Hacking Article 3
Hacking Article 3
Series
Abstract: Almost all the people around the world are fully
equipped with technologies and software’s. But the how many are really using
it wisely, we as the creators of all technologies are being governed by such a
technology itself. The software’s are being discovered every day and each one
provides a new facility and a hidden disadvantage in it. Many people don’t even
have the basic knowledge of what they are doing and that’s the main reason for
all cyber-crimes and security breaches. It has become responsibility of every
citizen who is using a tech to keep their information safe and secure from others.
Be aware of what we are doing in mobiles, laptops, PCs, etc.… since a small
activity could lead to great crisis.
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd 1
International Conference on Robotics and Artificial Intelligence (RoAI) 2020 IOP Publishing
Journal of Physics: Conference Series 1831 (2021) 012004 doi:10.1088/1742-6596/1831/1/012004
Introduction
In today’s World, Technology plays a major a role. We are evolving and moving
in tech everyday also with the help of these technologies we have crossed many
milestones. But have you ever taught how far these technologies can go? What
are the limitations to these technologies? and what is happening in background
when we really use such a technology?
Certainly not, many people don’t take care of this. It is much more
important to be secure in every aspect we govern these technologies. And this
following paper will help you to be safe in governing technologies.
1. Hacking
Getting access to server without the knowledge of the user. The server
may be internet systems, personal computer, accessing main hub, etc... the
person who is doing such an activity is termed as hacker. There are different
types of Hackers around the world.
2
International Conference on Robotics and Artificial Intelligence (RoAI) 2020 IOP Publishing
Journal of Physics: Conference Series 1831 (2021) 012004 doi:10.1088/1742-6596/1831/1/012004
details, photos, videos and even nuclear launch codes too. They are called as
Black hat hackers.
2. Be an Ethical Hacker
In order to get rid of the cyber-crimes and to make our self-safe from these
crimes, we should know the some basic about the technology or software what
we are using. It is not necessary to be a hacker to stop these activities. We should
aware of what we are doing in our systems. If we want to be hacker, we should
be an Ethical Hacker.
Ethical hacker always get access into the systems by getting permission
from the user or organization. And found the loop holes in the systems and help
the organization to resolve it.
3
International Conference on Robotics and Artificial Intelligence (RoAI) 2020 IOP Publishing
Journal of Physics: Conference Series 1831 (2021) 012004 doi:10.1088/1742-6596/1831/1/012004
3.1.1 Confidential
It means that the information can be accessed only by authorized person. The
main aim of confidentiality is to safe the sensitive information from cyber
criminals. The privacy is usually maintained by Confidentiality.
Example: Encryption.
3.1.2 Availability
The information which we are requesting should be available only for us. This
provides us guarantee for accessing the information which we are seeking. We
4
International Conference on Robotics and Artificial Intelligence (RoAI) 2020 IOP Publishing
Journal of Physics: Conference Series 1831 (2021) 012004 doi:10.1088/1742-6596/1831/1/012004
should update all the source files and we should be ready with the recovery
options in case of loss of data.
3.1.3 Integrity
3.1.4 Authentication
It is used for the verification of data, whether it is genuine or not. This feature
allows only the authorized person could access the data for what he/she looks
for.
Example: Asking for login credentials for particular websites.
4. Hacking Stages
4.1 Reconnaissance
Active: It involves direct interaction with the target system to collect the
information. Example is using a Nmap tool.
5
International Conference on Robotics and Artificial Intelligence (RoAI) 2020 IOP Publishing
Journal of Physics: Conference Series 1831 (2021) 012004 doi:10.1088/1742-6596/1831/1/012004
4.2 Scanning
Port scanning: It involves scanning for information like open ports and
various services running on the target.
Network mapping: This involves in finding the trace route of network,
routers, firewalls and this helps the hacker to draw a map and which may
provide valuable information for breaching.
Vulnerability scanning: This scanning involves in finding all the
vulnerabilities to get access into systems.
It’s a third stage of getting access from the target system. It can be done
with the help of some tools or chronological methods. After getting access he
should raise his position to administrator level so that he can modify the entire
systems.
The person who involves in hacking the systems either for testing or for
stealing will have to be in a position to keep hold the access that he/she has
authorized. It can be done with some types of software’s and trojans. The
ultimate aim is to maintain the access until the job is done.
All person those who are involving in crimes will always don’t want to
caught up. A clever cyber attacker will always clear all the traces that leads the
way to trace him.
Examples: modifying the activity logs, deleting the folders that he created.
6
International Conference on Robotics and Artificial Intelligence (RoAI) 2020 IOP Publishing
Journal of Physics: Conference Series 1831 (2021) 012004 doi:10.1088/1742-6596/1831/1/012004
6. Penetration testing
It is testing that looks for security loop holes to exploit. An advance penetration
testing will look for all the loop holes and major issues in the systems. It may be
security issue such as vulnerable to steal sensitive information. It is done usually
a time dependent process and we cannot perform all the tests that we are
thinking. Even if we have done all the tests for a particular software, it is said
that the system is still not fully secured. It may be vulnerable to some more
attacks. The best practice in penetration testing is that to set a time limit and set
a priority to important tests.
Black box – The person who is penetrating will not be aware of any details
that what they are penetrating in.
Grey box – In this the tester will be provided with the minimal knowledge
about the systems
White box – The tester will be provided with all the knowledge of the
systems to be tested.
7
International Conference on Robotics and Artificial Intelligence (RoAI) 2020 IOP Publishing
Journal of Physics: Conference Series 1831 (2021) 012004 doi:10.1088/1742-6596/1831/1/012004
8
International Conference on Robotics and Artificial Intelligence (RoAI) 2020 IOP Publishing
Journal of Physics: Conference Series 1831 (2021) 012004 doi:10.1088/1742-6596/1831/1/012004
As said earlier we can block the spyware entering into our systems
rather cleaning it after being intruded into us. Keep update antivirus software
in order to achieve such protection.
Conclusion
As the Technologies develops the drawbacks also develops along with the
advantages. In today’s world even medical technology has many disadvantages.
We will be monitored every time even by google. As said Earlier we should be
aware of things what we are doing in software’s. And we should not allow the
9
International Conference on Robotics and Artificial Intelligence (RoAI) 2020 IOP Publishing
Journal of Physics: Conference Series 1831 (2021) 012004 doi:10.1088/1742-6596/1831/1/012004
References:
10
International Conference on Robotics and Artificial Intelligence (RoAI) 2020 IOP Publishing
Journal of Physics: Conference Series 1831 (2021) 012004 doi:10.1088/1742-6596/1831/1/012004
11