100% found this document useful (1 vote)
62 views11 pages

Hackers World The Basics

Hackers World – the basics provides an introduction to hacking, including common tools and techniques. It discusses command prompt basics, denial of service attacks, popular forms of hacking like baiting and phishing. It also covers malware, ransomware, and potential jobs for "white hat" hackers who use their skills legally and ethically, such as security testing, IT teaching, and vulnerability testing.

Uploaded by

Paras Dorle
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
62 views11 pages

Hackers World The Basics

Hackers World – the basics provides an introduction to hacking, including common tools and techniques. It discusses command prompt basics, denial of service attacks, popular forms of hacking like baiting and phishing. It also covers malware, ransomware, and potential jobs for "white hat" hackers who use their skills legally and ethically, such as security testing, IT teaching, and vulnerability testing.

Uploaded by

Paras Dorle
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Hackers World the basics

Introduction Command prompt Denial of service (DOS) attacks Most used forms of hackin Mal!are and ransom!are "otential #obs for hackers

Introduction
Since the Internet started !ith the invention of electronic computers in the $%&'(s there has been hackers !ho e)ploit its uses* +nd still no! toda, as the internet is on a !ider ran e of devices and is a lot lar er and stron erhackers advanced !ith it makin there o!n technolo , to take do!n parts of it and take do!n others net!orks* .oda, not all hackers are the same- there are different t,pes of hackers (such as hacktivists- c,ber terroristssp, hackers- !hite and black hat hackers and various other t,pes) and !ith each different hacker the, have different motivations* .he most !ell kno!n hackers are hacktivists/ these hackers are motivated b, politics or reli ion (man, people ma, have heard of the hackin or ani0ation +non,mous- these hackers have been on the ne!s various times for shuttin do!n lar e companies temporaril, to e)pose there !ron 1doin *) With the Internet bein such a lar e part of most peoples lives hackin has become a federal offence and is punishable b, la!* +lthou h not all hackers are bad if so the Internet !ouldn(t e)ist due to the reason that hackers have the abilit, to create deadl, viruses and !ith S23 in#ection it has become simple to shut do!n sites* 4ood hackers are called !hite hat hackers- most of them are securit, e)perts !ho speciali0e in testin ho! to penetrate

sites and s,stems to ensure a compan,(s site and s,stem is secure* .hrou hout this e5ook I !ill e)plain to ,ou the basics of hackin since the !orld basicall, revolves around hackers so its important to et kno!led e on hackin *

Command prompt is the basic pro ram runnin behind ever, !indo!s computer- it is automaticall, put on ever, computer althou h some school or !ork place computers choose the option to block it because of its potential abilities to destro, a net!ork* If command prompt is blocked ,ou can easil, unlock it b, openin notepad and t,pin the follo!in then savin it as cmd*bat 6echo*off command command*com pause 7o! #ust open it and ,our command prompt is read, to o- belo! is a list of some of the basic commands that ,ou can use8 .o add a computer user8 7et user username pass!ord 9add .o delete a computer user8 7et user username 9del Chan e the te)t color 8(the number : can var,

Command "rompt

dependin on !hat color ,ou !ant) Color : Shutdo!n a computer connected to ,our net!ork8 echo off Shutdo!n I 7ote8 a !indo! !ill pop up click bro!se and select the computer ,ou !ant to shutdo!n* Disconnect a device connected to ,our net!ork8 Services*msc 7o! choose select a different computer and choose the one ,ou !ant to disconnect then o to D7S and stop the process* Sho! list of runnin pro rams .ree Disconnect Internet Ipconfi 9release "in a !ebsite "in !ebsite*com .here are much more commands ,ou can learn but these are #ust the basics of them* Command prompt has man, more abilities includin creatin viruses- makin a repeatin messa e- spammin or much more- to do these thin s #ust open notepad and t,pe the follo!in (dependin on !hich one ,ou !ant to do) ;epeatedl, open a messa e8

ms < an, messa e ms < an, other messa e as man, as ,ou !ant 4O.O5=4I7 Spammin a pro ram to open a lot of times Start Start Start Start Start Start Sa, start as much times as ,ou !ant cmd to open in different !indo!s* Cmd has man, more abilities ,ou can create includin makin viruses or dos attackers and much more*

