Skip to main content

An Overview of Hacking

An Overview of Hacking

To your average computer user who doesn’t understand much about Internet and network security,

hackers are shrouded in a cloud of mystery. 

Most people don’t understand what they do or how they do it. And the movies don’t help to demystify them, either. 

Countless action movies portray a character that takes the role of a hacker that can break into top secret computer systems to save the world. When the camera pans over their computer screens, you see them typing strange letters and numbers into a command prompt that, for all you know, is a foreign language. Humorously enough, the hackers in the movies frequently use a tool called NMAP, . 

If you’ve seen The Matrix Reloaded, Dredd, Fantastic Four, Bourne Ultimatum, Die Hard 4, or The Girl With The Dragon Tattoo (among countless others), you have already seen actors using NMAP to facilitate their hacking endeavors in the movies. 

 But what exactly is hacking?

Hacking means a lot of different things to a lot of different people. It is an umbrella term used to describe hundreds, 

if not thousands, of various techniques that can be utilized to use computers and information systems in unintended ways. At its core, hacking means using a computer to gain unauthorized access to another computer system or data that is protected or restricted. This is the most conventional meaning of the word hacking. Once a hacker has gained access to an unauthorized system, he or she then has the ability to steal information, change configurations, alter information, delete information, and install further malicious code to capture even greater control over the target system. The list goes on and the sky is the limit regarding what an experienced hacker can do once they find a way into a computer system.

However, there is a lot more to hacking than clicking a button to attack a computer. You will need to use tools and scanners to map the local network

topology and use reconnaissance techniques to gather information and look for vulnerabilities. The good news for newbies is that these tools are highly automated today. In the past, hacking software hadn’t been created that aggregated vast amounts of code and tools into simple and easy to use commands. As such, hackers in the past needed highly intimate understandings of the technologies they were trying to break and it was difficult to do so. Having an extremely deep understanding of technology today will certainly help you become a better hacker, but my point is that these tools are becoming increasingly easy to use. In fact, there are young kids and teenagers that are too curious for their own good and take advantage of highly sophisticated tools to break into systems they have no business accessing. Understand that these tools simplify the hacking process considerably. If a teenager can hack into a system using simple tools, guess what? You can too! 

But what does it take to excel as a hacker?

 Well, most hackers have several things in common. First of all, they are experienced software developers and can craft malicious programs and viruses that further their cause. Furthermore, most hackers are competent Linux users. Linux operating systems are extremely secure and provide virtually limitless access to the latest penetration and security tools – for free! In addition, some Linux operating systems such as Kali Linux were designed for the sole purpose of hacking and network penetration. Linux can be scary for newbies, but I will show you how to run Linux and use some special tools later in this book in a simplified and easy to understand manner. Lastly, hackers almost always have a working knowledge of networking topics such as IP addresses, ports, and the dirty details of how different networking protocols operate. Some tools even exploit vulnerabilities in these network protocols, and the knowledge of these exploits combined with the ability to craft computer programs is what makes some hackers truly formidable.



Comments

Popular posts from this blog

INTRODUCTION TO CYBER CRIME

What is Cybercrime? Cybercrime is defined as an unlawful action against any person using a computer, its systems, and its online or offline applications. It occurs when information technology is used to commit or cover an offense. However, the act is only considered Cybercrime if it is intentional and not accidental. 👉   Example of Cybercrime Here, are some most commonly occurring Cybercrimes: The fraud did by manipulating computer network Unauthorized access to or modification of data or application Intellectual property theft that includes software piracy Industrial spying and access to or theft of computer materials Writing or spreading computer viruses or malware Digitally distributing child pornography Cybercrime Attack Types Cybercrime can attack in various ways. Here, is some most common cybercrime attack mode Hacking: It is an act of gaining unauthorized access to a computer system or network. Denial Of Service Attack: In this cyberattack, the cyber-criminal uses the ...

10 Most Common Web Security Vulnerabilities

  OWASP or Open Web Security Undertaking is a non-benefit beneficent association zeroed in on improving the security of programming and web applications .  The association distributes a rundown of top web security weaknesses dependent on the information from different security associations.  The web security weaknesses are organized relying upon exploitability, perceptibility and effect on programming. Exploitability – What is needed to exploit the security vulnerability? Highest exploitability when the attack needs only web browser and lowest being advanced programming and tools. Detectability – How easy is it to detect the threat? Highest being the information displayed on URL, Form or Error message and lowest being source code. Impact or Damage – How much damage will be done if the security vulnerability is exposed or attacked? Highest being complete system crash and lowest being nothing at all. The main aim of OWASP Top 10 is to educate the developers, designers,...