[Latest News][6]

education
business
lifestyle
news
games
cryptocurrency
hacker
technology
android
website

Translate

What is Hacker and Step by step Hacking

What is Hacker ? How to be a Hacker Step by Step?

Hear the word hacker is certainly no stranger to you, yes hackers are always related to technology, systems and computer networks.


Understanding of today's hackers are many who misunderstand about damaging activities such as a game hack, hack app, facebook hack, hack twitter and many more.


Basically a hacker itself is the art science in the world of security systems and computer networks.


Understanding the hacker is divided into four parts of Reviews their work:
hacker's own understanding is that person's activities that penetrate into other people's computer network system both for the purpose of personal benefit or for the benefit of a group.

What is Hacker and Step by step Hacking
Hacker Step By Step

BLACK HAT HACKER



Black Hat Hacker often also called Cracker. Cracker it self has a meaning as a kind of hacker who uses his ability to do things that are harmful both to the system and into the computer network itself, and is always associated with breaking the law.

WHITE HAT HACKER

White Hat Hacker has a sense the opposite of Black Hat Hacker.
White Hat Hacker is a hacker who uses his ability on the right path to face the Black Hat Hacker. White Hat Hackers usually is someone who is professional and works on enterprise security systems and computer networks, for example as a security consultant, security analysts and others.

GREY HAT HACKER

Grey Hat Hacker is a hacker who moves in the middle area, between black hat and white hat hacker hacker.
At any time they can turn into white hat hacker and can also be changed as a black hat hacker according to the conditions and their wishes.


In essence, not all hackers are bad and destructive but there are also hackers who are in the middle position of the two.


The following is a step by step hacking :


1. Footprinting

Activity for detailed information on computer systems for targeted, and include the information search engines, whois, and DNS zone transfer.

2. Scanning

Looking for information on a specific goal to find the entrance to the most possible.
Use ping sweeps and port scans.

3. Enumeration

Examining the target of intensive, focused search for the user account, and share network resources and applications for the protection of the weakest.

4. Gaining Access / Get Access

Attempts to get more data to begin trying to access the target. Covering peek and depriving password, password guessing, and perform a buffer overflow.

5. Escalating Privilege / Finding Special Access (Root) 

When you get a new user password in the previous stage, at this stage sought to get admin privileges to the network password cracking or similar exploit LC_MESSAGES, get admin, sechole, and more.

6. pilfering

Information gathering process begins again to identify the mechanisms to get access to a trusted system. Include an evaluation of trust and search cleartext passwords in the registry, config files, and user data.

7. Covering Footprint (Covering Tracks) 

Once the complete control of the system is obtained, then close the trail becomes a priority. Network log includes the cleaning and the use of tools like hide all kinds of rootkits and file streaming.

8. Make Rear Door (Creating Backdoors)

The rear door was created in various parts of the system to facilitate the re-entry into the system by setting up a fake account user, batch job scheduling, changing the startup file, embed service remote control and monitoring tool, and replace an application with the trojan.

9. Denial of Service (DOS)

Attackers computer network system in order to paralyze the target as a last attempt Covers SYN flood, ICMP techniques, Supernuke, land / latierra, teardrop, bonk, newtear, trincoo, trini00, and others.

10. Phishing

activities to obtain personal information such as user ID, password, PIN, bank account numbers, credit card numbers illegally.

11. Keylogger

machine or software installed or installed on a computer that records all activity that occurs on the keyboard (works secretly or unknown to the computer user by naked eye)

12. Fake Login

Weather mock / fake created to trick the user, aim to steal important information from the user (eg, username, password, email). As in the case of theft of email n password Friendster, Facebook, etc.

13. Fake Process

The process clone created to hide the name of the original process, aiming to trick the system admin. Like mem-fake "./backdoor" to "usr / sbin / httpd", so when in "ps -axl", the "./backdoor" changed to "usr / sbin / httpd".

14. Malicious Code

Created for nefarious purposes or so-called malicious code.

15. Virus

Malicious code system that works like a virus in humans, such as parasites replicate and sustain in the file that it infects. Files become damaged or infected with increase in size. Now the code of this type will be very easily detected in applications that check crc32 of him.

16. Worm (Worm)

Malicious code system that works like a worm, replicate and spread, does not support the file. Most in Indonesia is this type of code.

17. Trojan (Horse)

Malicious code that the system works as a trojan horse in the days of the Roman empire, entered into the system to snoop and steal important information that there is in it and then send it to the owner of the trojan.



Above is some understanding of hackers and step by step hacking

Thank for All.

Start typing and press Enter to search