What is Hacking?
Basically Hacking is the act of compromising digital devices
and networks through unauthorized access to an account or computer system.
Hacking is not always a malicious act, but it is most
commonly associated with illegal activity and data theft by cyber
criminals.
But what is hacking in a cyber security context?
Hacking in cyber security refers to the misuse of devices
like computers, smartphones, tablets, and networks to cause damage to or
corrupt systems, gather information on users, steal data and documents, or
disrupt data-related activity.
Types of Hackers
White Hat
Also known as ethical hackers, these individuals use
their skills to identify and fix security vulnerabilities. They are hired by
companies and governments to test security systems.
Black Hat
These are the malicious hackers you hear about in
news headlines. They exploit systems for personal gain—such as stealing data,
installing malware, or launching ransomware attacks.
Gray Hat
Operating in the middle ground, gray hats may break
into systems without permission, but they don't do it for personal gain.
Sometimes, they reveal vulnerabilities publicly to pressure organizations into
improving security.
What is Ethical Hacking?
Ethical hackers play a critical role in defending against
cyber threats. They perform penetration testing, security audits, and
vulnerability assessments to help organizations protect themselves from real
hackers.
How Hacking is Done?
Step 1: Information Gathering ( Reconnaissance )
This is the first phase where the Hacker tries to collect
information about the target. It may include Identifying the Target, finding
out the target's IP Address Range, Network, DNS records, etc. Let's assume that
an attacker is about to hack a websites' contacts.
Step 2: Scanning and Enumeration
In this phase, the hacker starts probing the target
to find open doors. They scan for open ports, Running services, Operating
system versions , Vulnerable software. Hackers are now probably seeking any
information that can help them perpetrate attacks such as computer names, IP
addresses, and user accounts.
tools like dialers, port scanners, network mappers,
sweepers, and vulnerability scanners to scan data
Step 3: Gaining Access
From the data collected in the phase 1 and phase 2 now the
hacker designs the blueprint of the network of the target
After finding a vulnerability, the hacker tries to exploit
it. Common methods include:
- Phishing:
Tricking users into giving away passwords.
- SQL
Injection: Inserting malicious code into input fields to access databases.
- Brute
Force Attacks: Guessing passwords with automation.
- Malware:
Installing harmful software like trojans or keyloggers.
Step 4: Maintaining Access
Once a hacker has gained access, they want to keep that
access for future exploitation and attacks. As a precaution, the hacker begins
to look for and identify accounts that have not been used for a long
time. The hacker assumes that these accounts are likely either forgotten
or not used so they change the password and elevate privileges to an administrator
as a secondary account in order to maintain access to the network.
Step 5: Clearing Tracks
Prior to the attack, the attacker would change their MAC
address and run the attacking machine through at least one VPN to help cover
their identity. Once access is gained and privileges have been escalated, the
hacker seeks to cover their tracks. This includes clearing out Sent
emails, clearing server logs, temp files, etc.


Comments
Post a Comment