About Hacking (by Naseema Shaikh)
What is Hacking?
-Gaining Unauthorized Access of any computers, system, software, account etc.
-Hacking Email ID.
-Stealing Credentials.
-Using someone Els's computer for malicious activity without having permission.
-Setting Up Spyware, Malware, ransomware
Why is it called hacking?
hacker was first used in the 1960s to describe a programmer or an individual who, in an era of highly constrained computer capability, could increase the efficiency of computer code in a way that removed, or hacked, excess machine code instructions from a program.
Why is Hacking
Increase in Hacking attacks.
secure system from hackers
Increasing demands of ethical hackers
job Opportunity is increasing day by day.
Types Of Hacking
-Black Hat Hacking
-White Hat Hacking
-Grey Hat Hacking
Black Hat Hacking
-A black hat is a computer hacker who violates laws or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice. The term originates from 1950s westerns, with "bad guys" typically depicted as having worn black hats and "good guys" wearing white ones.
-If you watch the news and keep up with technology. You know what a hacker is, but you may not realize hacker fall into different categories known as Black Hat, White Hat, Grey Hat.
-Black Hat hackers are criminals who break into computer networks with malicious intent. They may also release malware that destroys files, hold computers hostage, or steals password, credit card numbers, and other personal information.
-While hacking might have become a major intelligence gathering tool for governments, it's still more common for Black Hats to word alone or with organized crime organizations for ways money. The WannaCry ransomware released in May 2017 is one example, Within the first two weeks of its release, it infected approximately 400,000 computers in 150 countries. Fortunately, security experts released decryption tools within days of WannaCry appearance, and their fast response time limited extortion payments to about $120,000 - slightly more than 1 percent of the potential haul.
White Hat Hacking
A white hat (or a white-hat hacker, a Whitehat) is an ethical security hacker, Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has. the white hat is contrasted with the black hat, a malicious hacker; this definitional dichotomy comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat, respectively. There is a third kind of hacker known as a grey hat who hacks with good intentions but at times without permission.
-White hat hackers may also work in teams called "Sneakers and/or hacker clubs, red teams, or tiger teams.
Grey Hat Hacking
A grey hat (grey-hat or grey hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker.
The term came into use in the late 1990s and was derived from the concepts of "White hat" and "black hat" hackers. When a white hat hacker discovers a vulnebility, they will exploit it only permission and not divulge its existence until it has been fixed, whereas the black hat will illegally exploit it and/ or tell others how to do so. The grey hat will neither illegally exploit it, nor tell others how to do so.
A further difference among these types of hackers lies in their methods of discovering vulnerabilities. The white hat breaks into systems and networks at the request of their employer or with explicit permission for the purpose of determining how secure it is against hackers, whereas the black hat will break into any system or network in order to uncover sensitive information for personal gain. The grey hat generally has the skills and intent of the white hat but will break into any system or network without permission.
LAB OVERVIEW
Labs
-Kali Linux Machine as an attacker
-Windows virtual machine as a victim.
-Metasploit Machine for various penetration testing like App, Website, Webserver.
-Damn Vulnerable Web Application (DVWA) for OWASP Top 10 testing of website.
Comments