Header Ads Widget

Ethical Hacking

Hey Readers,
                                 Welcome to this interesting blog spot of Anonymous, Where you may find good information about Technology and some other Platforms.

                                 Now, in this blog you will some great information and facts about Ethical Hacking, and in the end you may find some famous hacker, who hacked huge banks and corporations. So, Let's look at this.....






Ethical hacking means one type of penetration testing, which implement in system and technology to find out threats, vulnerabilities in some hacking devices and improve the critical situation of being hacked.

Ethical hackers use same tools and software as malicious hacker used. But they only use by permission of authorized person. The main goal of Ethical hackers is to improve the security and threats and also to defend the system from attack by malicious users.

Now, let's get through hacking types





Types of Hacking

Hacking can be defined in various categories, which is based on what is being hacked :-

1. Computer Hacking
2. Password Hacking
3. Website Hacking
4. Network Hacking
5. Email Hacking

1. Computer Hacking :-

                                   In this hacking portion, hackers steal important information from Computer by hacking. They get unauthorized access for hacking. Not only this but also they can get some informal details from PC, even they hack other connected pc by hacking.

2. Password Hacking :-

                                   Password hacking is one of the most hardest hacking among others. Because many of files are protected by strongest password and it become hard to crack it. Through hacking password, they can easily get secret or vital information. Sometimes, whenever they got any information, they crack the whole device or software. 

3. Website Hacking :-

                                   In Website Hacking, hackers can change the entire database and change the structure of web pages. Even, they put some unusual content on website. Some hackers give wrong information about content and  spread negativity into people.

4. Network Hacking :-

                                  In Network Hacking, they hack the whole network and by this hacked network they hack other devices and websites. From hacking network, It become harmful for other people, who use the same network.

5. Email Hacking :-

                                  They hack Email account and get the precious information from people, Companies. They get unauthorized access without permission of owner. 






Types of Hackers

There are mainly 3 types of Hackers, which can be sorted below :-

1. Black Hat Hacker

2. White Hat Hacker

3. Grey Hat Hacker

1. Black Hat Hacker

                             Black Hat Hacking is illegal. So, they steal money from bank or any co-operation illegally. They are also known as a Unethical Hacker or Security Cracker. By hacking banks, they find credit information and crack weak security of any company and hack good information.







2. White Hack Hacker

                             They are also known as Ethical Hacker or a penetration tester. These hackers are legal hackers, because they get the permission of any company or bank before hacking. These Hackers are mostly test the system's security. They focus on security and protecting IT system.








3. Grey Hat Hacker

                             Grey Hat Hackers are also act like White Hat Hackers, but sometimes they check any system's security without any permission. The good thing about Grey Hat Hacker is they're not stealing any money or any documents. They check the System's security without any permission. So, it may be illegal or legal. 







Network Penetrating System

Most of systems and Computer are connected to network, and also every device are connected to internet network. So, it become important to check the Network Penetrating System, because if any hacker hack the system then it is hard to secure the important data of people.





Network Penetrating System are separated into 3 sections :-

1. Pre-connection attacks :- In this section, they know that how they can handle the hacking network before sorted. From this they can find the fault of network and improve the security.

2. Gaining attacks :- In this section, They learn how to crack the network wi-fi keys and gain access to Wi-fi Network. Mostly they use WEP/WPA/WPA2 network.

3. Post-connection attacks :- This attacks are happen when you're connect to network. Whenever this attacks happen, hackers may intercept the connection and capture everything like, name, Username, Passwords, Identity and many more important documents. They use wi-fi network or even wired network. 


MITM ATTACKS

MITM :- Man in the Middle Attacks


                                          This is the most dangerous attack for network connected devices or servers. Nowadays, many information are sent to or from the clients will have to go through our device. So, now we can easily know the password and key to the network. Thus, we will be able to read all the information, we can modify them and drop them. This kind of attack is powerful because it is very hard to protect against. Due to this, the ARP works.

                                          ARP means Address Resolution Protocol. Mainly ARP has two security issues. The first one is that each ARP request response is trusted, it means that whenever any other network or server interfere in our network, the router will trust us and will start treating as a device. So, it is the first security issue. The second issue is that client accept the response with in time and even many times it happens that server don't send any response to clients, but they receive easily. First, they send information to the router but after response they send information directly to the clients.

So, now you will see that how MITM attacks works :- 

It is based on technique which is called ARP spoofing or ARP poisoning. We can see in below image that client request to the router for information, and then the router will get the request from the internet and give response in time. 






