What is Hacking?
Hacking is the process of gaining unauthorized access into a computer system, or group of computer systems. This is done through cracking of passwords and codes which gives access to the systems. Cracking is the term which specifies the method by which the password or code is obtained. The person who undertakes hacking is known as the hacker.
The hacking can be done on single systems, a group of systems, an entire LAN network, a website or a social media site or an email account. The access to a password is obtained by the hacker through password cracking algorithms programs.
The hacking can be done on single systems, a group of systems, an entire LAN network, a website or a social media site or an email account. The access to a password is obtained by the hacker through password cracking algorithms programs.
It goes without saying that most of the individuals, as well as business associations, use computers and laptops for all their daily needs. Especially for organizations (of any form), it is essential to have a computer network, domain or website, Wide Area Network (WAN) for a seamless flow of information and business applications. Consequently, these networks are under a high-risk exposure to the outside world of hacking and hackers.
Who is a Hacker? Types of Hackers
A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.1.Cracker:
Also known as black hat, these types of hackers always have a mala fide intention and they access computer networks , websites in an unauthorized manner.
Black hat |
2.Ethical Hacker:
Also known as White hat, they recoganize officially stamped hackers who access systems to identify
Other responsibilities include vulnerability assessment, cracking of codes of illegal, retrieval of crucial data required for security purposes. These are highly trained, certified and paid professional.
3.Grey Hat:
They lie between the above-mentioned type of hackers i.e.
Grey hat |
they take the recourse of unauthorized access to a system but not with any fraudulent intent. The objective is to reveal the vulnerabilities and weakness of the system’s stakeholders.
4.Hacktivist:
These hackers are those who are focussed on hacking websites and leaving information on such websites.
This is to spread political, social, religious messages. This can also take the form of targeting other nations. A hacktivist is motivated by civil disobedience and seeks to spread an ideology. In some cases, this ideology includes total anarchy. Still, hacktivists are typically not motivated by malicious intent. Hacktivists also steal money or data in an effort to spread their agenda. However, their motivation is more like that of Robin Hood. They seek to take from those who have and give freely to those who have not. They typically see themselves as vigilantes who use hacking to enact social justice and policy changes.
Hacktivist |
A hacker who identifies and exploits weaknesses in telephones instead of computers.
Phreaking |
6.Script kiddies:
A non-skilled person who gains access to computer systems using already made tools.
Script kiddies |
For example, imagine a child gets their first computer. The child watches a movie about hacking and then downloads a copy of Kali Linux. They begin playing with the various programs while searching for online tutorials. At first, they may be perceived as nothing more than an internet troll or noob, due to their lack of experience and quickness to brag and boast. Sometimes they will even resort to cyberstalking or bullying. However , this may simply be a cover for other more nefarious activity.
Types of Hacking
One of the most frequent threats of hacking is those faced by the websites. It is very common to see a particular website or online account being hacked open intentionally using unauthorized access and its contents being changed or made public. The web sites of political or social organizations are the frequent targets by groups or individuals opposed to them. It is also not uncommon to see governmental or national information website being hacked. Some of the well-known methods in websites hacking are:
1.Phishing:
The replicating the original website so that the unsuspecting user enters the information like account password, credit card details, which the hacker seizes and misuses. The banking websites are the frequent target of this.
2.Virus:
These are released by the hacker into the files of the website once they enter into it. The purpose is to corrupt the information or resources the website. Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.
3.UI redress:
The hacker uses the fake user id and when the user clicks with the intent of going to a certain website, they are directed to another site altogether.
4.Cookie theft:
Hackers accesses the website using malicious codes and steal cookies which contain confidential information, login passwords etc.
5.DNS spoofing:
World's Most Famous Hackers :
- Kevin mitnick (most wanted)
- Jonathan James
- Albert Gonzalez
- Kevin Poulsen
- Nasa Hacker Gary McKinnon
- Robert Tappan Morris
- Loyd Blankenship
- Julian Assange etc...
2 Comments
Nice one
ReplyDeleteThanks Dada
Delete