Introduction Of Hacking And Types Of Hacking

downloadDownload
  • Words 1891
  • Pages 4
Download PDF

Introduction of hacking

Hacking is defined as to examine the weaknesses in computer system or network to crack its security to gain access or an unauthorized way to breakdown computer network security e.g. hackers could change or delete information such as altering websites planting trojans and it could also mean to imply a specific computer or entering a network without permission simply blocking or disrupting hackers may be motivated by multiples of reasons such as profit, protest, gathering of information, challenge, recreation, or for the spying purpose. There are various methods hackers use to gain access mostly involves protocols that computers utilize to share information with each other even a house computer can be used a host a web site enabling HTTP (hyper transfer protocol) and FTP (file transfer protocol) on a home computer allows at various levels of access (depending on the host computer configuration) to browse inside the host computer whenever is connected to the internet some of your default settings may allow these kinds of connections and you would not know it unless you become a victim of a malicious hack it may sites on the internet there utilities available to assist in hacking

Types of hacking

  1. Ethical hacking
  2. website hacking
  3. network hacking
  4. email hacking
  5. password hacking
  6. computer hacking
  7. online banking hacking

1) Ethical hacking

Ethical hacking where a hacker finds weaknesses in computer system and getting them fixed its use for testing purpose

Click to get a unique essay

Our writers can write you a new plagiarism-free essay on any topic

2) Website hacking

Website hacking involves tacking control of website owner and change in the information

3) Network hacking

Network hacking means a gathering of information about domain using various tools telnet ping tracert etc

4) Email hacking

Unauthorized access without permission of owner to access information

5) Password hacking

Password hacking refers to crack computer password that has been already stored in computer to access data

6) Computer hacking

Hacker will steal information from pc like computer id and passwords by applying hacking method

7) Online bank hacking

Hacking involves unauthorized accessing bank account by creating fake websites

Hackers techniques

  • System hacking
  • Software hacking
  • Footprinting
  • Gaining access

Hacking tricks

  • Logical bombs
  • Trojans horses
  • Inside job
  • Rough access point
  • Daniel of services
  • Anarchist crackers and kiddies
  • Spoofing
  • Spyware
  • Pre-texting & Phishing
  • Fake websites
  • Electronic bulletin board
  • Information brokers

Famous hackers in history

In December of 1947, the transistor was invented

  • Captain crunch
  • Steve jobs
  • Kevin Mitnick
  • At&t
  • The worm (Robert Tappan Morris)
  • Kevin Poulsen (A.K.A Dark Dante)
  • Tsumomu shimomura
  • David smith
  • Jon Johansson (A.K.A DVD Jon)

History of hacking

Today’s people have different concept about hacking

It was started in 1960 at MIT (Massachusetts institute of technology) at university in Cambridge In 1988 a ‘worm program’ written by a college student shut down about 10 percent of computers connected to the Internet. This was the beginning of the era of cyber-attacks. Today we have about 10,000 incidents of cyber-attacks which are reported and the number grows. In 1994 A 16-year-old music student called Richard Pryce, better known by the hacker alias DataStream Cowboy, is arrested and charged with breaking into hundreds of computers including those at the Griffiths Air Force base, NASA and the Korean Atomic Research Institute. His online mentor, ‘Kuji’, is never found.

Also this year, a group directed by Russian hackers broke into the computers of Citibank and transferred more than $10 million from customers’ accounts. Eventually, Citibank recovered all but $400,000 of the pilfered money. In 1995 In February, Kevin Mitnick is arrested for a second time. He is charged with stealing 20,000 credit card numbers. He eventually spends four years in jail and on his release his parole conditions demand that he avoid contact with computers and mobile phones.  On November 15, Christopher Pile becomes the first person to be jailed for writing and distributing a computer virus. Mr Pile, who called himself the Black Baron, was sentenced to 18 months in jail.  The US General Accounting Office reveals that US Defense Department computers sustained 250,000 attacks in 1995. In 1999 In March, the Melissa virus goes on the rampage and wreaks havoc with computers worldwide. After a short investigation, the FBI tracks down and arrests the writer of the virus, a 29-year-old New Jersey computer programmer, David L Smith.

More than 90 percent of large corporations and government agencies were the victims of computer security breaches in 1999 In 2000 In February, some of the most popular websites in the world such as Amazon and Yahoo are almost overwhelmed by being flooded with bogus requests for data.  In May, the ILOVEYOU virus is unleashed and clogs computers worldwide. Over the coming months, variants of the virus are released that manage to catch out companies that didn’t do enough to protect themselves.  In October, Microsoft admits that its corporate network has been hacked and source code for future Windows products has been seen.

Types of Hackings:

  • Ethical Hacking
  • Non-Ethical Hacking

Ethical Hacking:

The type of hacking which refers to identify the weaknesses of the computer or computer network. In simple words we can say that ethical hacking is used for security of the system. This type of hacking is not a crime.

Every person having weaknesses in the computer system. And due to these weaknesses, the vital part of information can be accessed by unauthorized persons. In ethical hacking, the professional person tries his best to improve the security from the attacks of hackers.

