Professional Documents
Culture Documents
21GECDAU-Ethical Hacking Dr.V.Usharani
21GECDAU-Ethical Hacking Dr.V.Usharani
Dr.V.Usharani
Hacking
• Hacking refers to the misuse of devices like computers, smartphones,
tablets, and networks to cause damage to or corrupt systems, gather
information on users, steal data and documents, or disrupt data-related
activity.
• Hacking is the activity of identifying weaknesses in a computer system
or a network to exploit the security to gain access to personal data or
business data
• System hacking means using computers to commit fraudulent acts such
as fraud, privacy invasion, stealing corporate/personal data, etc.
• An example of computer hacking can be: using a password cracking
algorithm to gain access to a computer system.
Who is a Hacker?
• A Hacker is a person who finds and exploits the weakness in computer
systems and/or networks to gain access.
• Hackers are usually skilled computer programmers with knowledge of
computer security.
Types of Hackers
Hackers are classified according to the intent of their actions. The following
list classifies types of hackers according to their intent:
Symbol Description
https://www.guru99.com/what-is-hacking-an-introduction.html
Devices Most Vulnerable To Hacking
Smart Devices
Smart devices, such as smartphones, are lucrative targets for hackers.
Android devices, in particular, have a more open-source and inconsistent
software development process than Apple devices, which puts them at
risk of data theft or corruption. However, hackers are increasingly
targeting the millions of devices connected to the Internet of Things (IoT).
Webcams
Webcams built into computers are a common hacking target, mainly
because hacking them is a simple process. Hackers typically gain access
to a computer using a Remote Access Trojan (RAT) in rootkit malware,
which allows them to not only spy on users but also read their messages,
see their browsing activity, take screenshots, and hijack their webcam.
Routers
Hacking routers enables an attacker to gain access to data sent and received
across them and networks that are accessed on them. Hackers can also hijack a
router to carry out wider malicious acts such as distributed denial-of-service
(DDoS) attacks, Domain Name System (DNS) spoofing, or cryptomining.
Email
Email is one of the most common targets of cyberattacks. It is used to spread
malware and ransomware and as a tactic for phishing attacks, which enable
attackers to target victims with malicious attachments or links.
Jailbroken Phones
Jailbreaking a phone means removing restrictions imposed on its
operating system to enable the user to install applications or other
software not available through its official app store. Aside from being a
violation of the end-user’s license agreement with the phone developer,
jailbreaking exposes many vulnerabilities. Hackers can target jailbroken
phones, which allows them to steal any data on the device but also
extend their attack to connected networks and systems.
Prevention from Getting Hacked
• Software Update
• Use Unique Passwords for Different Accounts
• Avoid Clicking on Ads or Strange Links
• Change the Default Username and Password on Your Router and Smart Devices
ortinet.com/resources/cyberglossary/what-is-
hacking
Why Hackers Hack
• Hacking is a casual hobby for some Hackers — they just hack to see
what they can hack and what they can’t hack, usually by testing their
own systems.
• Many Hackers are the guys who get kicked out of corporate and
government IT and security organizations. They try to bring down the
status of the organization by attacking or stealing information.
• Some Hackers want to make your life miserable, and others simply
want to be famous
• Some common motives of malicious Hackers are revenge, curiosity,
boredom, challenge, theft for financial gain, blackmail, extortion, and
corporate work pressure.
Steps Performed By Hackers
1. Reconnaissance
2. Scanning
3. Gaining Access
4. Maintaining Access
5. Clearing Track
Phase I: Reconnaissance
Reconnaissance can be described as the pre-attack phase and is a
systematic attempt to locate, gather, identify, and record information
about the target.
The Hacker seeks to find out as much information as possible
about the target
Phase II: Scanning and Enumeration
Scanning and enumeration is considered the second pre-attack
phase.
This phase involves taking the information discovered during
reconnaissance and using it to examine the network.
Scanning involves steps such as intelligent system port scanning
which is used to determine open ports and vulnerable services.
In this stage the attacker can use different automated tools to
discover system vulnerabilities
Phase III: Gaining Access
This is the phase where the real hacking takes place.