"Hacking-": Submitted by
"Hacking-": Submitted by
On
Under Guidance Of
Miss. M.O. Sharma
Department of
YEAR-2016-2017
Department of
YEAR-2016-2017
Explore the system for bugs that might get them past the rules
or even take control of the whole system they would do these
things in order to be able to run the programs of their choice or
just to change the limitation under which their programs were
running. Since calling someone “hacker” was originally meant as
a compliment, computer security professionals prefer to use the
term “cracker” or similar “intruder” for those hackers who turn
dark sides of hacking. For clarity, we will use the explicit terms
“ethical hacker” and “criminal hacker”.
That is the good ones who are making use of their skills for good
purpose are called as “ethical hackers”
And the people who are making illegal use of their skills are
called has simply hacker or “crackers”.
TYPES OF HACKERS
SCRIPT KIDDIES
In programming and hacking culture, a script kiddie or
skiddie (other names include skid or script bunny is an unskilled
individual who uses scripts or programs developed by others to
attack computer systems and networks and deface websites. It is
generally assumed that script kiddies are juveniles who lack the
ability to write sophisticated programs or exploits on their own
and that their objective is to try to impress their friends or gain
credit in computer-enthusiast communities. However, the term
does not relate to the actual age of the participant. The term is
generally considered to be pejorative.
DoS attacks
Social engineering tactics
Security scanners such as:
o W3af
o Nessus
o Nexpose
Frameworks such as:
o Metasploit
The term began to be used in the late 1990s, derived from the
concepts of "white hat" and "black hat" hackers. When a white
hat hacker discovers a vulnerability, they will exploit it only with
permission and not divulge its existence until it has been fixed,
whereas the black hat will illegally exploit it and/or tell others
how to do so. The grey hat will neither illegally exploit it, nor tell
others how to do.
The phrase grey hat was first publicly used in the computer
security context when DEF CON announced the first scheduled
Black Hat Briefings in 1996, although it may have been used by
smaller groups prior to this time. Moreover, at this conference a
presentation was given in which Madge, a key member of the
hacking group L0pht, discussed their intent as grey hat hackers
to provide Microsoft with vulnerability discoveries in order to
protect the vast number of users of its operating system. Finally,
Mike Nash, Director of Microsoft’s server group, stated that grey
hat hackers are much like technical people in the independent
software industry in that “they are valuable in giving us feedback
to make our products better.
HACKTIVISM
The term was coined in 1994 by a Cult of the Dead Cow (cDc)
member known as "Omega" in an e-mail to the group. Due to
the variety of meanings of its root words, hacktivism is
sometimes ambiguous and there exists significant disagreement
over the kinds of activities and purposes it encompasses. Some
definitions include acts of cyber terrorism while others simply
reaffirm the use of technological hacking to affect social change.
Hacktivist activities span many political ideals and issues. Free net, a
peer-to-peer platform for censorship-resistant communication, is a
prime example of translating political thought (anybody should be
able to speak freely) into code.
Interruption
In an interruption, an asset of the system becomes lost, unavailable, or unusable.
Modification
If an unauthorized party not only accesses but tampers with an asset, the threat is a
modification. For example, someone might change the values in a database, alter a
program so that it performs an additional computation, or modify data being
transmitted electronically.
Fabrication
An unauthorized party might create a fabrication of counterfeit objects on a
computing system. The intruder may insert spurious transactions to a network
communication system or add records to an existing database.
Mastery
It is an complicated attack which is
performed by experts. And only hackers
can understand it...
Illicitness
It is an illegal attack, which is against of
all rules.
Advantages of Hacking
Hacking can be very useful if any important file
or information is lost, it can help to recover lost
data.
Hacking shows us that any kind of technical
device is not secure.
It can be very helpful to fight against terrorism
& national security breaches.
Disadvantages of Hacking…
Hacking is the illegal thing.
Hackers can destroy any type of important file
for their favour.
Enemy can use it to destroy someone’s privacy.
Criminals use it to do crimes all over internet.
Conclusion
Hackers are of good type and bad type but it
depends upon which path you choose.
Education doesn’t teaches bad things its human
they make choices.