Monday, February 13, 2017

what is Hacking

In this post we will discuss about Hacking and how hackers employ a variety of techniques for hacking. Now a days, data networks became by far the most common target of hackers and hacking.

In computer networking,hacking is any technical effort to manipulate the normal behavior of network. The term "hacking" historically referred to constructive,clever technical work that was not necessarily related to computer systems.Now a days,hacking and hackers are most commonly associated with malicious programming attacks on the internet and other networks.

Hacking is unauthorized intrusion into a computer or a network. The person engaged in hacking activities is generally referred to as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose.

Hackers employ a variety of techniques for hacking: They are

  1. password cracking: The process of recovering passwords from data stored or transmitted by computer systems
  2. Vulnerability scanner: Checks computers on networks for known weaknesses 
  3. Packet Sniffer: applications that capture data packets in order to view data and passwords in transit over networks.
  4. Trojan horse: Serves as a back door in a computer system to allow an intruder to gain access to the system later
  5. Viruses:  self-replicating programs that spread by inserting copies of the same program into other executable code files or documents
  6. Key loggers: This a tool designed to record every keystroke on the affected machine for later retrieval.
  7. Root kit: It represents a set of programs which work to subvert control of an OS from legitimate operators.
 Common networking Hacking Techniques:

Hacking on computer networks is often done through scripts and other network software. These specially designed software programs generally manipulate data passing through a network connection in ways designed to obtain more information about how the target system works. More advanced hackers may study and modify these scripts to develop new methods. A few highly skilled hackers work for commercial firms,hired to protect that company's software and data from outside hacking. 

                            Cracking techniques on networks include creating worms,initiating denial of service(Dos)attacks,or in establishing unauthorized remote access connections to a device.



Requirements for effective hacking the combination of technical skills and personality traits:

  • Ability to work with numbers and a background in mathematics. Hacking often requires sorting through large amounts of data,code and computer algorithms
  • Memory recall and logical reasoning,Hacking involves assembling small facts and details into a plan of attack based on the logic of how computer systems work.
  • patience.Hacks tend to get very complex and require large amounts of time to plan and execute.
 

No comments:

Post a Comment