Isoftdl Hacking Class 1 Introduction To Ethical Hacking
Isoftdl Hacking Class 1 Introduction To Ethical Hacking
Isoftdl Hacking Class 1 Introduction To Ethical Hacking
ISOFTDL HACKING CLASS 1 INTRODUCTION TO ETHICAL HACKING AUTHOR: LOKESH SINGH www.isoftdl.com
Page 1
What Is Hacking??
Everyone here thinks that hacking is just stealing of data and information illegally but this perception is absolutely wrong. The below is definition from Wikipedia.... Its clearly showing hacking as a negative thing...
"Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)"
Hacking is not always unauthorized... Hacking also includes exploring the Things that are being hidden from the general usage... So exploring things i.e. being hidden from general User is also hacking...
Hacking Definition by Me... Hacking is art of exploring the hidden things that are being hidden from general usage and finding loop holes in the security and use them to benefit the others"
Page 2
I want to categorize hackers in three Categories: 1. Crackers or Black Hat hackers or cheaters or simply criminals: They are called criminals because they are having the mindset of causing harm to security and they steals very useful data and use it in wrong ways. Phreakers also come in this category who steals account info and steal your credit card nos. and money over the Net.
2. Ethical hackers: Ethical Hacking Means you think like Hackers i.e. first you Hack the Systems and find out the loop holes and then try to correct those Loop Holes. These types of hackers protect the cyberworld from every possible threat and fix the future coming security loop holes. These peoples are also called as "GURU's" of Computer Security.
3. Simply Prankers: The hackers who just do hacking for fun...play pranks to their friends.
Page 3
Page 4
Page 5
Page 6
Below snapshot will tell you what I will teach to you in future hacking classes:
What is Hacktivism?
Hacktivism basically means hacking for a cause. When Hackers has to publicize some agenda or send some message to users, they use this technique to get visibility. The hacktivism consists or several attacks like Website Defacement. They hack website and display a message or agenda on it.
Page 7
Page 8
ISOFTDL ONLINE HACKING CLASS Step2: Scanning Targets This stage of a hack can be considered to be a logical extension of active reconnaissance. Get a single point of entry to launch an attack and could be point of exploit when vulnerability of the system is detected. Objectives of port scanning: Open ports Host operating system Software or service versions Vulnerable software versions
Step3: Gaining Access Gaining access refers to the true attack phase. The exploit can occur over a LAN, locally, Internet, offline, as deception or theft. System Hacking Sniffers Social Engineering Denial of Service Session Hijacking Buffer Overflows Root kits Hacking Web servers Web application vulnerabilities Web based password cracking SQL injection Hacking Wireless networks Virus and Worms Evading IDS, firewalls, Honey pots Cryptography
Page 9
ISOFTDL ONLINE HACKING CLASS Step 4: Maintaining access Maintaining access refers to the phase when the attacker tries to retain his ownership of the system. Install tools such as Root kits. Trojans and its backdoors. Backdoors.
Step 5: Covering Tracks or Clearing Traces Covering tracks refers to remove the evidence of his presence and activities. Different Techniques include: Tunneling. Altering/Clearing log files. Disabling auditing That's the overall procedure how a successful hacking attempt is made. I will discuss all these steps in details in future classes.
Page 10
Page 11