BASIC OF HACKING
Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context.
Classifications:-

White Hat:-

Black Hat:-
.jpg)
Part 1: Targeting

Part 2: Research And Information Gathering
It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use
directly or indirectly, to help them gain access to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).
Grey Hat:-
.jpg)
Elite Hacker:-
A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.
Script Kiddi:-

A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature).
Neophyt:-
A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.
Blue Hat:-

Hacktivis:-
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks. Nation state Intelligence agencies and cyberwarfare operatives of nation states.
Attack:-
A typical approach in an attack on Internet-connected system is:

2. Vulnerability analysis: Identifying potential ways of attack.
3. Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.
In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.
Security Exploit:-
.jpg)
Techniques
Vulnerability Scanner:-

Password Cracking:-
.jpg)
Packet Sniffer:-
.jpg)
Spoofing Attack (Phishing):-
A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.
Rootkit:-
.jpg)
Social Engineering:-


A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)
Viruses:-
.jpg)
Worm:-
.jpg)
Key Loggers:-
.jpg)
and data collected by the key logger could be used for catching
employee fraud.
session hijacking:-Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user
session by surreptitiously obtaining the session ID and masquerading as the authorized user.
Once the user's session ID has been accessed (through session prediction), the attacker can
masquerade as that user and do anything the user is authorized to do
on the network.
The session ID is normally stored within a cookie or URL. For most communications,
authentication procedures are carried out at set up. Session hijacking takes advantage of that
practice by intruding in real time, during a session. The intrusion may or may not be detectable,
depending on the user's level of technical knowledge and the nature of the attack. If a Web site
does not respond in the normal or expected way to user input or stops responding altogether
for an unknown reason, session hijacking is a possible cause.
.jpg)
or buttons that are hidden from normal view (usually links color is same as page background).
Clickjacking is possible because of a security weakness in web browsers that allows web pages to be
layered and hidden from general view. In this situation what happens is
that You think that you are
clicking on a standard button or link, like the PLAY button or download button on an video or some stuff,
but you are really clicking on a hidden link. Since you can’t see the clickjacker’s hidden link, you have no
idea what you’re really doing. You could be downloading malware or making all your Facebook
information public without realizing it. Some good hackers make ajax keyloggers and put them as
javascripts over their fake websites and when you open them they retrieve all your passwords stored in
web browser and records whatever you type while the web browser is open and stores this information
on their servers.
There are several types of clickjacking but the most common is to hide a LIKE button under a dummy or
fake button. This technique is called Likejacking. A scammer or hacker might trick you by saying that you
like a product you’ve never heard. At first glance, likejacking sounds more annoying than harmful, but
that’s not always true. If you’re scammed for liking Mark Zukenberg, the world isn’t likely to end. But
you may be helping to spread spam or possibly sending Friends somewhere that contains malware.

attempt to gather personal and financial information from recipients. Typically, the messages appear to
come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers
include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online. A phishing expedition, like the fishing
expedition it's named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait.
Desktop Phising :-
Concept Behind The Hack :
.jpg)
file used to play a large role before the Domain Name System (DNS) came into existence. A
hosts file basically controls how your browser finds websites.
You can use host file to map any word or domain to an ip address or to another domain. For
example if we add
74.125.236.84 www.facebook.com
To the host file what will happen is that when you type Facebook.com in your browser it will open google.com instead of facebook.com this is because (74.125.236.84) is Google's Ip, So the browesr will take it blindly So if a attacker is abel to add his Ip address (where he Hosts thephisher page ) Victim will be redirected to the attackers phishing site
What makes this attack so successful is the victim will not Know since the URL only remains
facebook.com open google.com instead of facebook.com this is because (74.125.236.84) is Google's Ip, So
the browesr will take it blindly So if a attacker is abel to add his Ip address (where he Hosts the
phisher page ) Victim will be redirected to the attackers phishing site
What makes this attack so successful is the victim will not Know since the URL only remains
facebook.com.
Footprinting:-

a near complete profile of an organization’s security posture. Using a combination of
tools and techniques coupled with a healthy dose of patience and mind-melding,
attackers can take an unknown entity and reduce it to a specific range of domain names,
network blocks, subnets, routers, and individual IP addresses of systems directly connected to the Internet, as well as many other details pertaining to its security posture.
Although there are many types of footprinting techniques, they are primarily aimed at
discovering information related to the following environments: Internet, intranet, remote
access, and extranet.
Scanning:-
.jpg)
equivalent to knocking on the walls to find all the doors and windows. During
footprinting, we obtained a list of IP network blocks and IP addresses through a wide
variety of techniques including whois and ARIN queries. These techniques provide the
security administrator (and hacker) valuable information about the target network (you),
including employee names and phone numbers, IP address ranges,
DNSservers,and mail servers. ther are such as ping sweeps, port scans,
and automated discovery tools.
No comments:
Post a Comment