HACKING :
Hacking is unauthorized use of computer and network resources.
HACKER:
a hacker is a person who breaks into computers, usually by gaining access to administrative controls
Hacker attitudes :
BLACK HAT:
he breaks computer security without authorization or uses technology (usually a computer, phone system or network) for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity.
WHITE HAT:
A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system.
This type of hacker enjoys learning and working with computer systems, and consequently gains a deeper understanding of the subject.
Such people normally go on to use their hacking skills in legitimate ways.
GREY HAT:
A grey hatted hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
Script kiddie :
A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding. These are the outcasts of the hacker community.
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message.
In general, most hacktivism involves website defacement or denial-of-service attacks.
Techniques used by computer criminals and security experts.
Vulnerability scanner :
A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses.
Hackers also commonly use port scanner.
These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number.
Password cracking:
Password cracking is the process of recovering password from data that has been stored in or transmitted by a computer system.
A common approach is to repeatedly try guesses for the password.
Packet sniffer :
A packet analyzer (also known as a network analyzer, protocol analyzer or sniffer, or for particular types of networks an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data stream flow across the network, the sniffer captures each packet and ,if needed, decodes and analyzes its content according to the appropriate RFC or other specifications.
Spoofing attack:
spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
Trojan horse :
A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later.
Virus
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus which spreads by inserting itself into living cells.
Worm
Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention
No comments:
Post a Comment