Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

What is hacking and how its works

Author: Ahmad Ali
by Ahmad Ali
Posted: Jul 01, 2020

What is Hacking, Anyway? "Hacking," which originates from a Germanic word meaning "to cut in pieces," is the process of compiling information (or anything, really) together in a novel way that results in something interesting or useful. In a computer context, the word originated with a positive connotation—for example, Steve Wozniak, one of Apple’s original founders, was an exceptional hacker. If someone want to became hacker then you learn some things in bigning number one is computer skills how to access internet works,what is doss comande and how its work,what is rigestry and how to edit rigestry and second thing programming language skills,networking skills,Third is database skills like what is database and how its work.Hacker reads the structure of any app in which their interist they read the structure so carefully that they detect the weakness of the app and hit their security Note:There are numbers of hacker.Here are most common terms used to describe hacker and what they do. White Hat White hat hackers operate ethically as penetration testers. They have full, contractual permission to try and compromise a system, and operate legally. Their goal is to find system vulnerabilities and improve system security. Black Hat These hackers are the typical hoodie-wearing midnight hackers depicted in the media. They operate illegally, and exploit systems for some kind of personal gain. Grey Hat Grey hat hackers operate on the fence. Most of the time, they hack with good intentions, but might not have approached the hack in a totally ethical or legal way. Why Do People Hack? Hacking mostly has a bad connotation—but hacker motives vary across the black, white, and grey spectrum. Here are the most common motives behind hackers. Quick Money Hackers are often motivated by obtaining stolen credit card information or selling breached information online. Hacktivism Hacktivism is the use of hacking techniques to leverage political activism. Hacktivists often manipulate sites and networks as a form of protest. This usually looks like a distributed denial of service (DDoS) attack, which disrupts network access. Anonymous is a famous hacktivist group. National Security/Cyberwarfare Stuxnet is a widely known example of a national security backed hacking strategy. Stuxnet is a computer worm that attacked Iranian nuclear facilities. The worm is presumed to be a joint effort between American and Israeli intelligence agencies. National cyber hacks tend to be extremely successful, as their teams have the resources and patience to find vulnerabilities and exploit them. Improve Security Systems As touched on earlier, penetration testers or white hats hack systems to test vulnerabilities to improve security. For Fun? Many hackers hack simply because they can. For some people, hacking is like a hobby—as with most pursuits, it’s another reason to connect with a community of like-minded individuals. There Are Two Main Types of Hacks Hacking strategies fall into one of two categories, regardless of what shade a hacker’s hat is. Category 1: Zero-Day The first category of hacks are never-seen-before vulnerabilities, also known as zero-day vulnerabilities. They are the most damaging because they are not patched. Security teams do not know how to defend against them, and often don't even realize a system has been compromised. The hackers behind these attacks are highly-skilled, scary-smart hackers. For the most part, hackers "save" these attacks for something that has a huge financial return. Zero-day attacks are usually carried out on multinational businesses or national security systems. Heartbleed was a zero-day exploit publicized in 2014 against Linux servers. (For those of you thinking, "it's ok, I use Mac/Windows," Linux servers comprise nearly 96.6% of public internet servers.) Shockingly, there is no way of knowing how many people knew about and used the exploit before it was made public—and the code that Heartbleed exploited was introduced three years before its vulnerabilities were ever publicized. Category 2: Everything Else The majority of present day hacks use code that has been written by someone else and released into the wild. This kind of hacker is often called a script kiddie—they use pre existing software to launch attacks and don’t have much, if any, programming expertise. A script kiddie process looks like this: Downloads a malicious code or script Targets it at someone or something on the internet they don't like Hits "run" These hacks are fairly easy to defend against if a computer is updated. "One of the most common ways 'done before' attacks are created is by watching the security updates for Windows, noticing the vulnerabilities they closed, and attacking those vulnerabilities on servers that haven't updated on time." —Nick Turner, CISO, Echosec Systems Security organizations are very good at pushing security updates once hacks have been discovered and the code is released. If a kid can find a script online, so can a security professional. corporate office windows analysts How Does Someone Hack a Computer? Here is an easy, step-by-step process for hacking a computer: Ask the operator for the password. Sign in. Seriously. Social engineering, the practice of manipulating people to divulge information, is by far the easiest method of gaining access to a computer system. Users might not intentionally give away their password—but some guile, psychology knowledge, and a touch of trickery are more than enough for hackers to get what they want. This might seem like an exaggeration ("I would never fall for that...")—but a surprising number of people willingly give their information away after viewing a well-composed phishing email. A few years ago, a hacker stole the Twitter ID @N (which is apparently valued at $50,000) through some clever phone calls. Basically, the hacker called Paypal and used social engineering tactics to obtain the victim’s last four credit card digits. He then called the victim’s website hosting company, GoDaddy, and used the credit card information to reset passwords. The hacker then held the victim’s business website hostage until the victim was forced to give up @N. Programming-based hacking is significantly harder, involving a lot of effort to find exposed vulnerabilities. Hackers exploit vulnerable code to gain full system administrative privileges. Many basic hacks require a "needle in a haystack" approach to find insecure pieces of a program's code—and not just any misbehaving code will work. It must fail in a way that benefits the hacker. Did you know?: If someone has physical access to a computer for an extended period of time, there is very little you can do to stop them from gaining data access. Hackers Seem So Cool In The Movies, Though! Hacking isn't nearly as glamorous as Hollywood portrays. It's a lot of brute force experimentation and guesswork that can take months (or more). Here is a great example of what hacking isn't. In the clip, two people are trying to defend from a hack by furiously typing while thousands of popups barrage the screen. More hands on a keyboard are not helpful, nor do most hackers advertise their presence on a system with annoying pop-ups.

Read more at:

Copyright ©

About the Author

My name ahmadhumaiz and i am from Pakistan i can make my blog with my name this blog contain articles about different this it also contain movies and song lyrics and song for download

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
  • Guest  -  5 months ago

    This artical help me thanks

Author: Ahmad Ali

Ahmad Ali

Member since: Jun 11, 2020
Published articles: 1

Related Articles