Who is black hat hackers?|What is black hat hackers?|Types and Techniques of hacking

To know about the nature of black hat hackers.

anonymous

What is mean by black hat hackers?

A black hat hacker is an individual with extensive computer knowledge whose purpose is
to breach or bypass internet security. Black hat hackers are also known as crackers or
dark-side hackers. The general view is that, while hackers build things, crackers break
things. They are computer security hackers that break into computers and networks or also
create computer viruses. The term “black hat” comes from old westerns where the bad
guys usually wore black hats.
Black hat hackers break into secure networks to destroy data or make the network
unusable for those who are authorized to use the network.
They choose their targets using a two-pronged process known as the “pre-hacking stage”.
Step 1: Targeting
Step 2: Research and Information Gathering
Step 3: Finishing the Attack

What does it take to become a hacker?

Becoming a great hacker isn’t easy and it doesn’t happen quickly. Being creative helps a
lot. There is more than one way a problem can be solved, and as a hacker you encounter
many problems. The more creative you are the bigger chance you have of hacking a
system without being detected. Another huge quality you must have is the will to learn
because without it, you will get nowhere. Remember, Knowledge is power. Patience is also
a must because many topics can be difficult to grasp and only over time will you master
them.


hacking is illegal

Types of hacking 

A typical approach in a hacking attack on Internet-connected system is:
  • Network enumeration: Discovering information about the intended target.
  • Vulnerability analysis: Identifying potential ways of attack.
  • Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.
In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.

Techniques of hacking

  1. Vulnerability scanner: A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are “open” or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)
  2. Password cracking: Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
  3. Packet sniffer: A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
  4. Spoofing attack (Phishing):A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.
  5. Rootkit: A rootkit is designed to conceal the compromise of a computer’s security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.
  6. Trojan horses: A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)
  7. Viruses: A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. While some are harmless or mere hoaxes most computer viruses are considered malicious.
  8. Worms: Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms “virus” and “worm”, using them both to describe any self-propagating program.
  9. Key loggers: A key logger is a tool designed to record (‘log’) every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user’s password or other private data. Some key loggers uses virus, trojan, and rootkit-like methods to remain active and hidden. However, some key loggers are used in legitimate ways and sometimes to even enhance computer security. As an example, a business might have a key logger on a computer used at a point of sale and data collected by the key logger could be used for catching employee fraud.
only for educational purpose.

1 Comments

Previous Post Next Post