Hacking

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 5

TECHNIQUES OF HACKING

 Vulnerability scanner: checks computers on networks for known weaknesses


 Password cracking: the process of recovering passwords from data stored or
transmitted by computer systems
 Packet sniffer: applications that capture data packets in order to view data
and passwords in transit over networks
 Spoofing attack: involves websites which falsify data by mimicking legitimate
sites, and they are therefore treated as trusted sites by users or other programs
 Root kit: represents a set of programs which work to subvert control of an
operating system from legitimate operators
 Trojan horse: serves as a back door in a computer system to allow an intruder
to gain access to the system later
 Viruses: self-replicating programs that spread by inserting copies of
themselves into other executable code files or documents
 Key loggers: tools designed to record every keystroke on the affected machine
for later retrieval
TYPES OF HACKERS
 Ethical Hacker (White hat): A hacker who gains
access to systems with a view to fix the identified
weaknesses. They may also perform
penetration testing and vulnerability assessments.
 Cracker (Black hat): A hacker who gains
unauthorized access to computer systems for personal
gain. The intent is usually to steal corporate data,
violate privacy rights, transfer funds from bank
accounts etc
TYPES OF HACKERS CONT.....
 Grey hat: A hacker who is in between ethical and
black hat hackers. He/she breaks into computer
systems without authority with a view to identify
weaknesses and reveal them to the system owner.
 Script kiddies: A non-skilled person who gains access
to computer systems using already made tools.
 Phreaker: A hacker who identifies and exploits
weaknesses in telephones instead of computers
 Hacktivist: A hacker who use hacking to send social,
religious, and political, etc. messages. This is usually
done by hijacking websites and leaving the message on
the hijacked website.
 Certain corporations employ hackers as part of their
support staff. These legitimate hackers use their skills
to find flaws in the company security system, thus
preventing identity theft and other computer-related
crimes.

You might also like