Wednesday, September 25, 2019

Types of hacking

             What is the types of hacking?
  
             
 Hacking is actually meant to break a code. There are three sections of hacking which are web hacking, Exploit writing & Reverse engineering and each of it requires different programming language.

       1. Web hacking

                   
Since most of the tech is build around world wide web, it is important to learn web hacking to be a good hacker. Let's say you are intrested in hacking web app and /ar websites then you will need to learn web coading. Websites use monthly HTML,PHP, and JAVASCRIPT. So, it is important to learn these three.

         HTML--    

One of the easiest and widely used static marckup web language present in each and every website you see in your browser. It's recommended to learn because it helps understanding web actions, response and logic.

    JavaScript-- 

JS is clint side web programming mostly used in web sites for better user interface and quick response. If you are intrested in a hacking carrier you need to learn javascript because it helps to understand clint-side mechanism, which is essential for finding clnt side flows.

      PHP-- 

    A dynamic server-site language which is responsible for managing web apps and detabase, PHP is considered one of the most essential language because it controls everything on site and server, like a captain of a ship . It is advised to learn PHP nicely.

   SQL--     

 SQL is responsible for storing and managing sensitive and confidential deta such as user credentials, bank and personal information about the website visitors. Black hat hackers mostly target SQL database and steal information which are leter sold on underground dark web forum. If you went to be good security researcher, you should learn SQL so that you can find flaws in a website and report them.


          2. Exploit writing


                        After web hacking another most important feature of hacking is exploits. You can crack a particular software by writing a exploits. But to write an exploit you need to learn either Python or ruby.

   Python---


         
It is said that a security researcher or hacker should know python because it is core language for creating exploits and tools. Security experts and even pro hackers suggest that master python is the best way to learn hacking. Python offers wider flexibility and you can create exploits only if are good in python 

      Ruby--     

 Ruby is a simple yet complicated object-oriented language. Ruby is very useful when it comes to exploit writing. It is used for meterpreter scripting by hackers. The most famous hacker tool,metasploit framework is programmed in ruby. Through Ruby may not be as versatile as python,knowledge of Ruby is must in understanding exploits.


      3.Reverse Engineering




                Reverse engineering, the process of taking a software program's binary code and recreating it so as to trace it back to the original source code. If you know reverse engineering, you can find flaws and bugs easily. If you want to learn reverse engineering. you need to know C, C++ and java. the process of converting the code written in heigh level language into an low level language without changing the original program is known as Reverse Engineering.
     

          Phases of hacking---

                     
 Hacking is broken up into five phases:
Reconnaissance,Scanning, Gaining access, Maintaining access and finally covering tracks. The more you get close to all phases, the more stealth will be your attack.
        
          Reconnaissance: This is the primary phases where the hacker tries to collect as much information as possible about target. It includes identifying the target, finding out the target IP adderess range, network, domin name registration records of target, mail server records, DNS records.
           Scanning: This makes up the base of hacking! This is where planning for attack actually begin! After reconnassance the attacker scans the target for services running, open ports, firewall detection, finding out velnarabilities, operating system detection.

           Gaining Access: After scanning, the hackers designs the blueprint of the network of the target with the help of snuffs collected during phases 1 and 2. Now the attacker, executes the attack based on. 


           Maintaining Access: After gaining access, the attacker escalates the privilages to root/admin and uploads a piece of code (usually called as backdoor) on the target network. So that he always maintain the gained access and can cannot to target anytime!



           Covering Track: After gaining access and maintaining access the same, hacker exploits the weakness the hacks the network or misuses the access! After that, comes the important phase covering the tracks! To avoid getting traced and caught, hackers clears all the tracks by clearing all kinds of logs and delated the uploaded backdoor and anything related  stuff which may later reflect his presence! 

       So, these are five important phases of hacking which every hacker must follow for a successful attack.
             

            Security and Privacy-------

                 
                            we are all now well aware of the threats facing computers, such as DDOS attacks against servers, what exactly a zombie computer is and some hacks which have hit the newspapers like the story of  a man in Tampa bay who was caught ''stealing'' someone else's brodband connection. THe individual hacked into a wireless internet network. while this may seem innocent enough consider that the person who gains entry into the network could be using your connection to sturf for porn - or worse it could be child porn with the trail leading to your connections.
               In fact you may need to have your own experts helping you prove your innocence!
                Another similar story of brodband /wireless signal theft from out of the UK , where several individuals have been changed using someone else's brodband connection.
                While the fines have been hafty, it is clear indication that while the justice system is working towards protecting individuals, they are in uncharted territiry. If you have ever borrowed someone else's wireless connection - you should think twice. If the letter of the law is followed, you could end up with serious fines, jail time- and worse, a record that will follow you for life.

                                                    

No comments:

Post a Comment