Denial of Service (DOS) +ttacks


+ DOS attack is an attempt to make a !ebsite unavailable to its users b, spammin its server- hackers normall, use this to tar et hi h profile sites* Man, reat hackers reached there fame throu h takin do!n various sites usin DOS attacks althou h sendin DOS attacks is ille al so the, !ere punished for that* Man, famous tools have been made for that purpose includin 3OIC (3o! Orbit Ion Cannon) and HOIC (Hi h Orbit Ion Cannon) and those tools both !ork !ell e)cept 3OIC is sli htl, more advanced and po!erful* DOS attacks can also be sent usin cmd b, simpl, t,pin pin !ebsite*com t l >&&'' .he >&&'' part can be varied from '1>&&'' and the !ebsite*com part an, site can be put in* this attack #ust from cmd still have enou h po!er to brin do!n sites* .hese attacks can

also be used on a persons home net!ork if the I" address is kno!n #ust replace the !ebsite !ith the I" and it !ill overflo! the home net!ork and temporaril, brin it do!n* +s ,ou can see this is one of the most useful and ?uick !a,s to take do!n a site*

Most used forms of hackin


5aitin
5aitin is !hen someone preloads a @S5 !ith mal!are and then ives it to someone in the hopes the, !ill use it in there computer !hich enables the hacker to hack it*

Click1Aackin
Hidin 9concealin h,perlinks under le itimate clickable content on sites (for e)ample like or share buttons) !hich !hen clicked- the user unkno!in l, commits actions- !hich can include do!nloadin mal!are or sendin ,our I" to a person or site*

=licitation
.he use of conversation to take information from people !ithout them feelin like the, are bein interro ated*

Do)in
"ublicl, releasin a persons identif,in information*

Spoofin
Deceivin computer users b, hidin or fakin there identit,- the : most !ell kno!n forms of spoofin are email spoofin and I" spoofin *

Scams
Bake deals to trick people into enterin personal information such as bank detailscontact details- social net!orkin accounts or providin ,ou do a service in e)chan e for this deal (surve,s)*

Cross1Site Scriptin (CCS)


.his is !hen malicious code is in#ected into a beni n or trusted site/ there are : forms of this CCS attack- !hich are a stored CCS attackand a reflected CCS attack*

"harmin
;edirectin users from le itimate sites to fraudulent versions that look the same as the actual site- for the purpose of e)tractin confidential information*

"hishin
.his is normall, an email that looks as if it(s from a le itimate or ani0ation but is not and contains either a link or file containin mal!are*

"hreakin
.his is ainin unauthori0ed access to telecommunication s,stems* .here are man, more forms of hackin althou h these are the ones !hich are most used b, hackers*

Mal!are and ;ansom!are

Mal!are is infected pro rams- files- folders or various other thin s- that !hen do!nloaded or in#ected into ,our computer it infects it* .here are different forms of mal!are such as !ormstro#ans- and more* ;ansom!are is a pro ram that encr,pts all thin s on ,our computer and threatens do either destro, them or keep them encr,pted unless ,ou do somethin in

return for them like transfer mone, or complete a surve,* .hese are pro rammed b, hackers- the most famous !orm virus and also the first one !as the Morris !orm !hich !as named after its creator ;obert Morris* .here are man, !a,s to remove mal!are and ransom!are either manuall, (!hich takes a stron kno!led e on the computer s,stem) or a antivirus such as Mc+fee or 7orton*

"otential #obs for hackers


Hackers that hack for ood reasons are called !hite hat hackers- these t,pes of hackers can have various #obs !hich the, use there hackin skills some of there involve8

S,stem securit, test

I. teacher B5I computer e)pert Dulnerabilit, tester +nd much moreE


+ll the #obs listed above involve usin hackin skills includin most of the thin s listed throu hout this e5ook*

You might also like