Posts

Hacking 105 - Kapil Sharma

Stages of hacking in details:  1. First stage is information gathering: It can be social information gathering can spying on target activities or checking social networking records. So that all information compiled in one place a required information can be extracted from that single source information pool. 2. Scanning: Try/test the system open ports or information channels to gain access into the system/machine. Can be check from simple cmds like "ping, netstat, finger, nslookup, ipconfig, hostname, ftype" and many other cmds. 3. Access: In this case hacker gain the machine access and start exploring system for target contents/data. 4. Maintaining Access: In this hacker try to create back door ports or channels to re-gain entry again and again to target machine.  5. Covering tracks: If its one time hack and hacker got what he/she looking for than hacker try to remove its digital foot prints from the target machine ASAP, so that later any security audit...

Hacking 104 - Kapil Sharma

Image
Stages of hacking: 

Hacking 103 - Kapil Sharma

Hacker  Classification :  White hats: A re the ethical hackers, hired  by a client for security audit . And don’t use their  knowledge and skills without prior client consent. Gray hats:  The are the middle line of white hat and black hat. Some explore system venerability and share information publicly so than leak can be fixed and some exploit system venerability to gain profit. Treat them as double agents can be good can be bad.                Black hats: They   illegally using  their skills for either personal gain or malicious intent. They seek to steal or  destroy data, and to deny access to resources and systems. P emission or consent is not there system access factor. 

Hacking 102 - Kapil Sharma

End user hacking:  Even a end user can hack a machine without knowing much information related to code, networking/protocol knowledge.   So, all this basic to advance information gathering is part of social hacking.  Suppose a person used a cyber cafe system for web surfing and then next person use his/her machine.  By check first user web history the end user become a hacker. In this case hacker got the first user web surfing history information from system. This is called social hacking.  It can be in many forms. User call to the target entity ask for bank details, personal details by forging as bank or insurance agent. Now these days many call comes and tell end users that they are calling from bank or verification agency and ask for details. 

Hacking 101 - Kapil Sharma

Accessing any physical and non-physical objects/systems to extract/use its attributes/features is called hacking.  Hacking cannot be related to computer systems access but its a generic word where any other person except the original user, have the access/use the owner object, with or without permission.  Now a question can raise what means with permission system access? How can any one allowed object/system to be accessed/explored by other user.  This comes in the domain of ethical hacking, where expert system hacker access original author machine to expose system weakness and venerability. So, that original owner can fix the open leak information ports, access gates.