What is Hacking?
Hacking
means breaching in to a computer or in a system or into software in which the
access is private. It means getting in and maintaining access in a cyber place
where you don’t have rights to enter.
Types
of Hackers:
There are three types of hackers and are:
1.
White hat hackers:
They
are ethical hackers and just work as a security expert in any
bank/society/online company etc. They just find vulnerabilities and possible
attack in a system and make that system more secure. They have permission to
make testing of vulnerabilities in the system and they do there self attack and
tell what the vulnerability is. These people never harm any thing.
2.
Black hat hackers:
They
are unethical hacker and they breach into a system for fun or money. There is
no specific reason or issue for which they do hacking.
3.
Red/Grey hat hacker:
They
are those people who do hacking for money. These people will have high
knowledge that they can break through any thing if you pay money.
SCRIPT
KIDDIE: A person who use tools with no
contribution to hacking community, kiddies don’t know how to create their own
tools or use advanced tools and constantly use the same tools to hack a
server or system, often not effectively. To some degree all hackers are
script kiddies, but a good hacker has the ability to make intelligent decisions
such as determining false positives from virus scans.
VULNERABILITY:
A weakness that could lead to
compromised security. It may be discovered accidentally. Somebody may write a
script to exploit this vulnerability.
WAR
DRIVERS: People who take some kind of
portable device, for example a USB drive or a laptop and just go to a public
location. Then they pick up a wireless signal and possibly see what software it
is running and may be find exploits for that software, but war drivers are not
limited to this. They often just use this for free internets in the case they
don’t have access to it themselves.
BLACK
BOX ATTACKS: Security testing with no knowledge
of the network infrastructure, for example attacking a company from the
internet.
WHITE
BOX ATTACKS: Security testing with complete
knowledge of the network infrastructure.
KEYLOGGER:
A key logger is a program usually
runs secretly in the background that record what user type, then the typed
output is usually sent via email or uploaded by the key logger.