Latest Blog

what is hacking ? | what are the types of hackers ?


" Hacking typically refers to gaining of the unauthorized access to knowledge in an exceedingly system or intrusion into a laptop or a network.  "
what is hacking?
Hacking is talent  "You won't learn in school, you've to learn itself"

What does one assume that hacking in movies is as straightforward as in real life?
            Even throughout you browse this line virtually some thousands of system square measures hacked. The person engaged in hacking activities is thought of as a hacker. This hacker might alter the system or safety features to accomplish a goal that differs from the initial purpose of the system. Hacking may confer with non-malicious activities, typically involving uncommon or temporary alterations to instrumentality or processes. 

 

Hackers might deploy differing kinds of technique for hacking as follow:

Vulnerability scanner: Checks computers on networks for well-known weaknesses
Password cracking: The method of convalescent passwords from knowledge keep or transmitted by laptop systems

Packet sniffer: Applications that capture knowledge packets to look at knowledge and passwords in transit over networks
Spoofing attack: Involves websites that falsify knowledge by mimicking legitimate sites, and that they square measure so treated as trustworthy sites by users or alternative programs

Rootkit: represents a collection of programs that work to subvert management of associate degree software package from legitimate operators

Trojan Horse: is a back door {in a|during a|in associate degree exceedingly|in a very} computing system to permit a trespasser to achieve access to the system later

Viruses: self-replicating programs that unfold by inserting copies of themselves into alternative possible code files or documents

Key loggers: tools designed to record each keystroke on the affected machine for later retrieval

3 types of Hacker are responsible for hacking:

1.White Hat Hacker - White hat hackers use their skills to boost security by exposing vulnerabilities before malicious hackers (known as black hat hackers) will find and exploit them. Especially these types of hackers are working for government bodies or private companies for security purposes. 
2. Gray Hat Hacker - Gray hat hackers laptop hacker or laptop security knowledgeable WHO might typically violate laws or typical moral standards, however, it doesn't have the malicious intent typical of a black hat hacker.
3. Black Hat Hacker -  A black hat hacker could be a one who makes an attempt to search out laptop security vulnerabilities and exploit them for private gain or alternative malicious reasons. Usually, gray hat hackers won't exploit the found vulnerabilities. However, this kind of hacking remains thought-about nonlegal as a result of the hacker failed to receive permission from the owner before trying to attack the system.

"Hacking is talent. you will not learn in school. It's like being Messi or Ronaldo. If you were born to become a hacker, it is your destiny Otherwise, you will be Hacked."

 

Which programming language is best for hacking?

  1.     PHP.
  2.     Perl
  3.     C/C++
  4.     Python
  5.     Ruby
  6.     Java
  7.     LISP
  8.     Assembly Language

 

Essential skill and ability for a Hacker :

  1.     Basic Computer skill
  2.     Networking skill
  3.     Linux skill
  4.     Virtualization
  5.     Wireshark or TCP/UDP connection knowledge
  6.     Security concept and Technology
  7.     Intermediate skill
  8.     Scripting
  9.     Database skill
  10.     Web Application
  11.     Forensics
  12.     Advanced TCP/IP
  13.     Reverse Engineering
  14.     Intangible skill
  15.     Persistence

 

What is Rainbowcrack used for?

RainbowCrack could be a trojan horse that generates rainbow tables to be utilized in positive identification cracking. RainbowCrack differs from "conventional" brute force loco in this it uses massive pre-computed tables referred to as rainbow tables to scale back the length of your time required to crack a positive identification drastically. 

 

Is computer hacking a crime?

Penalties: Penalties for laptop-related crimes in the big apple State will vary from a fine and a brief amount of jail time for a category A crime like unauthorized use of a laptop up to computer change of state within the degree that could be a category C crime and may carry three to fifteen years in jail.
 

Legality: Phone hacking, being a variety of police work, is unlawful in several countries unless it's dole out as lawful interception by an administrative body. within the News International phone-hacking scandal, private detective cosmonaut Mulcaire was found to possess profaned the Regulation of inquiring Powers Act 2000.

 

Can you sue a hacker?

You might sue over code contract however actually, spammers, attackers and botnet operators and everyone this stuff, they all go past humans and you'll be able to sue them. you do not even get to truly apprehend what their address is. you'll be able to sue John Doe.”

 

Who will Learn Hacking :

> Anybody curious about learning web site & internet application Hacking/penetration testing
> Anybody WHO needs to be told however hackers hack web site

> Internet developer so that they will produce secure internet application & secure their existing ones


My recommendation is to use "The Hacker Playbook 3" to be told the Hacking type starting to knowledgeable.


If you have got any question comment in the following section

No comments