Let suppose we take an example of an organization. In this organization, the owner of the company hire ethical hacker to check the company’s software security and allowing them to identify weaknesses/ faults and provide suggestion to improve these weaknesses/ faults. Then the hacker;

  • Get permission from the owner of the organization in written form.
  • Detects the faults or weaknesses of system.
  • Improves the faults or weaknesses of the system.

Then ethical hacker applies his knowledge and skills to improve the faults of the computer system of the organization for which he is working. On the basis of these four questions, he tries to improve security of the organization system/ network.

  1. To which information the attacker get access?
  2. What are the major targets of the attackers?
  3. Why he wants to get access to this information?
  4. Can anyone identify that attacker is trying to attack on his system?

In ethical hacking all work is done legally, ethically and effectively. The ethical hacking is also considered as “white hat hacking”. (Hackers, n.d.)

Non-Ethical hacking;

In unethical hacking, the computer system or network is accessed by someone without awareness to owner of the system. In un-ethical hacking the hackers can hack the computer system by inserting virus, or malware instructions/ programs. Here the question arises that why un-ethical hacking is to be used?

The answer is that the unethical hacking is done due to

  • Getting access to someone’s financial information.
  • Getting secrets of any other person/ organization.

There are other two types of hackers in un-ethical hacking such as

  • Black-hat hackers
  • Gray-hat hackers

Black-Hat Hackers:

Black hat hackers try to search computer/ network security or privacy and damage them to get financial benefits or other malicious reasons. Black hat hackers cause major damages to both single user computer system/ network or group based system. The term “black hat hacker” came from old western movies in which the good boys wore white hats while the bad ones wore black hat. The black hat hackers still consider a very bad or dangerous. The black hat hackers may cause serious damages like;

  • Get access to someone credit card/ bank account
  • Get access to someone computer system to get vital information.
  • They can also get access to rival country secrets.

This type of hacking is illegal but at some places like organization or any other place these types of hackings are used to avoid from any risk or threats. In 2001 there was a law established to protect this type of hacking. (techopedia, n.d.)

Grey Hat Hackers:

A grey hat hackers is a person who violet the ethical rules/ manners. But grey hat hackers damage the computer less than the black hat hackers. These types of hackers are considered b/w white hat and black hat hackers. These types of hackers may or may not be work on the behalf of security. While the black hat hackers totally violate the rules and principles of security and damage/ destroy the computer system or networks illegally. Grey hat hackers will also play a vital role in security environment. The most common example which is used for grey hat hackers is that they exploit the security rules publically. While the white hat hackers do not exploit security publically. Therefore, experts might say the difference b/w white hat hackers and grey hat hackers because grey hat hackers when publically announce the security threats, it may give an advantage to black hat hackers to hack the system/ networks. Due to this reason grey hat hackers considered as different from white hat hackers. (techopedia, n.d.)

Conclusion:

Hacking is a good computing skill which is use for good or bad intention. Some people use it for good activities and some use it bad activities. People use it legal, illegal, ethical or unethical. Hacking is helping you to find weakness in your computer system, software and network. Hacking help you to improve your software ad make stronger. Hacking also help nation to spy other nation. Hacking help you to make a good programmer.

Hacking has also many benefits like ethical hacker are help you to identify the weakness of the computer or computer network. Ethical hacker is helping you to improve your weakness in security system. Every person has weaknesses in their computer system. When they do not remove their weaknesses, the vital part of information can be accessed by unauthorized person. Like in any company when they have weaknesses the ethical hacker are help the company to improve their weakness and make the security system are better. Ethical hacker is also helping you to find that what are your weaknesses? What are major targets of the attackers? Why he wants to get access to this information? Can anyone identify that attacker is trying to attack on his system? All this information is help in any company and anyone to secure their system and secure their secret information.

Hacking has also some disadvantages. Like unethical hacking which include black-hat hacker or gray-hat hacker? Unethical hacker are hack the computer system by inserting the virus, or malware instruction/programs. In this hacking, someone get financial information and get the secret of any organization and person. Black hat hackers are damage in any computer and organization to get financial benefit. Black-hat hackers are access someone bank account and credit card to get money and also get access to rival country secret. Grey hat hackers are also damage the computer system and get someone secret information. However, it also plays a vital role in the security environment.

Hacking is a good thing. I belief that there are some disadvantages of hacking. But I am saying that people will be taken an approach to protect privacy and security online, and ensure that they educate and inform about all series risks involved in maintaining and any kind of presence of internet. The history of hacking is going of fair because one day will come when people will know true meaning of hacking to be able to explore and understand. When this idea realized, it is possible that all people will declare publically themselves to be a hacker without any fear of losing their jobs. My belief is that ‘hacking’ deserves to be put on the map as a viable method for the creation of construction of information systems and software artifacts. It should be studied alongside other system development methods, and practitioners in the field of system development should be aware of its applicability and able to take advantage of its ‘bag of tricks’ when appropriate

image

We use cookies to give you the best experience possible. By continuing we’ll assume you board with our cookie policy.