0% found this document useful (0 votes)
66 views

Hacking Ipc

Hacking involves unauthorized access to computer systems and can be done for both malicious and non-malicious reasons. There are six main types of hackers: white hat hackers who perform ethical hacking, black hat hackers who hack with malicious intent, red hat hackers who target black hat hackers, grey hat hackers whose goals may be good but don't always use ethical techniques, blue hat hackers who hack for personal reasons outside of job scope, and green hat hackers who are still learning hacking skills. Common hacking methods include denial of service attacks, spoofing, phishing, use of keyloggers, SQL injection attacks, man-in-the-middle attacks, cross-site scripting, and cyber stalking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Hacking Ipc

Hacking involves unauthorized access to computer systems and can be done for both malicious and non-malicious reasons. There are six main types of hackers: white hat hackers who perform ethical hacking, black hat hackers who hack with malicious intent, red hat hackers who target black hat hackers, grey hat hackers whose goals may be good but don't always use ethical techniques, blue hat hackers who hack for personal reasons outside of job scope, and green hat hackers who are still learning hacking skills. Common hacking methods include denial of service attacks, spoofing, phishing, use of keyloggers, SQL injection attacks, man-in-the-middle attacks, cross-site scripting, and cyber stalking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Hacking

• Hacking is unauthorized access to a system .


• Hacking is defined in section 66 of the IT Act 2000.
• It is the wrongful laws over harm to any public or private system which deletes
destroys or modifies The information contained in any system or lowers its value
or utility or affects It injuriously by any means.
• A person who does hacking is known as a hacker and a person who hacks with
malicious intention is known as a cracker
• Hackers are classified into six types and they are:-
1.White hat hackers or ethical hackers
They are often government backed security professionals or cyber
experts who does hacking for protection of the security of the nation and privacy
of others .
2. Blackhat hackers
The Blackhat hackers makes unauthorized access to the systems with
malicious intentions they often use to steal the data or to exhort people or to
breach the privacy of the users.
The black hat hackers often cause damages to the system and the users.
3. Red hat hackers
the red hackers are those hackers who makes unauthorized access to the
systems of Black Hat hackers to destroy their servers. Hence Red Hat hackers are
known as the Robin Hoods of computer hacking.
4. Greyhound hackers
Hackers who break into the system for sometimes good purposes are known
as Grey hat Hackers their goals are often good but they do not always use ethical
hacking techniques this is a category that lies between white hats and black hats.
5. Blue hat hackers
Those hackers who access the system for personal vengeance or security experts
who operates outside the business that is performing of penetration tests or
similar tests to access the vulnerabilities in the organization’s cyberspace.
6. Green hat hackers
They are hackers who are trying to master in hacking techniques.
Script Kiddies they are a subset of Greenhat hackers who are less interested in
studying hacking methods and more interested in obtaining scripts malware and
softwares used for hacking.
Hacking methods
1. Denial of services
2. Spoofing.
3. Phishing .
4. Key logger.
5. SQL ingestion attack.
6. Man in the middle attack/ Session hijacking
7. Cross site scripting.
8. Cyber stalking/ Cyber bullying
9. Cyber trespass
10. Cyber terrorism
Denial of service attacks
• DOS is a cyber attack designed to bring the system or network into a halt
rendering it unreachable to the indented users.
• It is normally done by flooding the targeted machine with requests until the
normal traffic is unavailable to be processed.
• A DOS attack is characterized by a single computer to launch the attack.
• A distributed denial of service attack is a type of DOS attack that comes from
many distributed sources such as botnets.
• Typically the DOS attacks are classified into two
1. Buffer overflow attacks It is a type of attack in which Hold the available space
in a hard disk is consumed this results in sluggish behavior or crash of the
system resulting in denial of services.
2. Flood attacks is done by saturating the targeted server with an overwhelming
amount of packets. The capacity of the server is over saturated resulting in
the denial of services
• Spoofing technique where a hacker imitates or pretends to be another person
organization software or a website this comes with the intention of bypassing the
target security protocols in order to gain access to the information that a hacker
wants to get.
1. IP Spoofing
Is the process of replacing the source IP address with a fake IP address from the IP
packets to hide the real identity of the sender.
The source address is the address of the computer that the packet was sent from so by
changing the address in the packet an attacker can make it appear that the packet was
sent by different computer system.
2.E-Mail spoofing.
A hacker sends an email that has been altered to appear to have come from a
reliable source like banks.
3.URL Spoofing.
A hacker develops a phony website/URL it appears to be real and hacker then obtains
your credential when you log in with your username and password.
Phishing
Phishing is a cybercrime in which the attackers deceive the victims to reveal their
sensitive information
Phishing also happens through installing malware such as ransomwares.
Types of Phishing
1. Spear phishing
It is a Phishing in which the target is a specific individual.
2.Vishing
It is Phishing done by video or voice calls.
3.Smishing.
Phishing done through SMS. The SMSs contain certain links that may divert the
users.
4.Pharming
Redirecting users to Malicious sites by compromising the DNS
• Keylogger
• It is an activity monitoring tool that captures all keystrokes on a keyboard and is
used to record sensitive information such as password credit card numbers etc.
• Cyber Stalking.
Cyber stalking is the equivalent of stalking.
Harassing or threatening someone by any viable means.
It has significant mental and physical impact on the victim.
IT out of 2000 does not directly address the offenses of cyber stalking.

You might also like