Chapter 3. Lesson 5 Hacking
Chapter 3. Lesson 5 Hacking
WHAT IS HACKING?
It is an attempt to exploit
a computer system or a
private network inside a
computer. Simply put, it is
the unauthorized access
to or control over
computer network
security systems for some
illicit purpose.
WHAT IS A HACKER?
Someone who uses a
computer system to gain
unauthorized access to
another system for data or
who makes another system
unavailable. These hackers
will use their skills for a
specific goal, such as stealing
money, gaining fame by
bringing down a computer
system, or making a network
unavailable -- even sometimes
destroying them.
WHY DO HACKERS ATTACT?
1. Steal/Leak Information
2. Disrupt Services
3. Money
4. Driven by Purpose (Hacktivism, Idealism,
Political Motives)
1. STEAL/LEAK INFORMATION
White Hat - as opposed to the black hat, these are the “good guys”.
They are ethical hackers who create algorithms to break existing
internet networks so as to solve the loopholes in them.
Grey Hat - basically, these are hackers who exploit the internet
systems only to make public, certain vast datasets of information
that would be of benefit to everyone. They don’t possess the bad
intentions of black hats.
Script Kiddie - this refers to the newbies. They don’t cause excessive
damage; they use downloaded hacking software or purchased scripts to
bombard traffic sites or simply disrupt the regular activity of a website.
Green Hat - this is the set of individuals who simply want to observe
and learn about the world of hacking. It comprises those who join
learning communities to watch videos and tutorials about hacking.
Elite Hackers - these are individuals who are considered the “cutting-
edge geniuses”. They are the real experts and the innovators in the field of
hacking.
SIGNS YOUR PHONE MAY BE HACKED
Rootkits
Keyloggers
Vulnerability Scanner
ROOTKITS
It is a program or set of software
tools that allow threat actors to
gain remote access to control a
computer system that interacts
or connects with the internet.
Originally, a rootkit was
developed to open a backdoor in
a system to fix specific software
issues. Unfortunately, this
program is now used by hackers
to destabilize the control of an
operating system from its
legitimate operator or user.
KEYLOGGERS
This is a specially designed
tool that logs or records every
key pressed on a system.
Keyloggers record every
keystroke by clinging to the
API (application
programming interface) when
typed through the computer
keyboard. The recorded file
then gets saved, which
includes data like usernames,
website visit details,
screenshots, opened
applications, etc.
VULNERABILITY SCANNER
Classifies and detects various
system weaknesses in networks,
computers, communication
systems, etc. This is one of the
most common practices used by
ethical hackers to find potential
loopholes and fix them on an
immediate basis. On the other
hand, vulnerability scanners can
also be used by black-hat hackers
to check the system for potential
weak spots in order to exploit the
system.
COMMON HACKING TECHNIQUES
Waterhole attacks
Fake WAP
Phishing
ClickJacking Attacks
Cookie theft
1 – Metasploit Framework
2 – Nmap
3 – OpenSSH
4 – Wireshark
5 – Nessus
6 – Aircrack-ng
7 – Snort
8 – John the Ripper
9 – Google
10 – L0phtCrack
COMPUTER CRIMES
A person commits a “computer crime” when he or she:
1. Tracerouting
2. Reverse DNS Query
3. DNS
1.TRACEROUTING
This technique shows all the computers within the
range of a user and the target machine. Often the
hostname address listed in the last machine belongs
to the hacker's ISP Company. This way of resolving
the ISP enables to find out its location and the areas
where the hacker operates. This gives the clue of the
geographical location that eases investigations.
2. REVERSE DNS QUERY
DNS
This technique is the most effective way of tracing a
hacker. It helps to locate the country where the hacker
resides though the exact geographical location cannot
be determined without breaking into the ISP's Head
Office.
3. DNS
The 'Domain Name Server' are machines connected to
the Internet that keeps track of the IP Addresses and
Domain Names of other PCs. A DNS search takes the
'ASCII Domain Name' or simply the 'hostname' and
converts it into a numeric IP Address.
REFERENCES
Merriam Webster
https://www.merriam-webster.com/dictionary/cyber
Collins Dictionary, British English, American English
https://www.collinsdictionary.com/dictionary/english/securi
ty
International Telecommunications Union
https://www.itu.int/en/ITUD/Cybersecurity/Documents/Intr
oduction%20to%20the%20Concept%20of%20IT%20Security
.pdf
Kaspersky
https://www.kaspersky.com/resource-center/definitions/wh
at-is-cyber-security
Cisco Umbrella