What is hacking, types of hacking, types of hackers
Size: 3.02 MB
Language: en
Added: Jan 13, 2022
Slides: 28 pages
Slide Content
HACKING
Content Hacking History of Hacking Types of Hacking Hackers Types of Hackers Famous Hacker Service of Ethical Hacking Disadvantages of Hacking Need of Hacking Cyber law for Hacking Scope of Ethical Hacking
What is Hacking? Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose. To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers .
History of hacking When hacking first started it was not thought of as that serious. The hackers were not even known as hackers but as practical jokers. The very first hack came in 1878 when the phone company, Bell Telephone, was started. A group of teenage boys, hired to run the switchboards, would disconnect or misdirect calls. The first authentic computer hackers came in the 1960s. During those times, computers were mainframes, locked away in temperature controlled, glassed in areas. It cost a lot of money to run these machines, so programmers had limited access to them.
History of hacking The smarter students, usually MIT students, had an insatiable curiosity about how things worked. So, the smartest ones created what they called "hacks", programming shortcuts, to complete computing tasks more quickly. In some cases the shortcuts were better than the original program. One of the hacks that was created in the 60s, 1969 to be exact, was created to act as an open set of rules to run machines on the computer frontier. It was created by two employees from the Bell Lab's think tank. The two employees were Dennis Ritchie and Ken Thompson and the "hack" was called UNIX.
Types of hacking Ethical Hacking Back Door Hacking Website Hacking Network Hacking Password Hacking
Ethical Hacking Ethical hacking, also known as penetration testing or pen testing, is legally breaking into computers and devices to test an organization's defenses. It's among the most exciting IT jobs any person can be involved in. You are literally getting paid to keep up with the latest technology and get to break into computers without the threat of being arrested. Companies engage ethical hackers to identify vulnerabilities in their systems. From the penetration tester's point of view, there is no downside: If you hack in past the current defenses, you’ve given the client a chance to close the hole before an attacker discovers it. If you don’t find anything, your client is even happier because they now get to declare their systems “secure enough that even paid hackers couldn’t break into it.”
Backdoor hacking In the world of cybersecurity, a backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application. Once they're in, cybercriminals can use a backdoor to steal personal and financial data , install additional malware, and hijack devices . A well-known backdoor example is called FinSpy . When installed on a system, it enables the attacker to download and execute files remotely on the system the moment it connects to the internet, irrespective of the system's physical location. It compromises overall system security.
Website hacking Hacking a website is nothing but getting the password to add, edit, delete data stored in that website. After the attack done by a hacker, if he has changed the password of that website software, then it will be tough for the Webmaster to get it back. Hacker will insert harmful programs by inserting malicious codes into the website. It will also cause to the website server to be slow . In the past years, even Amazon and Yahoo had been attacked by the hacker experts, but it would not affect much to them. In the last year we had seen that, the world wide hackers are tried their level best to make fear on the famous companies like PayPal and Facebook.
Network hacking Networking Hacking is an offensive branch of computer security related to networks hacking and the penetration of a target via the networking services or equipment. Network H acking is generally means gathering information about domain by using tools like Telnet , Nslookup , Ping, Tracert , Netstat , etc. It also includes OS Fingerprinting, Port Scanning and Port Surfing using various tools.
Password hacking Password hacking, sometimes referred to as password cracking, is a method of recovering passwords from data transmitted by or stored on a computer . A password can be a secret word, phrase or string of characters used to gain access to secured data. An individual with no knowledge of a password may still determine it through password hacking . Conversely, a dictionary attack allows hackers to employ a program which cycles through common words. A brute force attack goes letter by letter, whereas a dictionary attack only tries possibilities most likely to succeed. ... For example , users tend to pick short passwords and base their passwords off common words.
hacker A computer hacker is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term "hacker" has become associated in popular culture with a "security hacker" – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be unavailable to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors.
Types of hackers Black Hat Hackers White Hat Hackers Grey Hat Hackers
Black hat hacker The term “black hat” originated from Western movies, where the bad guys wore black hats and the good guys wore white hats . A black-hat hacker is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. The black-hat hacker does not have any permission or authority to compromise their targets. They try to inflict damage by compromising security systems, altering functions of websites and networks, or shutting down systems. They often do so to steal or gain access to passwords, financial information, and other personal data.
