HACKING
edit
DEFINITION:-
edit- Hacking generally refers to unauthorized intrusion into a computer or a network. The person engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system.
- Hacking can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.
TYPES OF HACKERS:-
edit- BLACK HAT HACKERS:- Also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on.
- WHITE HAT HACKERS:- Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.
- GREY HAT HACKERS:- Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.
- GREEN HAT HACKERS:- These are the hacker “n00bz,” but unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories.
- RED HAT HACKERS:- These are the vigilantes of the hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.
- BLUE HAT HACKERS:- If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz, but like the Script Kiddies, they have no desire to learn.
PROGRAMMIMG LANGUAGE USED BY HACKERS:-
edit- The Programming Language Used By Hackers Is PYTHON.
- It's best, actually, to learn all five of Python, C/C++, Java, Perl, and LISP. Besides being the most important hacking languages, they represent very different approaches to programming, and each will educate you in valuable ways.
HACKING TOOLS:-
editThere are Different types of Hacking Tools used they are as follows :-
- NMAP:- Port Scanning,Service and OS Fingerprinting.
- WIRESHARK:- A Packet Analyzer.
- JOHN THE RIPPER:- A Password Cracker.
- AIRCRACK-NG:- A Software used for penetration Testing of Wireless LANs.
- HYDRA:- Brute Force Password Cracking Tool.
- MALTEGO:- Information on Visualization and relationship Analysis Tool.
- METASLOIT:- Framework for Developing and Executing Exploits.
- OWASP-ZAP:- Integrated Pentesting tool for Web Application.
- SQLMAP:- Finds SQL injection flaws for taking over of databases server.
- NOTE:- For further more information about History of Hacking like Places,People,etc. please refer this page HACKING.