What Really is Hacking?
Hacking
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of
the creator's original purpose.
The most fundamental meaning of hacking is gaining unauthorized access to data in a system or
computer.
Hacking is exploiting security controls either in a technical, physical or a human-based element. ~
Kevin Mitnick
The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle
and philosophy of their choice, is called a hacker.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer
security.
The mass attention given to blackhat hackers from the media cause the whole hacking term is often
mistaken for any security related cybercrime.
However, the word "hacking" has two definitions. The first definition refers to the hobby/profession
of working with computers. The second definition refers to modifies computer hardware or software
in a way that changes the creator's original intent.
It is the art of exploiting computers to get access to otherwise unauthorized information. Now that the
world is using IT systems to gather, store and manipulate important information there is also a need to
make sure that data is secure. However, no system is without is problems. Holes are often present
within security systems which, if exploited, allow hackers to gain access to this otherwise restrictedinformation.
- Purpose behind Hacking : When somebody tries to access other's computer systems with the aimof destroying or altering important information or data, such an activity is defined as hacking andthe person is called a hacker. It is believed that hacking activities are not backed by solid logicalreasons. On the contrary, hackers try to experiment with the computer brilliance by trying ofaffect other system with viruses. Hacking is done mostly for sheer pleasure by which a hackerwants to prove his skills. But if at all one searches for reasons behind it, it can be logicallyconcluded Hacking is carried out with the objective of tracing vital information and affectingcomputer systems with viruses.
-
- HackerHacker is a term used by some to mean "a clever programmer" and by others, especially those inpopular media, to mean "someone who tries to break into computer systems.CrackingCracking is the act of breaking into a computer system, often on a network. A cracker can be doingthis for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there.Some breaking-and-entering has been done ostensibly to point out weaknesses in a site's securitysystem.Contrary to widespread myth, cracking does not usually involve some mysterious leap of hackerlybrilliance, but rather persistence and the dogged repetition of a handful of fairly well-known tricksthat exploit common weaknesses in the security of target systems. Accordingly, most crackers areonly mediocre hackers. These two terms should not be confused with each others. Hackers generallydeplore cracking.CrackerA cracker is someone who breaks into someone else's computer system, often on a network; bypassespasswords or licenses in computer programs; or in other ways intentionally breaches computersecurity.
- Hacking as a Destructive ToolThe common stance on hacking with the average person is that it is morally wrong. There have beenseveral instances where hacking has proven to have caused problems. Hacking can create a variety ofdamages to people, groups and systems of broad spectrum. Negative Hacking Interactions:Identity Theft – Some hackers can gain access to sensitive information which could be used to fuelidentity theft. This identity theft can cause damages to credit ratings from consumer agencies, run-inswith the law because the person who stole the identity committed a crime, or other damages whichmay not be repairable at all.
- E-mail Access – Hackers have the ability to gain access to personal e-mail accounts. These can havea variety of information and other private files which most people would regard as important. Thisinformation could also hold sensitive data which could be used against someone or simply cause ruinfor those who are involved in the breach of privacy.
-
Website Security – Many websites have been victims of hackers. Usually the hackers would simplydestroy data and leave the websites in an inoperable state which would leave website owners withthe task of rebuilding their sites from scratch if they did not have a backup. This could also pose risksfor companies who had their consumer's payment information hosted on their websites. Defacing thewebsites by leaving tags or "calling cards" stating the unknown group's signature was not uncommonin the early days of hacking websites. - Hacking as a Political StatementSome hackers are out to get the government and show the vulnerabilities that the government has intrusting their systems too much.This is extremely illegal in the United States and other countries. This has led to some vulnerability insecurity systems to being fixed and made the government computer systems even stronger. Of course itis difficult to do this kind of hacking without a trace being left behind.Most if not all hackers who get into the government systems around the world are captured by thegovernment and punished for unauthorized access to their systems.
- Hacking as a Learning ToolHacking leads several people into the interest of creating newer, better software which canrevolutionize the electronic world.Although it is important to remember that hacking is a varied skill and those who have been hackingthe longest will have more success because they know how computers work and how they haveevolved over time.Ethical hackers use their knowledge to improve the vulnerabilities in systems, their hardware andsoftware. The ethical hackers come from a wide variety of different backgrounds.The best examples are from ex-malicious hackers who decide their purpose is to help preventdamages to companies by holes in their security. These companies pay their ethical hackershandsomely as they are providing a service which could be extremely useful in preventing damagesand loss.They can be hired by single companies who need advanced protection while others could be hired bysoftware designers who will reach millions of people around the world.
- Classificationvarious Kind of hacking
Computer Hackers have been around for so many years. Since the Computer and Internet became
widely used in the World, We have started to hear more and more about hacking.
As the word ‘Hacking’ has two meaning, so the word ‘Hacker’ is a word that has two meanings:
Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers
enjoy Exploring and Learning how Computer systems operate. They love discovering new ways to
work electronically.
Recently, Hacker has taken on a new meaning that someone who finds weaknesses in a computer or
computer network, though the term can also refer to someone with an advanced understanding of
computers and computer networks.
Normally, Hackers are people who try to gain unauthorized access to your computer.
With controversy, the term hacker is reclaimed by computer programmers who argue that someone
breaking into computers is better called a cracker, not making a difference between computer
criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that
they also deserve the title hacker, and that only black hats should be called crackers.
Classifications of Hacker
There are many more types of hackers in the world according to their motive and type of work. The
following list forwards one mote steps to better knowing hackers.
White hat hacker
The term "White hat hacker" refers to an ethical hacker, or a computer security expert, who
specializes in penetration testing and in other testing methodologies to ensure the security of an
organization's information systems. Ethical hacking is a term coined by IBM meant to imply a broader
category than just penetration testing. White-hat hackers are also called penetration tester, sneakers,
red teams, or tiger teams. Generally, White hat hackers or ethical hackers are the good guy in the
world of hackers.
A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach
or bypass internet security. Black hat hackers are also known as crackers or dark-side hackers. Thegeneral view is that, while hackers build things, crackers break things. They are computer security
hackers that break into computers and networks or also create computer viruses. The term “black hat”
comes from old westerns where the bad guys usually wore black hats.
Black hat hackers break into secure networks to destroy data or make the network unusable for those
who are authorized to use the network.
They choose their targets using a two-pronged process known as the "pre-hacking stage".
Step 1: Targeting
Step 2: Research and Information Gathering
Step 3: Finishing the Attack
Grey hat hacker
A grey hat hacker is a combination of a black hat and a white hat hacker. It may relate to whether they
sometimes arguably act illegally, though in good will, or to show how they disclose vulnerabilities.
They usually do not hack for personal gain or have malicious intentions, but may be prepared to
technically commit crimes during the course of their technological exploits in order to achieve better
security.
Blue hat
A blue hat hacker is someone outside computer security consulting firms who is used to bug test a
system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term
BlueHat to represent a series of security briefing events.
Elite hacker
A social status among hackers, elite is used to describe the most skilled. Newly discovered activities
will circulate among these hackers.
Script kiddie
A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre-packaged
automated tools written by others, usually with little understanding of the underlying concept hence
the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child an individual lacking
knowledge and experience, immature).
Neophyte “newbie”
A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no
knowledge or experience of the workings of technology, and hacking.
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or
political message. In general, most hacktivism involves website defacement or denial-of-service
attacks.
Nation stateIt refers to Intelligence agencies and cyber warfare operatives of nation states.
Organized criminal gangs
Criminal activity carried on for profit.
Bots
Automated software tools, some freeware, available for the use of any type of hacker.
1 comment:
Nice 🔥🔥🔥🔥
Post a Comment