Hacking Methodology and it's types


  

what is hacking  - 

 In the computer security context, hacking means gaining unauthorized access to data in a system or simply an attempt to bypass a computer systems security, mechanism to gain control over it or to perform any illegitimate activity for personal gain or creating a threat on one’s security to better describe hacking, one needs to first understand hackers. one can easily assume them to be intelligent and highly skilled in computers or someone who likes to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate. They love discovering new ways to work electronically. In fact, breaking a security system requires more intelligence and expertise than actually creating one.


Why do hacker hack -

 The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers ,they just hack to see what they can hack or what they can’t hack, usually by testing their own systems. When we have a close look at hackers, then they can be Categorized in different terms according to their purpose and approach.



Types of hackers -

Black hat Hacker- They are computer guys who perform Unethical Hacking. They don’t care about laws that they break, and the chaos or Financial loss that are left behind because of their doings. These kinds can be termed as Criminal Hackers, Crackers or simply Blackhat Hackers.

 • White hat hackers- They are the computer guy who performs Ethical Hacking. These are usually security professionals. Commonly known as Ethical Hacker or a Penetration Tester. They perform hacking to secure their system or an organization’s system that they work for, they use their skills to protect a system from any other hackers trying to exploit it or trying to steal valuable information from a particular system or network.

 • Grey hat hacker- They are the computer guy who sometimes acts legally and sometimes acts illegally, basically refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.

 • Hacktivist- Hacker who utilizes technology to publicize a social, ideological, religious or political message. Most hacktivism involves website defacement or denial-of-service attacks.

 • A script kiddie- A non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept.

 • Phreaker- A hacker who identifies and exploits weaknesses in telephones instead of computers.



Types of hacking technically -

  • Local Hacking  
  • Remote Hacking 

Types of hacking non-technically -

  •  Social Engineering 

Steps Performed to compromise a system Remotely -

  •   Information Gathering/Foot Printing
  •   Scanning and Enumeration 
  •  Gaining access
  •   Maintaining access and installing Backdoors 
  •  Clearing Logs

Steps Performed to compromise a system Locally -

  •   Gaining physical access
  •   Installing backdoor/Trojan Horse
  •   Covering Tracks

Non-Technical steps Performed to compromise a system 

Social engineering - 

Manipulating people to perform actions like extracting particular information of a company (such as passwords, credentials, confidential information) from the inside and delivering it to third parties or Using confidential information as leverage to exploit a particular system or network. Social engineering is similar to a confidence trick or simple fraud, or computer system access . Humans are trusting by its nature, which can lead to social-engineering exploits. Social engineering is defined as the exploitation of the trusting nature of human beings to gain information for malicious purposes






Comments

Post a Comment