HOW TO HACK COMPUTER
According to Computer Crime Research Center (US), “Hacking is unauthorized use of computer and network resources”.
•Who is a hacker?
A hacker is a gifted programmer; a programmer for whom computing is its own reward and also enjoys the challenge of breaking into other computers, networks, cracking applications, etc.
•How the hacker can hack a system?
Hackers hack by exploiting the weaknesses of the target system, network, etc, for poor configuration applications and web servers, unpatched or old software, poorly chosen or default passwords and disabled security controls.
•Why hack at all?
Hackers hack because they want it that way. There is no specific reason why they do that. Some does hacking to test their computer skills, others do that to steal specific data from the target. Once a vulnerable point is identified in the system, they definitely attempt to hack to try to gain administrative access to the machine.
•Different types of hackers
The different types of hacker are
1.WhiteHats are the hackers that try to make the movement go forward by working as system administrators, security experts and by maintaining web sites with new technologies, news events, bug reports, and much more.
2.Black hackers attack other’s systems; whereas White hackers do exactly opposite i.e., defend against attacks.
3.Crackers penetrate networks and try to take advantage of something they discover in the process; they are really malicious.
4.Script Kiddie, does not really possess any skills except for the tools, uses tools and techniques developed by WhiteHats, BlackHats and Crackers to deface sites, destroy information, and do other types of digital-vandalism.
•Basic Hacking Methodology
The basic steps for any hacking methodology are
1.Information gathering (Probe)
2.Attack (Advancement & Entrenchment)
3.Infiltration or Extraction
•Most Prevalent Hacking Attack Categories
Hackers preferably attack the organizations systems infrastructure and commercial applications. If the systems are well secured then the hacker may resort to social engineering or focus upon the target application vulnerabilities.
The most prevalent attack categories are
1.Exploitation of Application-related privileges: Some server-based applications run with specific User or group permissions. By using Race conditions or Buffer overflow attacks these applications’ security can be compromised.
2.Client-side manipulation: Hackers bypass client-side validations by supplying incorrect data formats or data to the server in an attempt to reveal both the functionality and secured data.
3.Race Conditions: When the coding is not done properly for an application to access specific variables, files, and data or installed the appropriate checks to implement simultaneous accesses then the hacker can get unintended access to data through both trusted and untrusted server application components.
•Cyber attacks: What are they?
Cyber attacks happen on a nation-wide scale and includes clogging up the adversary country’s computers which handle sensitive information like logistics, communications, war strategies, shutting down their civil utilities, like national power grid, jamming radar sites, crushing military’s computers, and downing commercial websites, etc.
There are so many tools available in the Net and also in the market using which anybody can do the basic hacking. A few tools are
1.DSniff -- a suite of programs that can be used in penetration and auditing testing.
2.Ethereal -- the widely used network protocol analyzer.
3.AirSnort -- a wireless LAN (WLAN) tool which recovers encryption keys.
4.Netcat -- a simple Unix utility which writes and reads data across network connections, using UDP or TCP protocol.
•Hacking in day-to-day life
To name a few…
•The key to winning the war against hackers…
The first step is to know both the state of one’s own network and its vulnerabilities and also the tactics hackers employ and deploy. Strategic analysts proclaim the key, to escape being hacked by somebody, is network security. But again, unfamiliarity of hacker’s activities and ignorance of how to deploy firewalls and other security features effectively can make you the hacker’s favorite target.
“Hope for the best and plan for the worst” should be the motto in drawing strategies against hackers.
- Obi Alligator S454 price in India
- Xolo Q1100 Price in India
- XOLO Q800 X-Edition Price in India
- Gionee GPAD G2 price in India
- Salora FonTab price in India
- Nikon D7100 DSLR Price in India
- Intel XOLO X500 Price in India
- Idea Ivory Price in India
- Doro PhoneEasy 740 Price in India, Doro PhoneEasy 740 Features 5MP Camera
- Beetel GD777 Price in India, Beetel GD777 Features FM Radio, Music player