Hacking
is the practice of modifying the features of a system, in order to accomplish a
goal outside of the creator's original purpose. The person who is consistently
engaging in hacking activities, and has accepted hacking as a lifestyle and
philosophy of their choice, is called a hacker.
Computer
hacking is the most popular form of hacking nowadays, especially in the
field of computer security, but hacking exists in many other forms, such as
phone hacking, brain hacking, etc. and it's not limited to either of them.
Due
to the mass attention given to blackhat hackers from the media, the
whole hacking term is often mistaken for any security related cyber crime. This
damages the reputation of all hackers, and is very cruel and unfair to the law
abiding ones of them, from who the term itself originated. The goal of this
website is to introduce people the true philosophy and ethics of hackers,
hopefully clearing their name and giving them the social status they deserve.
:another
view:
What
is Hacking ?
Computer
hacking is the practice of modifying computer hardware and software to
accomplish a goal outside of the creator’s original purpose. People who engage
in computer hacking activities are often called hackers. Since the word “hack”
has long been used to describe someone who is incompetent at his/her
profession, some hackers claim this term is offensive and fails to give
appropriate recognition to their skills.
Computer hacking is most common among teenagers and young adults, although
there are many older hackers as well. Many hackers are true technology buffs
who enjoy learning more about how computers work and consider computer hacking
an “art” form. They often enjoy programming and have expert-level skills in one
particular program. For these individuals, computer hacking is a real life
application of their problem-solving skills. It’s a chance to demonstrate their
abilities, not an opportunity to harm others.
Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other
Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other
Common
Methods for Hacking Computer Terminals(Servers):
This comprises of either taking control over terminal(or Server) or render it useless or to crash it.. following methods are used from a long time and are still used..
1. Denial of Service -
DoS
attacks give hackers a way to bring down a network without gaining internal
access. DoS attacks work by flooding the access routers with bogus
traffic(which can be e-mail or Transmission Control Protocol, TCP, packets).
2.
Distributed DoSs -
Distributed DoSs
(DDoSs) are coordinated DoS attacks from multiple sources. A DDoS is more
difficult to block because it uses multiple, changing, source IP addresses.
3. Sniffing -
3. Sniffing -
Sniffing
refers to the act of intercepting TCP packets. This interception can happen
through simple eavesdropping or something more sinister.
4. Spoofing -
4. Spoofing -
Spoofing
is the act of sending an illegitimate packet with an expected acknowledgment
(ACK), which a hacker can guess, predict, or obtain by snooping
5. SQL injection -
5. SQL injection -
SQL
injection is a code injection technique that exploits a security vulnerability
occurring in the database layer of an application. It uses normal SQL
commands to get into database with elivated privellages..
6. Viruses and Worms -
6. Viruses and Worms -
Viruses and worms are self-replicating programs or code fragments that attach
themselves to other programs (viruses) or machines (worms). Both viruses and
worms attempt to shut down networks by flooding them with massive amounts of
bogus traffic, usually through e-mail.
7. Back Doors -
7. Back Doors -
Hackers can gain access to a network by exploiting back doors administrative
shortcuts, configuration errors, easily deciphered passwords, and unsecured
dial-ups. With the aid of computerized searchers (bots), hackers can
probably find any weakness in the network.
So, not interested in these stuffs.. huh??? wait there is more for you.. So, how about the one related to hacking the passwords of email and doing some more exciting stuffs.. The various methods employed for this are:
8. Trojan Horses -
So, not interested in these stuffs.. huh??? wait there is more for you.. So, how about the one related to hacking the passwords of email and doing some more exciting stuffs.. The various methods employed for this are:
8. Trojan Horses -
Trojan horses, which are attached to other programs, are the leading cause of
all break-ins. When a user downloads and activates a Trojan horse, the software
can take the full control over the system and you can remotely control the
whole system.. great..!!! They are also reffered as RATs(Remote
Administration tools)
9. Keyloggers -
9. Keyloggers -
Consider the situation, everything you type in the system is mailed to the
hacker..!! Wouldn't it be easy to track your password from
that.. Keyloggers perform similar functionallities.. So next time you type
anything.. Beware..!! Have already posted about keyloggers and ways to protect
yourself from them..
10. BruteForcing -
10. BruteForcing -
The longest and most tiring job.. don't even consider this if you don't know
the SET of password for your victim..
11. Secret Question -
11. Secret Question -
According to a survey done by security companies, it is found that rather than
helping the legitimate users the security questions are more useful to the
hackers.. So if you know the victim well try this..
12. Social Engineering -
12. Social Engineering -
Ya
this was one of the oldest trick to hack.. Try to convince your user that you
are a legitimate person from the system and needs your password for the
continuation of the service or some maintainence.. This won't work now
since most of the users are now aware about the Scam.. But this Social
Engginering concept is must for you to have to convince victim for many
reasons..!!!
13. Phishing -
13. Phishing -
This is another type of keylogging, here you have to bring the user to a
webpage created by you resembling the legitimate one and get him to enter his
password, to get the same in your mail box..!! Use social engginering..
14.
Fake Messengers -
So its a form of phishing in the application format.. getting user, to
enter the login info in the software and check your maill..!!!Here
the cookie saved by the sites are taken and decoded and if you get lucky.. You
have the password..!!!
Hmmm.. not satisfied with single account at a time..?? so there are ways to
hack lots of accounts together.. I know few but there exists many..!! listed
are the ones i know and will teach you in coming posts...
15.
DNS Poisoning or PHARMING -
So, phisihing
is a tough job.. isn't it..?? convincing someone to enter their password at
your page..?? what if you don't have to convince..?? what if they are directed
automatically to your site without having a clue..?? Nice huh..?? Pharming does
the same for you.. More about it in my next post..
16. Whaling -
16. Whaling -
This
method gets you the password of the accounts which are used by the hackers
to recive the passwords.. So you just have to hack one ID, which is
simplest method( Easy then hacking any other account, will tell you how in
coming posts..) and you will have loads of passwords and so loads of accounts
at your mercy..!!!
No comments :
Post a Comment