ETI
ETI
1
INDEX
1 Abstract 1
2 Introduction To Hacking 3
3 Types Of Hacking 4
4 What are the three main types of hackers? 5
5 Types of Cybercrime 6
6 Types of Ethical Hacking 7
7 Prevention from getting hacked 9-10
8 Advantages and Disadvantages 11
9 Conclusion 12
10 References 12
2
INTRODUCTION
Computers have become mandatory to run a successful business. It is not enough to have
isolated computers systems, they need to be networked to facilitate communication with
external businesses. This exposes them to the outside world and hacking. System hacking
means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing
corporate/personal data, etc. Cybercrimes cost many organizations millions of dollars every
year. Rusinesses need to protect themselves against such attacks.
Hacking refers to activities that seek to compromise digital devices, such as computers,
smartphones, tablets, and even entire networks. And while hacking might not always be for
malicious purposes, nowadays references to hacking, and hackers, characterize it them as
unlawful activity by cybercriminals motivated by financial gain, protest, information
gathering (spying), and even just for the "fun" of the challenge. A commonly used hacking.
definition is the act of compromising digital devices and networks through unauthorized
access to an account or computer system. Hacking is not always a malicious act, but it is most
commonly associated with illegal activity and data theft by cyber criminals.
Hacking in cyber security refers to the misuse of devices like computers, smartphones,
tablets, and networks to cause damage to or corrupt systems, gather information on users,
steal data and documents, or disrupt data-related activity. A traditional view of hackers is a
lone rogue. who is highly skilled in coding and modifying computer software and hardware
systems. But this narrow view does not cover the true technical nature of hacking. Hackers
are growing in sophistication, using stealthy attack methods designed to go. completely
unnoticed by cybersecurity software and IT teams. They are also highly skilled in attack
vectors that trick users into opening malicious attachments or links and freely giving up their
sensitive data.
Ethical hacking is a process that helps improve the security of computer systems by
identifying potential weaknesses and vulnerabilities during their testing. It is done by
professionals who have authorized access to the computer and networks to report loopholes
in the system of an organization to safeguard it from future attacks or malicious users. Ethical
hackers use the same techniques and tools that black hat hackers use except that they have the
authorization to report weak points in an organization's network or computing environment
while protecting the security privacy of that information.
3
Types of Hacking
Phishing
In this type of hacking, hackers' intention is to steal critical information of unlike account
passwords. MasterCard detail, etc. For example, hackers can replicate an original website for
users' interaction and can steal critical information from the duplicate website the hacker has
created.
Virus
These are triggered by the hacker into the filters of the website once they enter into it. The
purpose is to corrupt the information or resources on the net website.
UI redress
In this technique, the hacker creates a pretend interface and once the user clicks. with the
intent of progressing to a particular website, they are directed to a special website.
Cookie theft
Hackers access the net website exploitation malicious codes and steal cookies that contain
tips, login passwords, etc. Get access to your account then will do any factor besides your
account.
Distributed Denial-of-service(DDoS)
This hacking technique is aimed toward taking down a website so that a user cannot access it
or deliver their service. Gets the server down and stops it from responding, which may cause
a condition error constantly.
DNS spoofing
This essentially uses the cache knowledge of an internet website or domain that the user
might have forgotten keeping up to date. It then directs the data to a distinct malicious
website,
Social Engineering
Social engineering is an attempt to manipulate you to share personal info, sometimes by
impersonating a trustworthy supply.
Malware-Injection Devices
Cyber-criminals will use hardware to sneak malware onto your pe. You would have detected
infected USB sticks which can allow hackers remote access to your device when it is
connected to your pe.
4
What are the three main types of hackers?
5
Other types of hackers
Although nearly all hackers fall into one of the three categories (black hat, white hat, or gray
hat), there are other types and sub-types of hackers.
• Green hat hackers: green hat hackers are "green" in the sense that they're
inexperienced and may lack the technical skills of more experienced hackers. Green
hats may rely on phishing and other social engineering techniques to bypass security
systems.
• Blue hat hackers: blue hat hackers are white hat hackers who are actually employed
by an organization to help improve their security systems by conducting penetration
tests.
• Red hat hackers: Also known as vigilante hackers, red hat hackers are motivated by
a desire to fight back against black hat hackers, but they do this by infiltrating black
hat communities on the dark web and launching hacking attacks. against their
networks and devices.
6
Type of Cybercrime
Computer Fraud: Intentional deception for personal gain via the use of computer
systems.
Privacy violation: Exposing personal information such as email addresses, phone
number, account details, etc. on social media, hacking a website, etc.
Identity Theft: Stealing personal information from somebody and impersonating that
person.
