Sei sulla pagina 1di 3

What is hacking?

Hacking, specifically computer hacking refers to the technique or process by which the
hacker gains access to a computer system.
What is a hacker?
Hacker is a slang for a computer enthusiast. A hacker targets or finds out the loop holes in the
computer system and tries to gain access over the particular computer. Through the loop
holes, a hacker is able to eploit a weakness or vulnerability in a computer system.
Types of hacking
a. !nside "ob
#ost security breeches originate inside the network that is under attack. !nside "obs include
stealing passwords $which hackers then use or sell%, performing industrial espionage, causing
harm $as disgruntled employees%, or commiting simple misuse.
b. &ogue access points
&ogue access points $Aps% are unsecured wireless access points that outsiders can easily
breech.$local hackers often advertise rogue Aps to each other.%
c. 'ack doors
Hackers can gain access to a network by eploiting back doors administrative shortcuts,
configuration errors, easily deciphered passwords, and unsecured dial(ups.
d. )iruses and worms
)iruses are self(replicating programs or code fragments that attach themselves to other
programs $viruses% or machine $worms%.
e. Tro"an horses
Tro"an horses, which are attached to other programs, are the leading cause of all break(ins.
When a user downloads and activates a Tro"an horse, the hacked software $sw% kicks off a
virus, password gobbler, or remote(control *W that gives the hacker control of the +,.
f. -enial of service$-...*%
-...* attacks give hackers a way to bring down a network without gaining internal access.
*niffing and spoofing
*niffing refers to the act of intercepting T,+ packets.
*poofing is the act of sending an illegitimate packet with an epected acknowledgement
$A,/%.
g. Types of hackers
'asically, hackers are divided into two groups, legal 0 ethical hackers and illegal 0 non(ethical
hackers.
1egal 0 ethical hacker
a. White hat
A white hat hacker is someone who has non(malicious intent whenever he breaks into
security systems and whatnot. A white hat that does vulnerability assessments and penetration
tests is also known as an ethical hacker.
!llegal 0 non ethical hacker
b. 'lack hat
A black hat hacker, also known as a cracker, is the type of hacker that has malicious intent
whenever he goes about breaking into computer security systems with the use of technology
such as a network, phone system, or computer and without authori2ation.
c. 3rey hat
A grey hat hacker is someone who ehibits traits from both white hats and black hats.
d. 4lite hacker
As with any society, better than average people are rewarded for their talent and treated as
special. This social status among the hacker underground, the elite.
e. *cript kiddie
A script kiddie is basically an amateur or non(epert hacker wannabe who breaks into peoples
computer systems not through his knowledge in !T security and the ins and outs of a given
website, but though the pre(packaged automated scripts $hence the name%, tools, and software
written by people who are real hackers, unlike him.
,onsequence of hacking
.Thousands of dollars in fine.
.!mprisonment.
.*ei2ure of ones computer.
,onclusion
.+roper ethical hackers should be employed
.-o not epose your passwords to untrusted sites
.+ractice using eact web address
.,lose your internet while not in use
&eferences
http500www.slideshare.net
http500www.trivology.com
http500www.wisegeek.org.htm
http500www.webopedia.com.html

Potrebbero piacerti anche