Hacking involves unauthorized access to computer systems and can be done for both malicious and non-malicious reasons. There are six main types of hackers: white hat hackers who perform ethical hacking, black hat hackers who hack with malicious intent, red hat hackers who target black hat hackers, grey hat hackers whose goals may be good but don't always use ethical techniques, blue hat hackers who hack for personal reasons outside of job scope, and green hat hackers who are still learning hacking skills. Common hacking methods include denial of service attacks, spoofing, phishing, use of keyloggers, SQL injection attacks, man-in-the-middle attacks, cross-site scripting, and cyber stalking.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
66 views
Hacking Ipc
Hacking involves unauthorized access to computer systems and can be done for both malicious and non-malicious reasons. There are six main types of hackers: white hat hackers who perform ethical hacking, black hat hackers who hack with malicious intent, red hat hackers who target black hat hackers, grey hat hackers whose goals may be good but don't always use ethical techniques, blue hat hackers who hack for personal reasons outside of job scope, and green hat hackers who are still learning hacking skills. Common hacking methods include denial of service attacks, spoofing, phishing, use of keyloggers, SQL injection attacks, man-in-the-middle attacks, cross-site scripting, and cyber stalking.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9
Hacking
• Hacking is unauthorized access to a system .
• Hacking is defined in section 66 of the IT Act 2000. • It is the wrongful laws over harm to any public or private system which deletes destroys or modifies The information contained in any system or lowers its value or utility or affects It injuriously by any means. • A person who does hacking is known as a hacker and a person who hacks with malicious intention is known as a cracker • Hackers are classified into six types and they are:- 1.White hat hackers or ethical hackers They are often government backed security professionals or cyber experts who does hacking for protection of the security of the nation and privacy of others . 2. Blackhat hackers The Blackhat hackers makes unauthorized access to the systems with malicious intentions they often use to steal the data or to exhort people or to breach the privacy of the users. The black hat hackers often cause damages to the system and the users. 3. Red hat hackers the red hackers are those hackers who makes unauthorized access to the systems of Black Hat hackers to destroy their servers. Hence Red Hat hackers are known as the Robin Hoods of computer hacking. 4. Greyhound hackers Hackers who break into the system for sometimes good purposes are known as Grey hat Hackers their goals are often good but they do not always use ethical hacking techniques this is a category that lies between white hats and black hats. 5. Blue hat hackers Those hackers who access the system for personal vengeance or security experts who operates outside the business that is performing of penetration tests or similar tests to access the vulnerabilities in the organization’s cyberspace. 6. Green hat hackers They are hackers who are trying to master in hacking techniques. Script Kiddies they are a subset of Greenhat hackers who are less interested in studying hacking methods and more interested in obtaining scripts malware and softwares used for hacking. Hacking methods 1. Denial of services 2. Spoofing. 3. Phishing . 4. Key logger. 5. SQL ingestion attack. 6. Man in the middle attack/ Session hijacking 7. Cross site scripting. 8. Cyber stalking/ Cyber bullying 9. Cyber trespass 10. Cyber terrorism Denial of service attacks • DOS is a cyber attack designed to bring the system or network into a halt rendering it unreachable to the indented users. • It is normally done by flooding the targeted machine with requests until the normal traffic is unavailable to be processed. • A DOS attack is characterized by a single computer to launch the attack. • A distributed denial of service attack is a type of DOS attack that comes from many distributed sources such as botnets. • Typically the DOS attacks are classified into two 1. Buffer overflow attacks It is a type of attack in which Hold the available space in a hard disk is consumed this results in sluggish behavior or crash of the system resulting in denial of services. 2. Flood attacks is done by saturating the targeted server with an overwhelming amount of packets. The capacity of the server is over saturated resulting in the denial of services • Spoofing technique where a hacker imitates or pretends to be another person organization software or a website this comes with the intention of bypassing the target security protocols in order to gain access to the information that a hacker wants to get. 1. IP Spoofing Is the process of replacing the source IP address with a fake IP address from the IP packets to hide the real identity of the sender. The source address is the address of the computer that the packet was sent from so by changing the address in the packet an attacker can make it appear that the packet was sent by different computer system. 2.E-Mail spoofing. A hacker sends an email that has been altered to appear to have come from a reliable source like banks. 3.URL Spoofing. A hacker develops a phony website/URL it appears to be real and hacker then obtains your credential when you log in with your username and password. Phishing Phishing is a cybercrime in which the attackers deceive the victims to reveal their sensitive information Phishing also happens through installing malware such as ransomwares. Types of Phishing 1. Spear phishing It is a Phishing in which the target is a specific individual. 2.Vishing It is Phishing done by video or voice calls. 3.Smishing. Phishing done through SMS. The SMSs contain certain links that may divert the users. 4.Pharming Redirecting users to Malicious sites by compromising the DNS • Keylogger • It is an activity monitoring tool that captures all keystrokes on a keyboard and is used to record sensitive information such as password credit card numbers etc. • Cyber Stalking. Cyber stalking is the equivalent of stalking. Harassing or threatening someone by any viable means. It has significant mental and physical impact on the victim. IT out of 2000 does not directly address the offenses of cyber stalking.