Sharing copyrighted files/Information: This involves distributing copyright
protected files such as eBooks and computer programs etc.
Electronic funds transfer: This involves gaining an un-authorized access to hank
computer networks and making illegal fund transfers.
Electronic money laundering: This involves the use of the computer to launder
money.
ATM Fraud: This involves intercepting ATM card details such as account number
and PIN numbers. These details are then used to withdraw funds from the intercepted
accounts.
Denial of Attacks: This involves the use of computers in multiple locations to attack
servers with a view of shutting them down.
Spam: Sending unauthorized emails. These emails usually contain advertisements.
7
Introduction to Ethical hacking
Ethical Hacking tutorial provides basic and advanced concepts of Ethical Hacking. Our
Ethical Hacking tutorial is developed for beginners and professionals. Ethical hacking tutorial
covers all the aspects associated with hacking. Firstly, we will learn how to install the needed
software. After this, we will learn the 4 types of penetration testing section which is network
hacking, gaining access, post exploitation, website hacking.
In network hacking section, we will learn how networks work, how to crack Wi-Fi keys and
gain access the Wi-Fi networks. In Gaining access section, we will learn how to gain access
to the servers and personal computers. In the post-exploitation section, we will learn what can
we do with the access that we gained in the previous section. So, we learn how to interact
with the file system, how to execute a system command, how to open the webcam. In the
website. hacking section, we will learn how the website works, how to gather comprehensive
information about website. In the end, we will learn how to secure our system from the
discussed attacks.
CEH training online is a wonderful way to understand and implement the key concepts of
ethical hacking and ways to do it right. These training programs help you learn a wide range
of skills and methods to employ them and safeguard sensitive information on the internet.
This informative article will provide you with a detailed introduction to ethical hacking to
help you understand the associated key concepts. Besides, it will give a detailed
differentiation between ethical hackers and hackers with malicious intent.
8
Prevention from Getting Hacked
Software Update
Hackers are constantly on the lookout for vulnerabilities or holes in security that have not
been seen or patched. Therefore, updating software and operating systems are both crucial to
preventing users and organizations from getting hacked. They must enable automatic updates
and ensure the latest software version is always installed on all of their devices and programs.
HTTPS Encryption
Spoofed websites are another common vehicle for data theft, when hackers create a scam
website that looks legitimate but will actually steal the credentials that users enter. It is
important to look for the Hypertext Transfer Protocol Secure (HTTPS) prefix at the start of a
web address. For example: https://www.fortinet.com.
Change the Default Username and Password on Your Router and Smart Devices
Routers and smart devices come with default usernames and passwords. However, as
providers ship millions of devices, there is a risk that the credentials are not unique, which
heightens the chances of hackers breaking into them. It is best practice to set a unique
username and password combination for these types of devices. Protect Yourself Against
Hacking
9
There are further steps that users and organizations can take to
protect themselves against the threat of hacking.
Use a VPN
Using a virtual private network (VPN) allows users to browse the internet securely. It hides
their location and prevents hackers from intercepting their data or browsing activity.
10
Advantages of Hacking
Hacking is quite useful in the following scenarios -
❖ To recover lost information, especially in case you lost your password.
❖ To perform penetration testing to strengthen computer and network security.
❖ To put adequate preventative measures in place to prevent security breaches.
❖ To have a computer system that prevents malicious hackers from gaining access. This
helps to fight against cyber terrorism and to fight against national security breaches.
❖ This helps to take preventive action against hackers.
❖ This helps to build a system that prevents any kinds of penetration by hackers.
❖ This offers security to banking and financial establishments.
❖ This helps to identify and close the open holes in a computer system or network.
Disadvantages of Hacking
Hacking is quite dangerous if it is done with harmful intent. It can cause-
❖ Massive security breach.
❖ Unauthorized system access on private information.
❖ Privacy violation.
❖ system operation.
❖ Denial of service attacks.
❖ Malicious attack on the system.
❖ This may corrupt the files or data of an organization.
❖ They might use information gained for malicious use. Subsequently, trustful
programmers are expected to have achievement in this framework.
❖ By hiring such professionals will increase costs to the company. This technique can
harm someone's privacy. This system is illegal.
❖ It hampers system operation.
11
Conclusion
Our project is only a humble venture to satisfy the needs to manage their project work.
Several user-friendly coding has also adopted. This package shall prove to be a powerful
package in satisfying all the requirements of the school. The of planning is to provide a frame
work that enables the manger to make reasonable estimates made within a limited time frame
at the beginning of the software project and should be updated regularly as the project
progresses.
Reference
www.google.com
www.wikipidia.com
www.geeksforgeeks.org
12