaran melalui kemahiran, taktik dan pengetahuan terperinci.

Dalam penggunaan biasa, "penggodam" merujuk kepada penggodam topi hitam (penggodam berniat jahat atau jenayah). Terdapat juga penggodam beretika (biasanya digelar topi putih) dan penggodam yang samar-samar kedudukannya (topi kelabu).

Jadual isi kandungan

[Sunting] Istilah

Istilah-istilah yang berkaitan:

  • Penggodam (hacker) boleh membawa maksud seseorang yang mahir dalam bidang komputer; namun media massa selalu menyamakan "penggodam" dengan "penggodam topi hitam".
  • Topi hitam (black hat): seseorang yang mensubversi keselamatan komputer tanpa izin atau menggunakan teknologi (biasanya sebuah komputer ataupun internet) untuk tujuan keganasan, vandalisme, penipuan kad kredit, pencurian identiti, pencurian hak milik intelektual, dan sebagainya. Ini juga bermakna mengambil alih kawalan komputer lain melalui sebuah rangkaian, atau perekahan perisian (software cracking).
  • Topi kelabu (grey hat): Penggodam yang etikanya tidak jelas atau di batasan undang-undang, seringkali mengaku terang-terang.
  • Topi putih (white hat): Penggodam beretika yang memecah keselamatan tetapi untuk tujuan altruistik ataupun sekurang-kurangnya tidak berniat jahat. Topi putih biasanya mempunyai etika yang jelas, dan selalu berusaha untuk bekerja dengan pengilang atau pemilik untuk memperbaiki kelemahan yang dijumpai, walaupun banyak yang mengancam sama ada tersirat atau jelas untuk memaklumkan kepada awam selepas tempoh "sesuai" untuk memastikan respons yang kena pada waktunya. Istilah ini juga digunakan untuk penggodam yang mereka dan mengekod sistem yang lebih selamat.
  • Perekah/Penggertak (cracker):
    1. Topi hitam. Sering digunakan untuk membezakan penggodam topi hitam dengan penggodam lain.
    2. Penggodam komputer yang menggunakan perekahan kata laluan atau serangan kuasa keras. Berkait denga istilah pemecah peti besi.
    3. Perekah perisian. Orang yang mengkhusus dalam mengatasi mekanisma perlindungan penyalinan perisian. Tidak mengeksploit rangkaian, cuma perisian.
  • Budak skrip (script kiddie): Penceroboh komputer yang tidak begitu mahir; seseorang yang sekadar mengikut arahan ataupun menggunakan teknik buku resepi tanpa memahami langkah yang dibuatnya. Pejoratif.
  • Hacktivis merupakan penggodam aktivis yang menggunakan teknologi untuk mengumumkan pesanan politik. Perlu dicatat bahawa vandalisme web bukan semestinya hacktivisme.

[Sunting] Alatan menggodam

Terdapat beberapa alatan biasa digunakan oleh penggodam komputer:



  • Trojan horse — Aplikasi ini direkabentuk supaya ia kelihatan seperti melaksanakan sesuatu atau sebagai suatu aplikasi, contohnya satu aplikasi tulen, tetapi sebenarnya ia melakukan sesuatu yang lain dari itu. Ia tidak semestinya aplikasi yang palsu. Torjan Horse boleh digunakan untuk mengadakan back door pada sistem komputer supaya penceroboh boleh kembali untuk mendapatkan laluan masuk. Virus yang pemperbodohkan pengguna supaya memuat-turun dan/atau menjalankannya dengan berpura-pura menjadi aplikasi yang berguna juga kadangkala dikenali sebagai trojan horses. Sila lihat: Dialer.
  • Virus — A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents (for a complete definition: see this article about computer viruses). Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.
  • Worm — Like a virus, a worm is also a self-replicating program. The difference between a virus and a worm is that a worm does not create multiple copies of itself on one system and that it propogates itself through computer networks. After the comparison between computer viruses and biological viruses, the obvious comparison here is to a bacterium. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program. It is possible for a program to have the blunt characteristics of both a worm and a virus.
  • Vulnerability scanner — A tool used to quickly check computers on a network for known weaknesses. Hackers also use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound.)
  • Sniffer — Aplikasi yang menyaring kata lalauan dan data lain semasa ia dalam pemindahan samada dalam komputer ataupun diatas rangkaian.
  • Exploit — Aplikasi yang disediakan untuk mengambil peluang atas kelemahan sistem yang telah diketahui.
  • Social engineering — Menggunakan kepakaran dalam manipulasi untuk mendapatkan sesuatu bentuk maklumat. Sebagai contoh menanyakan kata laluan atau akaun seseorang hanya dengan segelas bir atau dengan menyamar sebagai orang lain.
  • Root kit — Suatu aplikasi yang digunakan untuk menyembunyikan fakta bahawa sistem itu sudah dicerobohi. Root kits boleh merangkumi gantian terhadap fail-fail sistem supaya ia tidak kelihatan dan menyukarkan pengguna mengesan kewujudan penceroboh dengan melihat kepada process table.