Now, the hacker become router and asked about the information. It means that hacker send ARP response to client, even if they can't asking for response but, they can still send response to clients. It is called trap, So, after that clients send information to the hacker, because he still believe that I send information to the router. Client send information to the hacker instead of router.

After that hacker tell to the Wi-Fi router that we are clients and send some information which seems related. After that router understand that clients send the responses. But it's all about trap. 





So, the basic concept of ARP poisoning or MITM attack is hacker going to tell the clients that we are router and then we are again going to tell the router that we are clients. This will put us on between the client and router. After sending information through our device. So, we can read, modify and drop them.  















➽ ADVANTAGES OF HACKING

1. It is used to test the security of system, if they crack then improve it!
2. It is used to get information back, Suppose you forgot the password than by hacking you can easily get back
3. It become helpful for penetrating system to increase the security of computer and network

➽ DISADVANTAGES OF HACKING

1. Hacking is illegal. So, without any concern we can't do hacking
2. Hacking is that activity, which can hack any higher corporation or even bank, not only this but also many times they get our personal information by hacking
3. It can harm the privacy of people, they can change some information and publish it.


WELL KNOWN HACKERS

There are a list of some hackers, who hacked multi millionaire company and some high valuable banks.

1. Jonathan James

He was an American hacker, In 1999 at the age of 16 he cracked password of several computers at NASA. Even stole some important information about International Space Station, Not only this but also he got some data about temperature access, Space shuttle data and some other vital information.

2. Kevin Mitnick

In the united history, he was the most wanted of computer criminal. He committed many offences, like hacking the North-American defense command, Not only this but also he stole some computer manuals from pacific Bell. Even, he hacked the network of Digital Equipment Corporation. Now, he runs his own consulting firm.

3. Julian Assange

He started his hacking activities at the age of 16, at that time he chosen his name as ' MENDAX '. He hacked many networks of Government, Educational and some private servers. He is now living in Ecuadorian Embassy in London

4. Robert Morris 

He is the creator of the Morris worm, The Morris worm had the capability to slow down the computer processing rate, not only this but also make those computer trashed. Because of this commitment, government charged 3 years of probation and 400 hours of community services and also had to pay a penalty amount of $10,500.

5. Gary McKinnon

He is a Scottish systems administration and Hacker, He worked as a name of 'SOLO'. He hacked the computers of Military computer in 2002. He also hacked computers of NASA and US Armed forces and stole important files of the networks. Now, he lives in the united kingdom He could be face up to 70 years of jail for his actions, if he ever was extradited to the US.

6. Linus Torvalds

He is an American software engineer and place name of one of the best hacker of all time. He is famous for operating system called LINUX. Linux Operating system is open-source, and thousands of developers have contributed.

7. Kevin Poulsen

He is an American black-hat Hacker. He hacked federal computers for wiretap information. For this crime, he was sentenced for five years. Now, he work as journalist.  

8. Albert Gonzalez

He is an American hacker, who hacked millions of data of card accounts, at the age of 22. For avoiding jail time, he became paid informant at unknown company. He and his team using SQL and hacked back doors in several corporation network, stealing around $256 million from TJX alone.

9. Mark Abene

He is an American Entrepreneur, Once upon a time he was a member of hacker group of hacker namely, Legion of Doom and Master of Deception. He was a high profile hacker in 1980s. He hacked many networks and servers, Even he make many tools for hacking, which can be benefited to hackers.

10. Anonymous

Most of people knows about this group of hacker, They started hacking in 2003. The good thing about this group is, after hacking bank of corporation's money, they distributed in poor people, who need money. They use Fawkes mask, while hacking and many of people also wear this mask. They hacked many twitter account, even many of banks became victims of Anonymous.




Thus, This is all about the basic information of Ethical Hacking. We can see nowadays, many of hackers hack massive empower companies and banks. So, I hope you may find good information about Ethical Hacking.

If you have any query or suggestion about this web, please contact me through social media or Contact Form . I will feel glad if you contact me.
 







Post a Comment

7 Comments

  1. Got enough information about ethical hacking, from your amazing blog. Keep share it this kind of data.

    ReplyDelete
  2. Can you make blog post on kali linux operating system and why it is mostly used for hacking ... :)

    ReplyDelete
    Replies
    1. Yeah, Sure! I will post blog on kali Linux. Just stay updated:)

      Delete
  3. Keep it up 👍🏻👍🏻👍🏻

    ReplyDelete
  4. As the internet grows and computer networks become bigger, data integrity has become one of the most important aspects for organizations to consider. So that having this trusted computer security software is always important.
    DLCSPM

    ReplyDelete
  5. Admiring the time and effort you put into your blog and detailed information you offer!.. Hire a Hacker reviews

    ReplyDelete