Introduction to Hacking
Hacking is the process of achieving control to computer system or computer network without legal authorization. It is the most common activity amongst teenagers and young adults. Many hackers are keen to learn about computer and consider hacking as an art. They want to build program to display their problem solving skills not to harm others. ‘
A hacker first tries their skills on easy target and then after successful professional attacks on more secured site. Their goal is to have complete access on any computer so that they can deal, edit or comply any sites.
Computer h acker are employed by many companies to get complete access on the computer so that they can delete, edit, copy any file or install any program.
These hackers use their skills to find faults in company’s security system so that it can be repaired quickly. Sometime hacking also provides information or changes some financial or personal data. All the type of in authorized access can lead the hacker towards the prison for 20 years.one way of hacking is to get a copy password file which is stored all user names and password in encrypted form or they can also use brute force attack trying all the possible combination of letters. Hacking is also done by emailing a program to anyone that runs automatically.
Black Hat Hackers
Black hat hackers are the bad hackers hacker they access computer system illegally for their purpose.
White Hat Hackers
White hat hackers are the good hacker they are also known as ethical hacker they are employed to protect system from black hat hacker.
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.[
A blue-hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed.
Denial of Service
A denial of service attack is specifically designed to interrupt normal system function and affect legitimate users access to the system. Hostile users send a flood of fake requests to a server, overwhelming it and making a connection between the server and legimate clients difficult or impossible to establish.
Hackers penetrate system illegally to steal information, modify data, or harm the system. Following factors are related to system.
The design deficiency of operating system or application system that allows hijacking, security bypass, data manipulation
A hacking technique used to check TCP/IP ports to reveal the services that are available and to identity the weakness of a computer system in order to explain them.
A hardware and software program to collect network data in order to decipher password with password cracking software.