what is hacking - noob-hackers

breaking

Sunday, 2 December 2018

what is hacking

what is hacking- Hi guys if you don't know anything about what is hacking, And you are searching for an easy and simple explanation about what is hacking, Then you are at the right place.

Today I am here Going to share some useful information about hacking for you guys. So that by this"what is hacking" Article You can get all information about hacking and cybercrime and more. And am damn sure that you will not find such good information anywhere else.

what is hacking

what is hacking 

what is hacking?

Hacking is identifying weakness in computers, servers, and networks to exploit its weakness to gain access to databases and privacy.

guys nowadays technology is improving and weakness of computers also, So hacker's are taking advantage of the weakness in computers and servers and they are hacking them in a fraction of minute., As you guys have seen in many sci-fi films that how hackers hack the computers by simply sitting in one place and getting the database information. Actually, that's not really hacking it's just a film and it is not enough to have single computers and servers they need to be networked to do communication with other computers. This exposes the computers and servers to the outside world and hacking. The real meaning of hacking is using technological devices like computers, servers, and other gadgets to commit fraud, privacy invasion, stealing important databases etc... Every year the cyber crimes cost many organizations billions of dollars. The computers and servers which are used for business purposes need to be highly protected against
such dangerous attacks.

in this post, we are going to learn all about hacking related topics

  1.  who is the hacker? types of hackers 
  2.  types of cybercrime?
  3.  what is ethical hacking?
  4.  why ethical hacking?
  5.  some famous hackers?

Who is a hacker? Types of hackers in the world 

A hacker is a person who finds a weakness in computers and servers to gain access. Hackers are usually skilled computer programmers and computer experts and they have good knowledge of technological gadgets and technology more than a common person and they also known as penetration testers. The hackers use some os(operating system) for hacking and penetration testing like Linux, parrot, anonymous, nethunter etc. And in the hacking world, there is a category of hackers 

Types of hackers

the following list of hackers describes according to their actions

Ethical hacker (White hat hacker):
what is hacking
A hacker who is C|E|H (certified ethical hacker) from any institution. They hired in organizations like government, private etc.. and they work as a legal hacker in organizations to fix the weakness in computers and to protect computers and servers from dangerous cyber attacks and also they are known as penetration testers.

Cracker (Black hat hacker):
what is hacking
A hacker who gains unauthorized access to any computer or servers for personal gain. They don't get hired from anyone they work for themselves the intention of this type of hackers 
is usually to steal private data of organizations, violating privacy rights, cracking premium software, transferring money from bank accounts illegally

Grey hat hacker (between ethical and black hat hackers):
what is hacking
A hacker who is between white hat hacking and black hat hacking they just find the weakness of computers and access them anonymously without the permission of owner after
finding a security threat in a computer they reveal them to the system owner. sometimes they get hired for legal works and also for illegal works.

Script kiddie (penetrations testers): 
what is hacking
A non-skilled person who gains access to servers or computer systems using already made tools they are also known as penetration testers. they usually use some social engineering methods 
and some os (operating systems) for hacking

Hacktivist:
what is hacking
A hacker who uses hacking to share social, religious, and political, and some secret messages this is usually done by hijacking websites (hacking websites) and changing the real web page to 
their message on the hacked website.

phreaker:
what is hacking
A hacker who identifies weakness in telephone and Android devices instead of computers and servers. This type of hackers are rare nowadays.

Spammers:
Spammers:
A hacker who sends fake links, advertisements and malware links to peoples computers and to their mobile phones through the SMS and e-mails.

What is a cybercrime?

Cybercrime means using a computer, and servers for illegal activities like spamming, online bullying, spreading malware, viruses, trojans, performing illegal fund transfers etc. Most cybercrimes are committed through the internet. some of them through android devices and via
emails and SMS and also from some chatting applications. Nowadays everything is being hacked by the hackers so we have to be careful.

Types of cyber crimes


the following list explains common types of cybercrimes:
1. Computer fraud: the act of using a computer to take or alter electronic data or to gain unlawful use of a computer or system.

2. Privacy violation: sharing personal information of a person such as an email address, phone number, account details etc. on websites and social media platforms

3. Identity theft: Stealing some sensitive data of a person and impersonating that person.

4. Sharing copyrighted files/information: This involves distributing copyrighted and protected files such as software, images, eBooks, data, etc. This is also known as piracy.

5. Electronic money laundering: In this using computers to convert black money into white money means laundering money.

6. ATM fraud: This involves storing ATM card details such as card details, pin, account number etc. These details are then used to withdraw money illegally from stored accounts.

7. Denial of Service Attacks (DOS): This involves the use of computers and mobile phones from different locations to attack targeted servers with a view of shutting down temporarily.

8. Spamming: Sending unauthorized emails and SMS. Actually contains advertisements and hacking links.

What is Ethical Hacking?

guys hacking and ethical hacking are same but there is bit difference so come on let's discuss it
Ethical Hacking is exploiting a weakness in computers and servers and coming with countermeasures that protect the computers and servers. Ethical hackers must work by following rules.

1. Getting permission from the owner of a computer system or server before exploiting a weakness of computer.

2. Protect the privacy of the organization which is been hacked by hackers.

3. Handling all the exploited weakness of computers or servers to the owner or organization.

4. Informing hardware and software vendors of the identified weakness. To the organizations.

5. Getting certified by the institutions 

6. Protecting and transferring data of a particular organization to a safe place before it gets hacked

Why Ethical Hacking? is it useful for us?


