Sahil Tarfe (Editor)

Hacking

Updated on
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit
Covid-19
Hacking

http://technewstoday.net/wp-content/uploads/2013/02/hacker-attack.jpg

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge or enjoyment.The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks,they are rarely used in mainstream context. They are subject to the longstanding hacker definition controversy about the terms true meaning. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone who breaks into computers, whether computer criminal (black hats) or computer security expert (white hats),is more appropriately called a cracker instead.Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.

Top 10 Hackers In The World


Attacks
A typical approach in an attack on Internet-connected system is:

1. Network enumeration: Discovering information about the intended target.
2. Vulnerability analysis: Identifying potential ways of attack.
3. Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.
Security exploits

A security exploit is a prepared application that takes advantage of a known weakness.Common examples of security exploits are SQL injection, Cross Site Scripting and Cross Site Request Forgery which abuse security holes that may result from substandard programming practice. Other exploits would be able to be used through FTP, HTTP, PHP, SSH, Telnet and some web-pages. These are very common in website/domain hacking

http://mikegagnon.com/wp-content/uploads/2013/03/hacking_slide_5.png

Techniques
1.Vulnerability scanner
A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Firewalls defend computers from intruders by limiting access to ports and machines, but they can still be circumvented.)

2. Brute force Attack
Password guessing, this method is very fast when used to check all short passwords, but for longer passwords other methods such as the dictionary attack are used because of the time a brute-force search takes.

3. Password cracking
Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.


4. Packet sniffer
A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

5. Spoofing attack (Phishing)
A spoofing attack involves one program, system or website that successfully masquerades as another by falsifying data and is thereby treated as a trusted system by a user or another program—usually to fool programs, systems or users into revealing confidential information, such as user names and passwords.

6. Root kit
A root kit is a program that uses low-level, hard-to-detect methods to subvert control of an operating system from its legitimate operators. Rootkits usually obscure their installation and attempt to prevent their removal through a subversion of standard system security. They may include replacements for system binaries, making it virtually impossible for them to be detected by checking process tables.


Similar Topics
Hacking Democracy
Hacking Hall
The Dragon Murder Case (film)
Topics
 
B
i
Link
H2
L