Monday 8 August 2011

What are types of Hackers and What is Hacking


This Is A Very Basic Thing...But Useful For Begainer's!!

"Hackers have infiltrated the power grid." "Hackers stole credit card data." "Hackers created a virus." We've all heard and read these stories on the news. What are hackers though? In this article, I will discuss what hacking is, and what hacking isn't.
While there are many definitions of hacking, a general definition is to modify something to make it work for you. For computers, hacking includes fixing programs until they work. Also, hacking includes modifying the computer hardware to make it work better or tuned to the person's wishes. The type of hacking that the media discusses includes breaking into secure systems to determine their weaknesses and to explore them. However, the media only points out the malicious uses for breaking into systems.
What do these terms have in common? They're all terms used by hackers to describe hackers. Just like in typical cowboy fashion, the "white hats" are the good guys and the "black hats" are the bad guys. Although the lines are blurred greatly when it comes to hacking. The "White hats" are security experts who try to find the vulnerabilities in programs and systems, and report them to the manufacturers. They would be considered "ethical hackers" because they either have authorization to break into the system or program, or they do so with the intent of assisting the manufacturer in securing them. The "Black Hats" are the ones who are trying to find those same vulnerabilities and exploit them. "Cracker" is another term for the Black Hat hackers, usually referring to the creation of software cracks to bypass anti-piracy methods. A "Phreaker" is a person who hacks into telecommunications services.


Final Thoughts
While the media has portrayed all hackers as malicious and evil, the reality is that some (if not most) of them are either working as/for security professionals or are only hacking to improve their personal experience. Some of the white hats only hack their own systems in order to tweak them to the fullest extent that they can. Most of the "white hat" hackers are working behind the scenes or in the shadows. The media hardly, if ever, discusses them or their work. Through movies, and sound-bites, the media has jumped on the "hackers are bad" bandwagon-- totally overlooking the people who are trying to make their (and our) lives better through their hacking.


I m going to explain categories of Hacks

1) Inside Jobs - Most security breeches originate inside the network that is under attack. Inside jobs include stealing passwords (which hackers then use or sell), performing industrial espionage, causing harm (as disgruntled employees), or committing simple misuse. Sound policy enforcement and observant employees who guard their passwords and PCs can thwart many of these security breeches.

2) Rogue Access Points - Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) Rogue APs are most often connected by well-meaning but ignorant employees.

3) Back Doors - Hackers can gain access to a network by exploiting back doors‧administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in your network.

4) Viruses and Worms - Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.

5) Trojan Horses - Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the hacked software (SW) kicks off a virus, password gobbler, or remote-control SW that gives the hacker control of the PC.

6) Denial of Service - DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).

7) Anarchists, Crackers, and Kiddies - Who are these people, and why are they attacking I your network?

Anarchists are people who just like to break stuff. They usually exploit any target of opportunity.

Crackers are hobbyists or professionals who break passwords and develop Trojan horses or other SW (called warez). They either use the SW themselves (for bragging rights) or sell it for profit.

Script kiddies are hacker wannabes. They have no real hacker skills, so they buy or download warez, which they launch.

Other attackers include disgruntled employees, terrorists, political operatives, or anyone else who feels slighted, exploited, ripped off, or unloved.

8) Sniffing and Spoofing - Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.

Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.


Do Comment

Related Posts Plugin for WordPress, Blogger...
Back to TOP