In this tutorial learn about hackers ...
so now this tutorial will halp you to decide about arious hackers and classify them..
if you have any interset in hacking read it and learn something new..
Hacking
• Hacker is a computer person who is very curious and wants to learn as much as possible
about computer systems.
• Hacking was developing and improving software to increase the performance of
computing systems.
• Hacking has a lot of meanings depending upon the person’s knowledge and his work
intentions. Hacking is an Art as well as a Skill. It is the knowledge by which one gets to
achieve his goals, anyhow, using his skills and power.
Ethical Hacking
• Ethical Hacking is testing the resources for a good cause and for the betterment of
technology.
• Technically Ethical Hacking means penetration testing which is focused on Securing and
Protecting IT Systems.
Types of Hackers
• White Hat Hacker
• Black Hat Hacker
• Grey Hat Hacker
White Hat Hacker
• A White Hat Hacker is computer guy who perform Ethical Hacking.
These are usually security professionals with knowledge of hacking and
the hacker toolset and who use this knowledge to locate security
weaknesses and implement counter measures in the resources.
• They are also known as an Ethical Hacker or a Penetration Tester. They
focus on Securing and Protecting IT Systems.
Black Hat Hacker
• A Black Hat Hacker is computer guy who performs Unethical Hacking. These are the Criminal hackers or Crackers who use their skills and knowledge for illegal or malicious purposes. They break into or otherwise vimalicious purposes. They break into or otherwise violate the system integrity of remote machines, with malicious intent.
• These are also known as an Unethical Hacker or a Security Cracker. They focus on Security Cracking and Data stealing.
Grey Hat Hacker
• A Grey Hat Hacker is a Computer guy who sometimes acts legally, sometimes in good will, and sometimes not. They usually do not hack for personal gain or have malacious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.
• They are hybrid between White Hat and Black Hat hackers.
Classification of Hackers
• Coders
• Admin
• Script Kiddies
Coders
• Coders are programmers who have the ability to find the unique vulnerability in existing software and to create working exploit codes.
• These are the individuals with a deep understanding of the OSI Layer Model and TCP/IP Stacks.
Admin
• Admin the computer guys who have experience with several operating systems, and know how to exploit several existing vulnerabilities.
• A majority of Security Consultants fall in this group and work as a part of Security Team.
Script Kiddies are the bunnies who use script and programs developed by others to attack computer systems and Networks. They get the least respect but are most annoying and dangerous and can cause big problems without actually knowing what they are doing.
Steps Performed by a Hacker
1. Performing Reconnaissance 2. Scanning and enumeration 3. Gaining access 4. Maintaining access and Placing backdoors 5. Covering tracks or Clearing Logs
Phase I: Reconnaissance
- Reconnaissance can be described as the pre-attack phase and is a systematic attempt tolocate, gather, identify, and record information about the target. The hacker seeks to find out as much information as possible about the target
|
Phase II: Scanning and Enumeration
> Scanning and enumeration is considered the second pre-attack phase. This phase involves taking the information discovered during reconnaissance and using it to examine the network. > Scanning involves steps such as intelligent system port scanning which is used to determine open ports and vulnerable services. In this stage the attacker can use different |
automated tools to discover system vulnerabilities. |
Phase III: Gaining Access |
|
This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the hacker uses for an exploit can be a local network,local access to a PC,the internet , or offline. Gaining access is known in the hacker world as owning the system.
During a real security breach it would be this stage where the hacker can utilize simple techniques to cause irreparable damage to the target system.
Phase IV: Maintaining Access and Placing Backdoors
>Once a hacker has gained access, they want to keep that access for future exploitation and attacks. Sometimes, hackers harden the system from other hackers or security personnel by securing their exclusive access with backdoors, rootkits, and Trojans. >The attacker can use automated scripts and automated tools for hiding attack evidence |
and also to create backdoors for further attack.
|
|
|
|
In this phase, once hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action.
At present, many successful security breaches are made but never detected. This includes cases where firewalls and vigilant log checking were in place.
also learn how proxy server works |
|
|
No comments:
Post a Comment