Friday, 28 February 2014

                    Types of Hacking

Vulnerability scanner

A vulnerability scanner is a tool used to quickly check computers on a network for knowing the weakness of the computer. they will check which computer is open to access and they will access in to the personal information

Password cracking
Password cracking is the process of recovering passwords from data that are saved or used in a computer the common method used is guessing your password. This will be commonly done by people who knows you may be friends or relatives     
Packet sniffer
A packet sniffer is an application that records the data that will send to the internet
Spoofing attack (Phishing)
Spoofing means taking a copy of a genuine page or a website and making fool of actual user. Mainly used to hack/take the personal information that you will use to login or sign up
Rootkit
A rootkit is malicious software that is able to hide the existence of some process in the system. this will help a hacker to act silently in a remote computer and access the personal data
. the hidden program may be capable of handling the operating system

Trojan horses
A Trojan horse is a program which act as doing nothing but is working.
a hacker can get data any time from the affected computer 
Computer virus
A virus is a self-replicating program that affects by inputting copies of itself into other executable code or documents.And destroys the necessary files inside the computer
Computer worm
Like a virus, a worm is also a self-replicating program.it will spread its own copies and tries to make the system slower and due to the self replicating program it will reduce the disk space
Key loggers
A keylogger is a tool used to monitor the keystrokes or key presses on the key board. The software will save the keystrokes and mail it to the hacker who created the keylogger.
Newly created keyloggers are capable of taking screenshots. it will take screenshots in a specific interval of time. and mail it . Keyloggers are capable of completely monitoring the activities that are done on the system and informs the hacker. 

Saturday, 22 December 2012



Classifications

According to the activities done by the hackers hackers are classified in to
  • White hat
  • Black hat
  • Grey Hat

White hat

A white hat hacker is an ethical hacker who is working for the good purpose who hacks to check the
security of the website or programs. He will be working for the company itself.


Black hat

 A Black hat hacker is a person who tries to crack the security of a website or a program for personal use. Black hat hackers a re actually doing illegally.They get in to secure network and destroys the real data
Part 1: Targeting
The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot

Grey hat

A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked,
 example. Then they may offer to repair their system for a small fee.

Elite hacker

A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.

Script kiddie

A script kiddie (or skiddie) is a non expert tries to hack a network or pc with a very little knowledge.
They use the resources from internet of other means to hack. Usually uses presetted softwares to hack

Neophyte

A neophyte is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.

Blue hat

A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.

Hacktivist

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks.

Nation state

Intelligence agencies and cyberwarfare operatives of nation states.

Organized criminal gangs

Criminal activity carried on for profit.

Bots

Automated software tools, some freeware, available for the use of any type of hacker.


In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker, not making a difference between computer criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.

Know what a hacker is

classifications of Hackers

  • Hacker a term used in computing for several types of person
    • Hacker (Computer Security) someone who accesses a computer system by destroying the security
    • Hacker (Hobbyist), who makes innovative customizations or combinations of retail electronic and computer equipment
    • Hacker (Programmer subculture), who shares an anti-authoritarian approach to software development now associated with the free software movement