Beruflich Dokumente
Kultur Dokumente
CRACKING
Cracking is the activity of breaking into a computer system with the aim of taking. While
people who do cracking are called crackers. Crackers usually try to enter into a computer system
without permission (authorization), these individuals usually intend evil / bad, as opposed to
'hackers', and usually seek profits in entering a system.
By dealing with colleagues, a cracker can learn about new techniques, understand cracker
ideology, barter information, invite other crackers to crack to share experiences. Socializing
crackers with other crackers often occurs in the same place and can be considered a community.
In these communities, crackers make connections through electronic communication
devices so that the community can be declared an electronic or virtual community. The virtual
community often uses chat or Internet Relay Chat (IRC) applications.
Technical Aspects Including Software and Tools :
TECHNIQUES FOR HACKING The techniques to gain over a terminal or make it crash. The
following are used to hacking purpose are described in here (Bawane & Shelke, 2014) ,
a) Denial of Services(DOS) attacks give hackers to cause the network down without gaining
internal access because it overload server request.
b) Sniffing attacks infiltrate and intercepts the TCP Packets. This attacks happens by
modifying packet/eavesdropping the packets.
c) Spoofing. This attack disguise an internet address for unknown source to be a known,
trusted source.
d) Viruses and Worms. This types of attack are self-duplicating programs or a piece of code
that attach themselves to other programs (viruses) or machines (worms). Both viruses and
worms harm the networks by flooding with a large amount of bogus traffic.
e) Keyloggers is a type of attack that tracks your input and send it to the hacker.
f) Social Engineering This is the oldest types of attack. The hacker will try to convince user
that you are a legitimate person from the system and pursue you to fill the password to
continue.
g) Fake Messengers. This type of attack pursue user to fill their credentials by sending a fake
messages.
TECHINIQUES FOR CRACKING The Most common types of cracking are described as below
(Bawane & Shelke, 2014) ,
a) Dictionary Cracker can run a file of words against user accounts, and if the password is
found to be simple word, it can be found pretty quickly.
b) Hybrid We know that the user utilize common method to change passwords is to add a
number or symbol to the end. A hybrid attack works like a dictionary attack, but adds
simple numbers or symbols to the password attempt.
c) Brute force, types of crack that uses every combination of character is tried until the
password is broke. It is the most complex and time consuming method.
TOOLS FOR HACKING The frequently most used tools in the world of penetration
testing/ethical hacking, IT security researcher is developing automatic tools for penetration. This
paper will summarize the best tools that are widely used in the world of hacking: (Pandey, Balani,
& Singh, 2015)
a) Nmap Nmap is a tool used for port scanning, Available for both windows and linux
operating system.
b) Nessus Nessus is a tool to detect vulnerability, Nessus has been developed by Tenable
network security, it is free tool that anyone can use. It is a network vulnerability scanner to
find critical bugs on the system.
c) Nikto is a tool that can check for outdated versions of over 1000 servers, and version
specific problems on over 270 servers, It find out the default files and programs. It is best
suited tools for web server penetration testing.
d) Kismet is a tool for wardriving or WLAN hacking penetration test, Kismet can identify
network by collecting the packets and detecting networks, which allows it to identify
hidden networks and the presence of nonbeaconing networks via data traffic.
e) MetaSploit is a tools that contains a database that has a list of available exploit and easy to
use for exploitation. Metasploit framework is a sub project and it is used to execute exploit
code against a machine and get the desired output.
f) NetStumbler , Tools that are available for windows based operating system. It can detect
and analyze WiFi that is protocol IEEE 802.11b, 802.11g and 802.11a networks.
References :
Bawane, M. S., & Shelke, C. J. (2014). Analysis of Increasing Hacking. 3(2), 268–271.
Pandey, B. K., Balani, L., & Singh, A. (2015). ETHICAL HACKING ( Tools , Techniques and
Approaches ). ICAIM-International Conference on Advancement in IT and Management, At
Thakur Institute of Management Studies Career Development and Research Thakur Village
Kandivali East Mumbai, (January), 6. https://doi.org/10.13140/2.1.4542.2884