What is Hacking?



Basically Hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system.

Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals. 

But what is hacking in a cyber security context? 

Hacking in cyber security refers to the misuse of devices like computers, smartphones, tablets, and networks to cause damage to or corrupt systems, gather information on users, steal data and documents, or disrupt data-related activity.

Types of Hackers

White Hat

Also known as ethical hackers, these individuals use their skills to identify and fix security vulnerabilities. They are hired by companies and governments to test security systems.

Black Hat

These are the malicious hackers you hear about in news headlines. They exploit systems for personal gain—such as stealing data, installing malware, or launching ransomware attacks.

Gray Hat

Operating in the middle ground, gray hats may break into systems without permission, but they don't do it for personal gain. Sometimes, they reveal vulnerabilities publicly to pressure organizations into improving security.

What is Ethical Hacking?

Ethical hackers play a critical role in defending against cyber threats. They perform penetration testing, security audits, and vulnerability assessments to help organizations protect themselves from real hackers.

How Hacking is Done?

Step 1: Information Gathering ( Reconnaissance )

This is the first phase where the Hacker tries to collect information about the target. It may include Identifying the Target, finding out the target's IP Address Range, Network, DNS records, etc. Let's assume that an attacker is about to hack a websites' contacts. 

Step 2: Scanning and Enumeration

In this phase, the hacker starts probing the target to find open doors. They scan for open ports, Running services, Operating system versions , Vulnerable software. Hackers are now probably seeking any information that can help them perpetrate attacks such as computer names, IP addresses, and user accounts.

tools like dialers, port scanners, network mappers, sweepers, and vulnerability scanners to scan data

Step 3: Gaining Access

From the data collected in the phase 1 and phase 2 now the hacker designs the blueprint of the network of the target

After finding a vulnerability, the hacker tries to exploit it. Common methods include:

  • Phishing: Tricking users into giving away passwords.
  • SQL Injection: Inserting malicious code into input fields to access databases.
  • Brute Force Attacks: Guessing passwords with automation.
  • Malware: Installing harmful software like trojans or keyloggers.

Step 4: Maintaining Access

Once a hacker has gained access, they want to keep that access for future exploitation and attacks. As a precaution, the hacker begins to look for and identify accounts that have not been used for a long time.  The hacker assumes that these accounts are likely either forgotten or not used so they change the password and elevate privileges to an administrator as a secondary account in order to maintain access to the network.

Step 5: Clearing Tracks

Prior to the attack, the attacker would change their MAC address and run the attacking machine through at least one VPN to help cover their identity. Once access is gained and privileges have been escalated, the hacker seeks to cover their tracks.  This includes clearing out Sent emails, clearing server logs, temp files, etc.

 

 



Comments

Popular Posts