Related Posts Plugin for WordPress, Blogger...

Hacking briefly described

Posted by VdoCity Tuesday, September 20, 2011

http://3.bp.blogspot.com/_Pvczjr_7004/TGu6Lfar4II/AAAAAAAAB0E/UXO3j17m144/s1600/hacking.jpgTHE MAJORITY OF PEOPLE IN THIS WORLD THINKING that piracy is illegal, but now I say that what is piracy?


In common usage, a hacker is a person who enters into the computer, usually through access to administrative controls.The subculture that has developed around hackers often referred to as the computer underground. Proponents claim to be motivated by artistic and political purposes, and are often concerned about the use of illegal means to achieve them.

Other uses of the word hacker to exist that are not related to information security (computer programmer and computer fans), but these are rarely used by major media. Some might argue that people who consider themselves hackers now are not pirates, as before the media describe the person who enters a computer hacker who was a community of hackers. This community was a community of people who had a keen interest in computer programming, often sharing, without limitation, software source code they wrote. These people now refer to the cyber-criminal hackers as "crackers".

HISTORY


Timeline of the history of hackers


Developed in conjunction with piracy "phone phreaking", a term that refers to the exploration of the telephone network without authorization, and has often been coincidence between technology and the participants. Bruce Sterling part traces the roots of the computer underground to the hippie counterculture movement in 1960 which published the Technology Assistance Program (TAP) newsletter.Other source hacker culture of the 70 principles can be traced towards more beneficial for piracy, including the laboratories of MIT or homebrew club, which later gave rise to such things as the first personal computers or the open source movement.

Artifacts and customs


The computer underground is very dependent on technology. It has produced its own slang and various forms of unusual alphabet use, for example 1337speak. Writing programs and other activities to support these views is known as hacktivism. Some go as far as seeing illegal cracking ethically justified to achieve this goal, the most common is the disfigurement website [citation needed] The computer underground is frequently compared to the wild West.It is common among hackers to use aliases for the purpose of concealing. identity, rather than revealing their real names.

Groups of hackers


Hacker group conference and hackers


The computer underground with the support of regular real-world gatherings called hackers conventions or "cons hacker". These drawn many people every year, including SummerCon (Summer), DEF CON, HoHoCon (Christmas), ShmooCon (February), Black Hat, Hacker stop and wait. [Citation needed] They have helped broaden the definition and strengthen the importance of the computer underground. [Citation needed]

PIRATES ATTITUDES
Several subgroups of the computer underground with different attitudes and aims to use different terms to define themselves to each other, or trying to exclude a specific group with which they disagree. Eric S. Raymond (author of The New Hacker's Dictionary) argues that members of the computer underground must be called crackers. However, people see themselves as hackers, and even try to include the views of Raymond on what they see as a hacker culture in general, a view sharply rejected by Raymond himself. Instead of a dichotomy hacker / cracker, give more emphasis to a spectrum of different categories such as white hat (ethical hacking), gray hat, black hat and script kiddie. In contrast to Raymond, usually reserve the term cracker to refer to black hat hackers, or more usually with unlawful intentions hackers.

White Hat

A white hat hacker breaks the security of non-malicious reasons such as testing your own security system. This type of hacker enjoys learning and working with computer systems, and thus get a deeper understanding of the topic. These people usually will use their hacking skills legitimate means, such as becoming a security consultant. "Hacker" originally included the word people like this, even though a hacker can not be someone in security.

GREY HAT

A gray hat hacker is a hacker of ambiguous ethics and / or limit the legality, often frankly admitted.

BLACK HAT

A black hat hacker, sometimes called "cracker" is someone who breaks computer security without authorization or uses technology (usually a computer, telephone system or network) for vandalism, credit card fraud , identity theft, hacking, or other illegal activity.

Kiddle SCRIPT

A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding. These are the pariahs of the hacker community.

Hacktivist

A hacktivist is a hacker who utilizes technology to announce a social message, ideological, religious or political. In general, most involve hacktivism website defacement or denial of service attacks. In more extreme cases, hacktivism is used as a tool for cyberterrorism. Hacktivists hackers are also known as Neo [citation needed].

EAVESDROPPI
A typical approach in an attack on the system connected to the Internet is:

Network enumeration:

The discovery of information about the target.
Vulnerability analysis:
Identify the possible forms of attack.
Exploitation:
The attempt to compromise the system through the use of the vulnerabilities found by the analysis of vulnerability [5].
To do so, there are several recurring tools of trade and the techniques used by cyber criminals and security experts.

EXPLIOT SAFETY

A security flaw is an application of preparations that exploits a known weakness. The most common examples of security attacks are SQL injection, Cross Site Scripting and Cross Site Request Forgery of security holes that abuse can result from poor programming practice. Other vulnerabilities could be used by FTP, HTTP, PHP, SSH, Telnet and some Web pages. These are very common in piracy website / domain.

Vulnerability Scanner

A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers usually use port scanners. These check that a certain computer ports are "open" or available to access the computer, and sometimes detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports / machines entry and exit, but can still escape.)

Packet Analyzer

A packet sniffer is an application that captures data packets that can be used to capture passwords and other data in transit on the network.

SPOOFING ATTACK

A phishing attack is a program, system or Web site posing as another success for falsification of data and therefore be treated as a trusted system by a user or another program. The purpose is usually to fool the programs, systems or users to disclose sensitive information such as usernames and passwords to the attacker.

ROOTKIT

A rootkit is designed to conceal the compromise of the security of a computer, and can represent any of a set of programs that work to subvert control of an operating system of its legitimate operators. Usually, a rootkit hides its installation and attempt to prevent its removal through a subversion of the standard security system. The rootkit may include replacements for system binaries to make it impossible for the legitimate user to detect the presence of the intruder into the system by looking at process tables.

Social engineering

Social engineering is the art of getting people to reveal confidential information about a system. This is usually done for impersonating someone or convince people to believe they have permission to obtain such information.

Trojan Horse

A Trojan is a program that seems to be doing one thing, but actually doing another. A Trojan horse can be used to create a backdoor on a computer system so that the intruder can access later. (The name refers to the horses of the Trojan War, with the function of conceptual similarity to deceive the defenders to the filing of an intruder inside.)

VIRUS

A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves like a biological virus, which spreads by inserting in living cells.

While some are harmless jokes or simple majority of computer viruses are considered malicious.

WORM

Like a virus, a worm is also a self-replicating. A worm differs from a virus that spreads on computer networks without user intervention. Unlike a virus, no need to join an existing program. Many people confuse the terms "virus" and "worm" with the two to describe any self-reproduction.

Key loggers

A keylogger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Generally, your goal is to allow the user of this tool to have access to confidential information written on the affected machine as a user's password or other private data. Some key loggers used by the virus, trojans, rootkits and other methods of staying active and hidden. However, some key loggers are used in a legitimate and sometimes even to improve computer security. For example, a company may have a keylogger on a computer that was used as a point of sale and data collected by the keylogger can be used to capture employee fraud.

0 comments

Post a Comment