What is Hacking?
Hacking
means breaching in to a computer or in a system or into software in which the
access is private. It means getting in and maintaining access in a cyber place
where you don’t have rights to enter.
Types
of Hackers:
There are three types of hackers and are:
1.
White hat hackers:
They
are ethical hackers and just work as a security expert in any
bank/society/online company etc. They just find vulnerabilities and possible
attack in a system and make that system more secure. They have permission to
make testing of vulnerabilities in the system and they do there self attack and
tell what the vulnerability is. These people never harm any thing.
2.
Black hat hackers:
They
are unethical hacker and they breach into a system for fun or money. There is
no specific reason or issue for which they do hacking.
3.
Red/Grey hat hacker:
They
are those people who do hacking for money. These people will have high
knowledge that they can break through any thing if you pay money.
SCRIPT
KIDDIE: A person who use tools with no
contribution to hacking community, kiddies don’t know how to create their own
tools or use advanced tools and constantly use the same tools to hack a
server or system, often not effectively. To some degree all hackers are
script kiddies, but a good hacker has the ability to make intelligent decisions
such as determining false positives from virus scans.
VULNERABILITY:
A weakness that could lead to
compromised security. It may be discovered accidentally. Somebody may write a
script to exploit this vulnerability.
WAR
DRIVERS: People who take some kind of
portable device, for example a USB drive or a laptop and just go to a public
location. Then they pick up a wireless signal and possibly see what software it
is running and may be find exploits for that software, but war drivers are not
limited to this. They often just use this for free internets in the case they
don’t have access to it themselves.
BLACK
BOX ATTACKS: Security testing with no knowledge
of the network infrastructure, for example attacking a company from the
internet.
WHITE
BOX ATTACKS: Security testing with complete
knowledge of the network infrastructure.
KEYLOGGER:
A key logger is a program usually
runs secretly in the background that record what user type, then the typed
output is usually sent via email or uploaded by the key logger.
CRYPTER:
A crypter is used to make well known
hackers viruses(such as key loggers and botnets) undectable by antivirus
software by changing the virus program signatures that antivirus programs have
in their databases to make them easier to spread.
BINDER:
A binder is used to bind a virus
(such as keylogger etc) to another program making it undetectable and able to
fool users into thinking its something else.
SQL
INJECTION: A way of manipulating a websites
forms as a way of retrieving its databases. This can be used to find users and
passwords as well as obtaining admin on a website in order to deface it.
COOKIE
STEALING/SPOOFING: Used to fool a victim into clicking
a link that will steal their cookies to websites which you can then use to have
their privileges to various parts of a website or forum.
BRUTEFORCER:
Program used to crack passwords by
trying every password on various forms.
MD5HASH:
How passwords are usually stored,
this is a way of crypting a password so it is not plain text, harder passwords
are very hard to crack but simple ones have often been cracked and can be found
online md5 databases.
SOCIAL
ENGINEERING: Tricking a victim into doing
something you want them to do by disguising or enticing them into doing what
you want.
PISHING:
Creating a fake login page to a well
known website and then fooling a victim into entering their information on the
fake login page through social engineering.
PROXY:
A proxy is a webserver that allows
you to use it as a barrier between you and something else, this allows you to
stay anonymous and hide your IP.
WHALING:
Hacking the hackers is known as
whaling.
***
COPY-WRITE OWNED BY PRAMOD KUMAR
No comments:
Post a Comment