INTRODUCTION TO HACKING (Post 1)

                                           INTRODUCTION TO HACKING (Post 1)
                           
                                      
        As far as I'm Concern Hacking is simply a technical skill set.Understand how hacking works and how it attacks happen or done or being able to plan hacking attacks etc. Is simply just a technical skill set. :)

NOTE:- Now understand if you try to do hacking in the real world only you are liable for any legal ramifications.As if you steal somebody's data which is not supposed to steal or look at or you slow down someone's systems or destroy systems etc. is all on you the content of this blog is no longer responsible for that. :)

                                                              WHAT WE LEARN ON THIS BLOG ?

  1. How to do hacking based on how malicious hackers  attack?
  2. How to plan hacking attack?
  3. Why you would do hacking or what you can do with hacking? 

     WHAT HACKING ACTUALLY IS?WHO HACKERS ARE ?

  1. Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems." 1. Eric Raymond, compiler of The New Hacker's Dictionary, defines a hacker as a clever programmer.
  2.                                          
  3. Basically, to the simplest form of hacking. All hacking is it non-conventional ways of  interacting with systems.The meaning of non-conventional ways of interacting with systems is that when a computer operating system is created   the designers of that operating system figure out how they want you to interact with that computer. (you may double click ,want to open a command prompt etc.). As this is the conventional  way to interact with the computer and on the other hand the non-conventional way is that trying to interact with the system in a way it is not supposed to be interact as it is intended by the  designers.
  4. Example:-let's say I want to open a file on the system the conventional way is to boot-up the system logged in and then double click on the file and it opens up that's it but the non-conventional way of accessing that file is  booting the computer offway linux or backtrackos or kali-linux live cd (now the operating system is the live cd ) then going into the computer  and then accessing the documents using the linux live cd operating system. 
  5. Now the hacker who are they?  Basically, there is Black hat hackers ,White hat hackers and Grey hat hackers.                                                                                                                                            Well thinking or talking of black hat hackers these are the "evil hackers" now a days the black hat hackers that are outside they destroy systems and steal data etc. these are the "bad guy's". Generally they credit card information (passwords and data ) they basically steal data and does damages.Then there is White hat hackers which are  the "little angels" of the hacker world.They don't do any damage to the system they just looking to discover the security vulnerabilities so that they  can patch them.S if they are trying to hack the system always for good they don't cause any damage to the computer.Last but not the lest there are Grey hat hackers (which I'm kind of !!) In this category the 98% of the population of hackers fall into it.Basically,the Grey hat means the people in it are mainly hack to understand the functioning of the system how it works. In the grey hat hackers you maybe the black hat or my be the White hat hackers.Grey hat hackers comes in the middle of the black and the white hat hackers.
  6. The other name for White hat hackers is they are the ethical hackers Means you only hack ethically (being in accordance with the rules) .When you hear of ethical hacking I would argue that this is mainly the marketing concept . Basically,ethical hacking as if you are doing any hacking you are doing it for only good reasons you may hack systems only for the security vulnerabilities .
  7. SKILL LEVELS 
  8. In the world of hacking there is Generally, only 3 levels or people that are having the hacking skills.

  • Computer Science people(skill level) :- The computer science people are mainly the impressive people they knows how the stuff works in systems and networking.The people which can actual write/read code.Using code or any programming language they can modify or can create another os(operating system)  also by programming they can create malwares or viruses or rootkits.
  • Technician class of hackers :-These are the people which do not use any code or programming languages.They just simply use the tools to access the  system  in non-conventional way and so just like win 7 is easy to use and is more robust than win NT well hacking tools are also easy to use .(In this you are not develop anything or making any viruses or creating malware).
  • Script Kiddies :- These are the people which don't know anything about coding and they don't even use the tools they are basically,the non technical people the somehow gotten their hands on the scripts (like VB script ,malicious code or programs etc.).They try that for either for betterment or  Detterment of the other people.

    Reasons to Attack:-

  1. To acquire data(for good or for bad).
  2. The another reason for hacking is for impersonation (easy to impersonate somebody).
  3. Then there is the destruction motivation thing .i e. weather you are against competitor or going after somebody you dislike.Basically you hack  to destroy their systems or shut their system down.
  4. There is another reason for hacking ie. some people do it for fun.
                                                          FOG OF LAW?
  1.                                              
  2. If you are hacking for Malicious,nefarious or evil reasons you probably know that you are on the bad side of the law.For the people those who are grey hat hackers or White hat hackers(Ethical hacker) they have to understand that in today's climate privacy is a big concern.The things you need to understand during hacking the person who owns the system is not necessarily is not the same person who owns the data or information on the system.
  3. Example:-There is  big case where a swat team member (California,U.S). He was issued a cell phone by police department he was doing some private text messaging on that cellphone (bad stuff or something else basically doing something he was not suppose to do) and therefore ,he got fired from the police department .Later on that police officer(swat team member) took the swat team to the court and in his defense he said that it was his private information that was sitting on the phone which is own by the department servers or systems and he blame the department the they violated his privacy. later he won that lawsuit.
  4. The system maybe own by the company but the data on the system may not be own by it.As the hacker you are the one that purporting the hack and therefore you may get sued at the end of the day.Private information listen Carefully, if you're going after any private information there is very good chance you are breaking privacy laws even if it's on the corporate  laptops or computers.

METHODS OF ATTACKING  

  1. In real world the hacking is basically, a  multistate process to get into the result .the hacking is not going to happen in just half-hour (like shown in movies) It's generally, going to be the multiday or multiweek process (acquiring information creating vulnerabilities int he system ),
There is mainly three methods of attacking :-
  1. Physical way
  2. Digital way
  3. Social way or(social engineering.

PHYSICAL WAY:-

                                                  
Physically opening up the vulnerabilities on the system ie. if you're going to hack a company that company is in a big building . So,here what you do you trying to gain access to the building and in order to steal data or any information directly from the computer or to open up a breach in their electric devices (you hack from outside world).

DIGITAL WAY:-

                                              
If you are trying to hack on the base of doing something wrong like destruction of computer or shutting  off the network  the thing is called denial service attack or  ping of death .
Basically, what you trying to do is to hack from the outside world you are trying to flood the target with so much data or traffic that brings down  all the systems or the connected computers that still stand out.
In digital hacking you try to do an email server hacking ,or terminal server or database sever hacking.In windows the hacker generally use the  BACK-DOORS .
Back-doors are the  real problem in the technology world. when the manufacturer create software  a lot of times they create multiple ways to access a different points within the software .So, that they can do testing .In digital way of hacking there also term called Eastereggs Basically, eastereggs  are the "special features " the computer programmers added to the pieces of software(That only work if you knew how  to make them work out). 

SOCIAL ENGINEERING :-

                                            
In social engg. it isn't about the computer hacking not talking about getting into building or hacking any systems.
In this we are trying to acquire data from the normal human being (by tricking or playing with them) Well ,this includes various attacks  like:- phishing pages, malware  or virus hyperlinks on the sites. 
  1.                
  2.              ---To be continued....... Introduction to hacking(post 2)

Comments

Popular posts from this blog

Hack Like a Pro: Perl Scripting for the Aspiring Hacker

Understanding the Link between social media , ID theft and your credit card

21 Tips To Get Adsense Approval For Your Blog