Sie sind auf Seite 1von 3

HACKING

Hacking is technical effort to manipulate the normal behavior of network connections


and connected systems (Bawane & Shelke, 2014). Hacking is an attitude and practice
surrounding the use, consumption, and production of computer-related work. Hacking uses
Authorizedor Unauthorized attempts to bypass the security mechanisms of an information
systems or network. In simple words hacking means finding out weaknesses in a computer or
computer networks. The term hacker can mean two different things :
 Someone who is very good at computer programming, networking or other
related computer functions and loves to share and teach his knowledge with other
people (Bawane & Shelke, 2014).
 Someone who uses their expert computer skills and knowledge to get unauthorized
access to systems, corporations, governments, or networks for his personal use
(Bawane & Shelke, 2014).
Hacker try to understand phone, computer or other systems clearly for the satisfaction
of having that knowledge. Hackers wonder how it work and have a high curiosity. Hackers
will sometimes do doubtable legal things, such as hacking into systems, but they generally
will not cause harm once they break in. In the other side, a hacker there is a term called cracker
(Bawane & Shelke, 2014). Hacking is the practice of modifying the features of a computer system,
in order to accomplish a goal outside of the creator's original purpose. The main goal of hacker is
to steal the secret information or important information to destroy the enemies computer network.
Computer hacking is the most famous form of hacking nowadays, especially in the field of
computer security, but there are hacking in many other forms, such as phone hacking,
network hacking, server hacking, email hacking, etc.

CRACKING
Cracking is the activity of breaking into a computer system with the aim of taking. While
people who do cracking are called crackers. Crackers usually try to enter into a computer system
without permission (authorization), these individuals usually intend evil / bad, as opposed to
'hackers', and usually seek profits in entering a system.
By dealing with colleagues, a cracker can learn about new techniques, understand cracker
ideology, barter information, invite other crackers to crack to share experiences. Socializing
crackers with other crackers often occurs in the same place and can be considered a community.
In these communities, crackers make connections through electronic communication
devices so that the community can be declared an electronic or virtual community. The virtual
community often uses chat or Internet Relay Chat (IRC) applications.
Technical Aspects Including Software and Tools :

TECHNIQUES FOR HACKING The techniques to gain over a terminal or make it crash. The
following are used to hacking purpose are described in here (Bawane & Shelke, 2014) ,
a) Denial of Services(DOS) attacks give hackers to cause the network down without gaining
internal access because it overload server request.
b) Sniffing attacks infiltrate and intercepts the TCP Packets. This attacks happens by
modifying packet/eavesdropping the packets.
c) Spoofing. This attack disguise an internet address for unknown source to be a known,
trusted source.
d) Viruses and Worms. This types of attack are self-duplicating programs or a piece of code
that attach themselves to other programs (viruses) or machines (worms). Both viruses and
worms harm the networks by flooding with a large amount of bogus traffic.
e) Keyloggers is a type of attack that tracks your input and send it to the hacker.
f) Social Engineering This is the oldest types of attack. The hacker will try to convince user
that you are a legitimate person from the system and pursue you to fill the password to
continue.
g) Fake Messengers. This type of attack pursue user to fill their credentials by sending a fake
messages.

TECHINIQUES FOR CRACKING The Most common types of cracking are described as below
(Bawane & Shelke, 2014) ,
a) Dictionary Cracker can run a file of words against user accounts, and if the password is
found to be simple word, it can be found pretty quickly.
b) Hybrid We know that the user utilize common method to change passwords is to add a
number or symbol to the end. A hybrid attack works like a dictionary attack, but adds
simple numbers or symbols to the password attempt.
c) Brute force, types of crack that uses every combination of character is tried until the
password is broke. It is the most complex and time consuming method.

TOOLS FOR HACKING The frequently most used tools in the world of penetration
testing/ethical hacking, IT security researcher is developing automatic tools for penetration. This
paper will summarize the best tools that are widely used in the world of hacking: (Pandey, Balani,
& Singh, 2015)
a) Nmap Nmap is a tool used for port scanning, Available for both windows and linux
operating system.
b) Nessus Nessus is a tool to detect vulnerability, Nessus has been developed by Tenable
network security, it is free tool that anyone can use. It is a network vulnerability scanner to
find critical bugs on the system.
c) Nikto is a tool that can check for outdated versions of over 1000 servers, and version
specific problems on over 270 servers, It find out the default files and programs. It is best
suited tools for web server penetration testing.
d) Kismet is a tool for wardriving or WLAN hacking penetration test, Kismet can identify
network by collecting the packets and detecting networks, which allows it to identify
hidden networks and the presence of nonbeaconing networks via data traffic.
e) MetaSploit is a tools that contains a database that has a list of available exploit and easy to
use for exploitation. Metasploit framework is a sub project and it is used to execute exploit
code against a machine and get the desired output.
f) NetStumbler , Tools that are available for windows based operating system. It can detect
and analyze WiFi that is protocol IEEE 802.11b, 802.11g and 802.11a networks.

References :

Bawane, M. S., & Shelke, C. J. (2014). Analysis of Increasing Hacking. 3(2), 268–271.
Pandey, B. K., Balani, L., & Singh, A. (2015). ETHICAL HACKING ( Tools , Techniques and
Approaches ). ICAIM-International Conference on Advancement in IT and Management, At
Thakur Institute of Management Studies Career Development and Research Thakur Village
Kandivali East Mumbai, (January), 6. https://doi.org/10.13140/2.1.4542.2884

Das könnte Ihnen auch gefallen