Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

 THE WORLD OF HACKING

1.What is a hacker :
In common usage, a hacker is a person who breaks into computers and computer networks, either
for profit or motivated by the challenge. The subculture that has evolved around hackers is often
referred to as the computer underground but is now an open community.

Other uses of the word hacker exist that are not related to computer security (computer programmer
and home computer hobbyists), but these are rarely used by the mainstream media because of the
common stereotype that is in TV and movies. Before the media described the person who breaks
into computers as a hacker there was a hacker community. This group was a community of people
who had a large interest in computer programming, often sharing, without restrictions, the source
code for the software they wrote. These people now refer to the cyber-criminal hackers as
"crackers".

2.The history :

In today's society understanding the term Hacker is complicated because it has many different
definitions. The term Hacker can be traced back to MIT (Massachusetts Institute Technology). MIT
was the first institution to offer a course in computer programming and computer science and it is
here in 1960 where a group of MIT students taking a lab on Artificial Intelligence first coined this
word. These students called themselves hackers because they were able to take programs and have
them perform actions not intended for that program. “The term was developed on the basis of a
practical joke and feeling of excitement because the team member would “hack away” at the
keyboard hours at a time.” (Moore R., 2006).

Hacking developed alongside "Phone Phreaking", a term referred to exploration of the phone
network without authorization, and there has often been overlap between both technology and
participants. The first recorded hack was accomplished by "Joe Engressia" also known as The
Whistler. Engressia is known as the grandfather of Phreaking. His hacking technique was that he
could perfectly whistle a tone into a phone and make free call.[5] Bruce Sterling traces part of the
roots of the computer underground to the Yippies, a 1960s counterculture movement which
published the Technological Assistance Program (TAP) newsletter. Other sources of early 70s
hacker culture can be traced towards more beneficial forms of hacking, including MIT labs or the
homebrew club, which later resulted in such things as early personal computers or the open source
movement.
3.Type of hackers :

White hat :

A white hat hacker breaks security for non-malicious reasons, for instance testing their own security
system. This classification also includes individuals who perform penetration tests and vulnerability
assessments within a contractual agreement. Often, this type of 'white hat' hacker is called an ethical
hacker. The International Council of Electronic Commerce Consultants, also known as the EC-
Council has developed certifications, courseware, classes, and online training covering the diverse
arena of Ethical Hacking.

Black hat :

A black hat hacker, sometimes called "cracker", is someone who breaks computer security without
authorization or uses technology (usually a computer, phone system or network) for vandalism,
credit card fraud, identity theft, piracy, or other types of illegal activity.

Grey hat :

A gray hat hacker is a combination of a Black Hat Hacker and a White Hat Hacker. A Grey Hat Hacker will
surf the internet and hack into a computer system for the sole purpose of notifying the administrator that
their system has been hacked. Then they will offer to repair their system for a small fee.

Blue Hat :

A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system
prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to
represent a series of security briefing events.

Elite :

Elite is a term used to describe the most advanced hackers who are said to be on "the cutting edge"
of computing and network technology. These would be individuals in the earliest 2.5 percentile of
the technology adoption lifecycle curve, referred to as "innovators." As opposed to script kiddies
and noobs who utilize and exploit weaknesses in systems discovered by others, elites are those who
bring about the initial discovery.

Neophyte :

A neophyte or "newbie" is a term used to describe someone who is new to hacking or phreaking and
has almost no knowledge or experience of the workings of technology, and hacking.

Hacktivism

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or


political message. In general, most hacktivism involves website defacement or denial-of-service
attacks. In more extreme cases, hacktivism is used as tool for Cyberterrorism.
3.HACKER METHODS :

Security exploit :

A security exploit is a prepared application that takes advantage of a known weakness. Common
examples of security exploits are SQL injection, Cross Site Scripting and Cross Site Request
Forgery which abuse security holes that may result from substandard programming practice. Other
exploits would be able to be used through FTP, HTTP, PHP, SSH, Telnet and some web-pages.
These are very common in website/domain hacking.

Password cracking

Password cracking is the process of recovering passwords from data that has been stored in or transmitted by
a computer system. A common approach is to repeatedly try guesses for the password.

Packet sniffer :

A packet sniffer is an application that captures data packets, which can be used to capture passwords and
other data in transit over the network.

Trojan horse :

A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A
trojan horse can be used to set up a back door in a computer system such that the intruder can gain
access later. (The name refers to the horse from the Trojan War, with conceptually similar function
of deceiving defenders into bringing an intruder inside.)

Virus :

A virus is a self-replicating program that spreads by inserting copies of itself into other executable
code or documents. Therefore, a computer virus behaves in a way similar to a biological virus,
which spreads by inserting itself into living cells.
While some are harmless or mere hoaxes most computer viruses are considered malicious.

Worm

Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it
propagates through computer networks without user intervention. Unlike a virus, it does not need to
attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them
both to describe any self-propagating program.

You might also like