[Sunting] Notable intruder and criminal hackers

Note that many of these have since turned to fully legal hacking.

  • Jonathan James (a.k.a. comrade) was most notably recognized for the theft of software which controlled the International Space Station's life sustaining elements, as well as intercepting dozens of electronic messages relating to U.S. nuclear activies from the Department of Defense
  • Eric Corley (a.k.a Emmanuel Goldstein) — Long standing publisher of 2600: The Hacker Quarterly and founder of the H.O.P.E. conferences. He has been part of the hacker community since the late '70s.
  • Mark Abene (a.k.a. Phiber Optik) — Inspired thousands of teenagers around the country to "study" the internal workings of the United States phone system. One of the founders of the Masters of Deception group.
  • Dark Avenger — Bulgarian virus writer that invented polymorphic code in 1992 as a mean to circumvent the type of pattern recognition used by Anti-virus software, and nowadays also intrusion detection systems.
  • John Draper (a.k.a. "Captain Crunch") — Draper is widely credited with evangelizing the use of the 2600 hertz tone generated by whistles distributed in Captain Crunch cereal boxes in the 1970's, and sometimes inaccurately credited with discovering their use. Draper served time in prison for his work, and is believed to have introduced Steve Wozniak to phone phreaking through the 2600hz tone. Draper now develops anti-spam and security software.
  • Markus Hess — A West German, he hacked into United States Military sites and collected information for the KGB; he was eventually tracked down by Clifford Stoll.
  • Adrian Lamo — Lamo surrendered to federal authorities in 2003 after a brief manhunt, and was charged with nontechnical but surprisingly successful intrusions into computer systems at Microsoft, The New York Times, Lexis-Nexis, MCI WorldCom, SBC, Yahoo!, and others. His methods were controversial, and his full-disclosure-by-media practices led some to assert that he was publicity-motivated.
  • Vladimir Levin — This mathematician allegedly masterminded the Russian hacker gang that tricked Citibank's computers into spitting out $10 million. To this day, the method used is unknown.
  • Kevin Mitnick — Held in jail without bail for a long period of time. Inspired the Free Kevin movement. Once "the most wanted man in cyberspace," Mitnick went on to be a prolific public speaker, author, and media personality. Mitnick Security Consulting, LLC is a full-service information security consulting firm. Founded by Kevin Mitnick, Mitnick Security Consulting offers a comprehensive range of services to help businesses protect their valuable assets.
  • Robert Tappan Morris — In 1988 while a Cornell University graduate student was the writer of the first worm, Morris Worm, which used buffer overflows to propagate.
  • Nahshon Even-Chaim (a.k.a. Phoenix) — Leading member of Australian hacking group The Realm. Targeted US defence and nuclear research computer systems in late 1980s until his capture by Australian Federal Police in 1990. He, and fellow Realm members Richard Jones (a.k.a. Electron) and David Woodcock (a.k.a. Nom) were the world's first computer intruders prosecuted based on evidence gathered from remote computer intercept.
  • Kevin Poulsen — In 1990 Poulsen took over all telephone lines going into Los Angeles area radio station KIIS-FM to win an automobile in a call-in contest. Poulsen went on to a career in journalism, including several years as editorial director at SecurityFocus.
  • David L. Smith — In 1999 Smith launched the Melissa Worm, causing $80 million dollars worth of damage to businesses. Originally sentenced to 40 years, he eventually served only 20 months when he agreed to work undercover for the FBI.
  • Craig Neidorf — In 1990, Neidorf (a co-founder of Phrack) was prosecuted for stealing the E911 document from BellSouth and publicly distributing it online. BellSouth claimed that the document was worth $80,000; they dropped the charges after it was revealed that copies of the document could be freely ordered for $13.

[Sunting] Hacker conferences

Hacker cons have drawn more and more people every year including SummerCon (Summer), DEF CON, HoHoCon (Christmas), PumpCon (Halloween), H.O.P.E. (Hackers on Planet Earth) and HEU (Hacking at the End of the Universe).

[Sunting] See also

  • Hacker definition controversy
  • Hacker
  • Computer crime
  • White hat
  • Grey hat
  • Security cracking
  • Biohacker

[Sunting] Fictional Movies about Hackers

  • Hackers
  • WarGames
  • Sneakers
  • Swordfish

[Sunting] Related books

  • Templat:Book reference
  • Templat:Book reference
  • Templat:Book reference
  • Templat:Book reference
  • Templat:Book reference

Network Security:

  • Templat:Book reference

Magazines:

  • "2600: The Hacker Quarterly"
  • "Hakin9"
  • "Binary Revolution Magazine"
Bahasa lain