0% found this document useful (0 votes)
14 views19 pages

HACKING

The document provides a comprehensive overview of hacking, including its definition, history, types, phases, and various hacker categories. It discusses the evolution of hacking from early telephone pranks to modern cybersecurity threats and outlines the roles of different types of hackers, such as white hat, black hat, and gray hat hackers. Additionally, it details the phases of hacking, including reconnaissance, scanning, gaining access, and maintaining access.

Uploaded by

Claire Mangapan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views19 pages

HACKING

The document provides a comprehensive overview of hacking, including its definition, history, types, phases, and various hacker categories. It discusses the evolution of hacking from early telephone pranks to modern cybersecurity threats and outlines the roles of different types of hackers, such as white hat, black hat, and gray hat hackers. Additionally, it details the phases of hacking, including reconnaissance, scanning, gaining access, and maintaining access.

Uploaded by

Claire Mangapan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

HACKING

06/06/2023
 The art of examining the private
things that are being private from
general usage and discovering
loopholes in the security and
facilitating them to benefit others.
DEFINITIO Hacking is the procedure
discovering vulnerabilities in a
of

N system and using these found


vulnerabilities to boost unauthorized
access into the system to implement
malicious activities ranging from
eliminating system files to stealing
sensitive data.
 1878 – First case of hacking was recorded.
Shortly after the invention of the telephone
and only two years after the start of

BRIEF
Alexander Graham Bell’s famous telephone
company, young phone operators pranked
callers by switching telephone lines.
HISTOR  1960 - one of the first popularized hacks,
again associated with telephones, was
Y known as phreaking. Phreaking is where
an individual uses a whistle or other high
pitch noise to trick a phone into receiving
operational commands and thus changing
the behavior of the telephone system.
 1970’s – After the popularization of early
computers. With government agencies
utilizing these new technologies, the Air
Force commissioned the first-ever pen test of
their systems in 1971. These teams of highly
technical specialists became known as “Tiger
Teams” and were one of the earliest types of
hackers.
 1980’s – The world of hacking advanced far
enough for Congress to take action with the
passage of the Computer Fraud and Abuse
Act, which to this day remains a topic of
debate. As computers became more popular
and started to go mainstream with major
corporations, and eventually personal
computers became the norm, so did hacking.
1990’s - one of the
first and most famous
hacker trials took
place with none other
than the number one
hacker on our list of
famous hackers.
 Network Hacking − Network
hacking defines gathering data
about a network with the
determination to harm the network

TYPE system and hamper its services


using multiple tools such as Telnet,
NS lookup, Ping, Tracert, etc.
S  Website hacking − Website
hacking defines taking unauthorized
access over an internet server,
database and developing a change
in the data.
 Computer hacking − Computer
hacking defines unauthorized access to
the Computer and steals data from the
PC like Computer ID and password by
implementing hacking techniques.
 Password hacking − Password hacking
is the procedure of recovering secret
passwords from information that has
been already saved in the computer
system.
 Email hacking − Email hacking defines
unauthorized access on an Email
account and using it without the owner's
permission.
 Reconnaissance − Reconnaissance is the
procedure of data gathering. In this phase,
the hacker gathers relevant data regarding