White hat hacker White-hat hackers, on the other hand, are deemed to be the good guys, working with organizations to strengthen the security of a system. A white hat has permission to engage the targets and to compromise them within the prescribed rules of engagement. White-hat hackers are often referred to as ethical hackers. This individual specializes in ethical hacking tools, techniques, and methodologies to secure an organization’s information systems. Unlike black-hat hackers, ethical hackers exploit security networks and look for backdoors when they are legally permitted to do so. White-hat hackers always disclose every vulnerability they find in the company’s security system so that it can be fixed before they are being exploited by malicious actors.Some Fortune 50 companies like Facebook, Microsoft, and Google also use white-hat hackers.
Grey hat hacker Grey hats exploit networks and computer systems in the way that black hats do, but do so without any malicious intent, disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies. Usually, grey-hat hackers surf the net and hack into computer systems to notify the administrator or the owner that their system/network contains one or more vulnerabilities that must be fixed immediately. Grey hats may also extort the hacked, offering to correct the defect for a nominal fee.
World best hacker Kevin Mitnick is the world's authority on hacking, social engineering, and security awareness training. In fact, the world's most used computer-based end-user security awareness training suite bears his name. Kevin's keynote presentations are one part magic show, one part education, and all parts entertaining. Hacked into 40 major corporations, landing him on the FBI’s Most Wanted list CEO and chief "white hat" hacker at one of the most advanced boutique security firms in the world His Global Ghost Team has a 100 percent success rate hacking into security systems.
Service of ethical hacking Wireless Security Application Security Network Security
Wireless security These services provide and assess the level of security in the existing infrastructure and network to provide instructions promising system accessibility and uphold its integrity at the same time. Wireless security works in three steps, which are: Identify vulnerabilities Adopt security measures Deploy the threats
Application security Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps . Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed . This is used for digging deep into and processing the cruciality and range of challenges faces by the thick client (Java) and the thin client (web browsers). Application security comprises of services like client-side testing and web application testing.
Network security Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. It lends information on the networks, services, system devices, and their agreements. It also examines and surveys the applications of the voice over Internet convention within the organization environment. Network security’s main objective is to facilitate the presentation of the political repercussions on its own development.
Why do we need ethical hacking? Ethical Hacking comes handy in corporate sectors and organizations, to fight against unlawful practices of breaching systems and to take precautionary actions on hackers. Dangerous software like Trojan horses, viruses and spam email causes disruption and disturbance in the system and storage space. Ethical hacking provides useful here as it helps to uncover these virus attacks against systems and in addition, lends high-level security . The main objective of ethical hacking is to promise safety in wireless infrastructure which constitutes most of the current business companies’ aims.
Disadvantages of hacking Massive security breach. Unauthorized system access on private information. Privacy violation. Hampering system operation. Denial of service attacks. Malicious attack on the system.
need of ethical hacking? Ethical hacking follows the guidelines of safe hacking for the efficient working of the system. This is a complex procedure hence an ethical hacker requires great skills in comparison to penetration testing . Ethical hacking has the privilege of gathering access to a company’s network and information system. This automatically provides security to intellectual attacks and threats like viruses. Ethical hacking, as a result, ends up also testing the security levels of the programs and software.
Cyber law in india for hacking Chapter XI Section 66 of IT Act, 2000 particularly deals with the act of hacking. Section 66(1) defines a hack as, any person, dishonestly or fraudulently, does any act referred to in Section 43 is called hacking, and Section 66(2) prescribes the punishment for it. Hacking is a punishable offense in India with imprisonment up to 3 years, or with fine up to two lakh rupees, or with both. Chapter IX Section 43 of IT act, 2000 prescribes a penalty for the damage to computer or computer system. It is a common thing which happens whenever a computer system is hacked. Black hats damage the system that they hack and steal the information. This enumerative provision includes a lot of activities .
Cyber law in india for hacking Chapter XI Section 65 of the said act makes tampering with computer source documents an offense. Section 72 of the same chapter makes the breach of confidentiality and privacy, a punishable offense. This is the most common aftermath of hacking. The Information and Technology Act , 2000 (IT Act ) covers all types of cyber crime committed in the country including hacking . Hacking earlier used to refer to a crime under section 43 of the IT Act but at the same time, ethical hacking or better known as white collar hacking was considered legal.
Scope for ethical hacking Ethical hacking is generally used as penetration testing to detect vulnerabilities, risk and identify the loopholes in a security system and to take corrective measures against those attacks. Ethical hacking is a key component of risk evaluation, auditing, and counter-frauds. The scope for the Ethical Hackers is high and it is one of the rapidly growing careers at present as many malicious attackers cause a threat to the business and its networks. Industries like Information Technology and Banking Sectors hire several Ethical hackers to protect their data and infrastructure. Also, in the upcoming days, the demand for this profile is going to be high compared to other profiles due to an increased threat of vulnerabilities.