Nowadays security threats have been increased and hackers also so we are not protected we think now we have to learn some basic things of technology to secure yourself in the technological world. I am not saying that we must learn hacking and start doing hacking am just trying to say that we have to  secure yourself from illegal hackers by simple learning some basic things like how to protect social media accounts and private data in computers its simple no need to go deeper in hacking if you are willing to go deeper in hacking world and learn hacking from basics to advance then you can refer our blog or you can get C|E|H certification from ec-council 

1. Information or clients data is one of the most valuable things for an organization keeping information secure can protect an organization's image and value and it saves organizations a lot of money

2. Hacking can lead to loss of million dollars in business purposes of organizations that deal in finance such as Paypal. Ethical hacking puts illegal hackers away from them 
the organizations who would otherwise lead to loss of business.

is Ethical Hacking is legal?


Yes, ethical hacking is legal if the hacker follows the rules which mentioned above list in What is Ethical Hacking?

now the last thing to know is how to become hacker I know that the people who are reading this
post are not normal persons they are interested in hacking and technology. Now the big question arises that how to become a hacker and how to get certified that's not big thing its just simple you need to get certified from ec-council which is a worlds best institution of technology I hope so you can refer that website for more info 

After all the last thing is to know about some famous hackers of the world I hope you would be inspired by these legends.

Famous Hackers


some of the famous Hackers and how they became famous hackers

1. Jonathan James
what is hacking
Jonathan James
in 1999, at the age of 16, he just hacked several computers by breaking sensitive passwords of a server that belongs to NASA and stole sensitive source code of international space station among other sensitive information 

Jonathan James was an American hacker, At the age of 16, he sent to prison for cybercrime in the United States. After that, a sad moment appeared that he committed suicide in 2008 from his own gun he shot himself



2. Ian Murphy
what is hacking
Ian Murphy

lan Murphy, also known as Captain Zap, at one point of time was having high school students steal computer sensitive data and passwords and equipment for him. And the plan is known as "the first hacker ever who convicted of a crime". Jan's career as a master hacker was done in 1986 after he and his unemployed wife decided to form some type of business. He has a long history in computers and internet frauds. One of his favorite games is to forge Email headers and to send out third party malware or ad threat letters.



3. Kevin Mitnick 
what is hacking
Kevin Mitnick

Kevin Mitnick is a computer security consultant and author, Who helped his client's companies to exploit their security strengths, weakness, and dangerous loopholes He is the first hacker who is noted as "most wanted" criminal in posters of FBI. He was formerly the most wanted cybercriminal in the history of the United States.

From the 1970s up until his last arrested in 1995, he skilfully bypassed corporate security safeguards and found his way into some of the most well-guarded computer systems like Sun Microsystems, Digital Equipment Corporation, Motorola, Netcom, and Nokia.



4. Mark Abene 
what is hacking
Mark Abene

mark abene, known around the world by his invention Phiber Optik, He is an information security expert and entrepreneur. He was a high -profile hacker in the history of 1980s and early 19190s.
He was one of the first hackers to openly debate and secure the positive merits of ethical hacking as a beneficial tool for the industry.

His is an expert in penetration testing and his expertise spreads across penetration studies, on-site security assessments, secure code reviews, security policy review and generation, systems and network architectures, system administration and network management, among many others, his clients include American Express, UBS Fire USA, Ernst and Young, KpmG and others.



5. Johan helsinguis
what is hacking
Johan helsinguis

johan helsinguis, also known as Julf came into the limelight in the 1980s when he started operating the world's most famous anonymous remailer, called penet.fi.

johan was also responsible for the development of products for the first Pan-European ISP (internet service provider), Eunet international.

he is at present, a member of the board of technologia incognita, a hackerspace association in Amsterdam, and supported the communication companies of the 
worldwide with his expert cyber knowledge





6. Linus Torvalds
what is hacking
Linus Torvalds

linus Torvalds is also one of the best hackers of all time. He just invented the Kali Linux also known as Unix, the very popular Unix based operating system. linux is open source and thousands of developers have contributed to its kernel. However, Torvalds remains the ultimate author of on that new code is incorporated into the started kali Linux kernel, As of in 2006, approximately  two percent of the Kali Linux kernel
was written by Torvalds himself.

he just aspires to be a simple and most have fun by creating the worlds most secured and worlds best operating system. After the great achievement Torvalds has received honorary of a doctorate from Stockholm University and the University of Helsinki.



7. Robert Morris 
what is hacking
Robert Morris 

robert morris, also known as the creator of Morrie's worm, the first computer worm has been unleashed on the internet. The worm had the capacity to slow down targeted computers and sometimes shut them down and make them no longer usable. As a result of this, he was sentenced to 3 years probation, 400 hours of community and also, he had to pay a penalty amount of $10,500 dollars.

Morris is currently working as a professor at the MIT Computer Science and Artificial Intelligence Laboratory.




8. Gary Mckinnon
what is hacking
 Gary Mckinnon
                                                                                                                                         
Gary McKinnon is a best system administrator and hacker. He was famous at the time and he exploited the "biggest military computer hack of all time". and he hacked database of the secret are 51 to expose the reality of aliens and he had success in his work

Final words

 So guys thanks for visiting our blog. I hope you find our article "what is hacking"helpful for you please do share and comment your thought about this article and keep visiting to get hacking and gaming and lot more tools and news for free. thank you!

No comments:

Post a Comment