Tuesday, 3 March 2015

INTRODUCTION TO ETHICAL HACKING-

INTRODUCTION TO ETHICAL HACKING--->



·        Hacking-
The Art of exploring various security breaches is termed as  Hacking
 


1.       Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring  and Learning how Computer systems operate. They love discovering new ways to work electronically.
2.       Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain.Technically, these criminals are Crackers as Criminal Hackers. Crackers break into systems with malicious intentions.
3.       They do it for Personal  gain, Fame, Profit and even Revenge. They Modify, Delete and Steal critical information, often making other people's life miserable.
4.       Hacking has a lot of meanings depending upon the person’s knowledge and his work intentions. Hacking is an Art as well as a Skill. Hacking is the knowledge by which one gets to achieve his Goals, anyhow, using his Skills and Power.

  • DIFFERENCE BETWEEN HACKER & CRACKERS-
                                      

  1.   HACKER TYPES-->
  • White hat hacker-
                         They use the knowledge for good of others,security,consultancy or for the catching bad people.
  • gray hat hacker-
                         generally they are act as white hat hacker but the sometimes they act as Black Hat hacker.
  • black hat hacker-
                          they are the crackers ,bad people. also having intention is bad .
 
  1. 1  COMMUNITY OF THE HACKERS-
  • Crackers-
                      
A Cracker is a person who breaks into other people systems, with malicious intentions.
in the other words, people who hack into application,websites,n/w etc to still data or cause the harm.
  • Phreaks-
                          people who finds the bugs in the telephone call,telephone networks for making free calls,fake calls. are called phreaks.
  • script kiddies-
                           script kiddies are those people that they have not technical knowledge.They always use the scripts created by others.

  1. 2.   BASIC FOUR STEPS OF THE HACKERS--->
  • Information Gathering/reconnaissance-
                                          
Reconnaissance/information gathering can be described as the pre-attack phase and is a systematic attempt to locate, gather, identify,and record information about the target. The Hacker seeks to find out as much information as possible about the target
  • scanning/enumeration-
Scanning and enumeration is considered the second pre-attack phase. This phase involves taking the information discovered during reconnaissance and using it to examine the network. Scanning involves steps such as intelligent system port scanning which is used to determine open ports and vulnerable services. In this stage the attacker can use different automated tools to discover system vulnerabilities
  • Gaining the access-
This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the Hacker uses for an exploit can be a local area network, local access to a PC, the Internet, or offline. Gaining access is known in the Hacker world as owning the system. During a real security breach it would be this stage where the Hacker can utilize simple techniques to cause irreparable damage to the target system.
 
  • Maintaining access-
Once a Hacker has gained access, they want to keep that access for future exploitation and attacks. Sometimes,Hackers harden the system from other Hackers or security personnel by securing their exclusive access with Backdoors, Root kits, and Trojans.
The attacker can use automated scripts and automated tools for hiding attack evidence and also to create backdoors for further attack.
 
  • clearing the task/bugs -
In this phase, once Hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action. At present, many successful security breaches are made but never detected. This includes cases where firewalls and vigilant log checking were in place.
 
  1. 3.  working of ethical hacker-
  • obeying the ethical hacking principal.
  • work ethically as per the law generated by specific country govt.org.
  • respecting privacy.
  • not crashing the your system.
  • executing the plan.
 
 
  
 


No comments:

Post a Comment