HACKING INTRODUCTION




             HELLO....... EVERYONE WELCOME TO YOUR  HACK TECH BLOG                 


HERE WE WILL LEARN ABOUT HACKING AND ALSO I WILL PROVIDE YOU A FREE HACKING COURCE 😊

 

What is Hacking?

Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. An example of computer hacking can be: using a password cracking algorithm to gain access to a computer system.

Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. System hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.

In this hacking tutorial, we will learn-

Before we learn hacking, let’s look at the introduction of hacking and some of the most commonly used terminologies in the world of hacking.

Who is a Hacker?

Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.

Types of Hackers

Hackers can be classified into three different categories:

  1. Black Hat Hacker
  2. White Hat Hacker
  3. Grey Hat Hacker
Types of Hackers

Black Hat Hacker

Black-hat Hackers are also known as an Unethical Hacker or a Security Cracker. These people hack the system illegally to steal money or to achieve their own illegal goals. They find banks or other companies with weak security and steal money or credit card information. They can also modify or destroy the data as well. Black hat hacking is illegal.


Types of Hackers

White Hat Hacker

White hat Hackers are also known as Ethical Hackers or a Penetration Tester. White hat hackers are the good guys of the hacker world.

These people use the same technique used by the black hat hackers. They also hack the system, but they can only hack the system that they have permission to hack in order to test the security of the system. They focus on security and protecting IT system. White hat hacking is legal.


Types of Hackers

Gray Hat Hacker

Gray hat Hackers are Hybrid between Black hat Hackers and White hat hackers. They can hack any system even if they don't have permission to test the security of the system but they will never steal money or damage the system.

In most cases, they tell the administrator of that system. But they are also illegal because they test the security of the system that they do not have permission to test. Grey hat hacking is sometimes acted legally and sometimes not.

Introduction of Cybercrime

Cybercrime is the activity of using computers and networks to perform illegal activities like spreading computer viruses, online bullying, performing unauthorized electronic fund transfers, etc. Most cybercrime hacks are committed through the internet, and some cybercrimes are performed using Mobile phones via SMS and online chatting applications.

Type of Cybercrime

  • The following list presents the common types of cybercrimes:
  • Computer Fraud: Intentional deception for personal gain via the use of computer systems.
  • Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, hacking a websites, etc.
  • Identity Theft: Stealing personal information from somebody and impersonating that person.
  • Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc.
  • Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.
  • Electronic money laundering: This involves the use of the computer to launder money.
  • ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.
  • Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
  • Spam: Sending unauthorized emails. These emails usually contain advertisements.

     

What is Ethical Hacking?

Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules.

  • Get written permission from the owner of the computer system and/or computer network before hacking.
  • Protect the privacy of the organization been hacked.
  • Transparently report all the identified weaknesses in the computer system to the organization.
  • Inform hardware and software vendors of the identified weaknesses.

Why Ethical Hacking?

  • Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money.
  • Fake hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.

Legality of Ethical Hacking

Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time.

Summary

  • Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.
  • Cybercrime is committing a crime with the aid of computers and information technology infrastructure.
  • Ethical Hacking is about improving the security of computer systems and/or computer networks.
  • Ethical Hacking is legal.

HOW HACKERS VIOLATE YOUR PRIVACY :-




Protect Your Privacy: Stop Hackers Before They Stop You

They're out there: the hackers and the bots they control. Their motivations may be varied, but their results are the same: costing you time, money and privacy. It's important to know what it is they do and how to stop them. We have all the details here.

Dangers of Hacking

  • Common targets for hacks
    • IT security firms - for the challenge
    • High-profile targets - for notoriety
    • Websites, often eCommerce sites - for the money
    • Vulnerable individuals - because it's easy
  • Hackers have a wide variety of motives, including:
    • For fun
    • Stealing services or files
    • Publicity stunt
    • Practicing and experimenting with hacking skills
    • Curiosity
    • Prestige among hacking community
    • Spying on people or businesses
    • Money from selling information or identity theft
    • Political expression
  • How hackers hack
    • Most website aren't hacked by a particular human being
      • Nearly 10% of all web traffic consists of automated bots that trawl websites for information
      • Hackers release the bots to search websites for vulnerabilities and then exploit them
    • Virus
      • A self-replicating computer program
      • Viruses have a long history
        • First proposed by mathematician John von Neumann in 1949
        • An early virus was Creeper in 1971, which displayed the message, 'I'M THE CREEPER : CATCH ME IF YOU CAN'
          • The anti-virus program Reaper was created to destroy it
      • Viruses are the most common hacking danger
      • Don't need to do anything malicious, but often:
        • Destroy or steal data
        • Hijack computing resources
    • Distributed Denial of Service (DDoS)
      • Exploits open ports and connections to a network
      • Overwhelms network with requests and causes it to crash
    • Worm
      • A subclass of virus that doesn't need to be attached to host file
        • They can spread without the need of humans to run them
      • Even when benign, worms can cause great damage
        • In 1988, the Morris worm was released
          • Created by a computer science student to gauge the size of the internet, it got out of hand
          • Effectively shut down the internet for several days
      • Some worms don't mean to do damage, but do mean to steal resources
        • In 2004, Mydoom was sent out by email spammers
          • It used host computers to send out spam
          • Within a week, it had infected a million computers
          • The author was never found
      • Worms usually cause DDoS attacks, even if that isn't the intent
      • May filter information back to hackers
    • Trojan Horse
      • A seemingly innocuous program that contains malicious code
        • Harm the computer it is installed on
        • Steal information and transmit it remotely
        • Use the local computer to attack others
  • How hackers target their victims
    • Researching
      • Google searches
      • Public records
      • Partners and associates
      • Develop picture of the targets and their weaknesses
    • Business Attacks
      • Exploiting defective scripts
      • Software with weak security
    • Individual Attacks
      • Seemingly valid sources requesting private information
        • Could be a phone call or text that looks like it's from a bank or store asking for personal info
      • Acquiring personal information through various kinds of phishing
        • Traditional Phishing
          • Seemingly valid requests from companies to verify personal information
          • Gain passwords, SSNs, bank information, and more that can allow identity theft.

Comments

Popular posts from this blog

HOW TO HIDE YOUR IDENTITY ON INTERNET