PHASES the target system. These contain detecting


services, operating frameworks, packet-
hops to reach the system, IP configuration,
OF etc. There are multiple tools such as
Nmap, Hping, Google Dorks, etc. that are
HACKIN used for reconnaissance objectives.
 Scanning − In the scanning phase, the
G hacker initiates to actively probe the
target device or network for susceptibility
that can be used. There are various tools
such as Nessus, Nexpose, and NMAP that
are broadly used by hackers in this
process.
 Gaining Access − In this phase, the
vulnerability placed during scanning is
exploited using various techniques and
the hacker tries to introduce the target
system without increasing any alarms.
 Maintaining Access − This is one of
the most important phases. In this
phase, the hacker installs several
backdoors and payloads onto the target
system. Payload is a method used for
activities implemented on a system after
gaining unauthorized access. Backdoors
support the hacker gaining faster access
to the destination system in the future.
 Clearing Tracks − This process is an
unethical event. It has to do with the
elimination of logs of all the events
that take place during the hacking
procedure.
 Reporting − Reporting is the last
procedure of finishing the ethical
hacking process. Therefore the Ethical
Hacker compiles a document with his
discovery and the job that was
completed such as the tools used, the
success rate, vulnerabilities found, and
the exploit procedure.
 1) White Hat Hackers
White hat hackers are types of hackers
who’re professionals with expertise in
cybersecurity. They are authorized or certified to
hack the systems. These White Hat Hackers work
TYPES for governments or organizations by getting into
the system. They hack the system from the
ACCG. TO loopholes in the cybersecurity of the organization.
INTENTS Motives & Aims: The goals of these types of
hackers are helping businesses and an appetite
for detecting gaps in networks’ security. They aim
to protect and assist companies in the ongoing
battle against cyber threats. A White Hat hacker is
any individual who will help protect the company
from raising cyber crimes.
 2) Black Hat Hackers
Black hat hackers are also knowledgeable
computer experts but with the wrong intention.
They attack other systems to get access to
systems where they do not have authorized
entry. On gaining entry they might steal the data
or destroy the system. The hacking practices
these types of hackers use depend on the
individual’s hacking capacity and knowledge.
Motives & Aims: To hack into organizations’
networks and steal bank data, funds or sensitive
information. Normally, they use the stolen
resources to profit themselves, sell them on the
black market or harass their target company.
 3) Gray Hat Hackers
The intention behind the hacking is
considered while categorizing the hacker. The
Gray hat hacker falls between the black and
white hat hackers. They are not certified,
hackers. These types of hackers work with
either good or bad intentions. The hacking
might be for their gain.
Motives & Aims: The difference is, they don’t
want to rob people nor want to help people in
particular. Rather, they enjoy experimenting
with systems to find loopholes, crack defenses,
and generally find a fun hacking experience.
 4) Script Kiddies
It is a known fact that half knowledge is
always dangerous. The Script Kiddies are
amateurs types of hackers in the field of hacking.
They try to hack the system with scripts from
other fellow hackers. They try to hack the
systems, networks, or websites. The intention
behind the hacking is just to get the attention of
their peers. Script Kiddies are juveniles who do not
have complete knowledge of the hacking process.
Motives & Aims: One standard Kiddie Script
attack is a DoS (Denial of Service) or DDoS attack
(Distributed Denial of Service). This simply means
that an IP address is flooded with too much
excessive traffic that it collapses. Consider several
Black Friday shopping websites, for instance.
 5) Green Hat Hackers
Green hat hackers are types of hackers who
learn the ropes of hacking. They are slightly
different from the Script Kiddies due to their
intention. The intent is to strive and learn to
become full-fledged hackers. They are looking for
opportunities to learn from experienced hackers.
 6) Blue Hat Hackers
Blue Hat Hackers are types of hackers who’re
similar to Script Kiddies. The intent to learn is
missing. They use hacking as a weapon to gain
popularity among their fellow beings. They use
hacking to settle scores with their adversaries. Blue
Hat Hackers are dangerous due to the intent
behind the hacking rather than their knowledge.
 7) Red Hat Hackers
Red Hat Hackers are synonymous
with Eagle-Eyed Hackers. They are the
types of hackers who’re similar to white
hackers. The red hat hackers intend to
stop the attack of black hat hackers. The
difference between red hat hackers and
white hat hackers is that the process of
hacking through intention remains the
same. Red hat hackers are quite
ruthless when dealing with black hat
hackers or counteracting malware.
Above are 7 types of hackers broadly referred to in
the cybersecurity world.
The three types of hackers listed below work in
different capacities.
 8) State/Nation Sponsored Hackers
Government appoints hackers to gain
information about other countries. These types of
hackers are known as State/Nation sponsored
hackers. They use their knowledge to gain
confidential information from other countries to be
well prepared for any upcoming danger to their
country. The sensitive information aids in being on
top of every situation but also in avoiding
upcoming danger. They report only to their
governments.
 9) Hacktivist
These types of hackers intend
to hack government websites. They
pose themselves as activists, so
known as a hacktivist. Hacktivists
can be an individual or a bunch of
nameless hackers whose intent is to
gain access to government
websites and networks. The data
gained from government files
accessed are used for personal
political or social gain.
 10) Malicious insider or
Whistleblower
These types of hackers include
individuals working in an organization
who can expose confidential
information. The intent behind the
exposure might be a personal grudge
against the organization, or the
individual might have come across
illegal activities within the organization.
The reason for exposure defines the
intent behind the exposure. These
individuals are known as whistleblowers.

You might also like