Hacking – A General Misconception

WHAT IS HACKING?

Hacking is an art and the one who does this is called the artist/hacker. So what is this art about? The art of hacking involves bypassing/getting access to anything which is usually not accessible unless you have certain rights/keys. Let me give you a general example to demonstrate the art of hacking.

ART OF LOCK-PICKING

There is a lock and a key that opens up the lock. Now an artist who is called as a hacker in this scenario will try to understand the mechanism for opening the lock with the key. When he studies the lock mechanism, he finds out that same lock can be opened up with a picking tool using certain techniques which are usually referred as Algorithms in computing. So he applies his algorithm using picking tools and finally opens up and gains access.

Analogy with computer/network systems: Similarly in terms of computing hacking is defined as unauthorized access to any of system controls using certain techniques.

LOCK COMPUTER/NETWORK SYSTEM

KEY LOGIN DETAILS

PICKING TOOLS HACKING TOOLS / CODES / SCRIPTS /EXPLOITS

MECHANISM SYSTEM ARCHITECTURE

 

So why would one do this?

There can be two answers. Either someone wants to explore system vulnerabilities and make it more secure or he wants to exploit the vulnerability for some antisocial agenda.

Broadly, There are 3 major classification of hackers:

THE BLACK HATS: The one who is against everything and has the sole purpose of destruction.

THE WHITE HATS: The one who wants to know and explore systems.

THE GREY HATS: The one whose purpose is neither ethical nor unethical. They do it for awareness /political agenda / exposing scams etc.

 

Here I give to you some broad classifications of domains in HACKING WORLD which I’ll be discussing later:

SOCIAL ENGINEERING <MIND IS THE SOUL OF SYSTEM>

PASSWORDS CRACKING <E-MAILS, SOFTWARE FILES, WEB SERVERS, LOGIN PORTALS>

SYSTEM HACKING <TWEAKING PERFORMANCE, BYPASS SYSTEM LOGINS, ROOT….>

VIRUS AND MALWARE ANALYSIS <DESTRUCTIVE CODING, SHELL SCRIPTS, PYTHON CODES >

EXPLOITS AND VULNERABILITIES <USING VULNERABLE EXPLOITS ON NETWORKS>

CRYPTOGRAPHY <ART OF DECEPTION>

ANDROID <MOBILE APP CRACKING, ROOTING >

 

CYBER WORLD:

This century is called as cyber century and the warfare is on digital platform. Get yourself equipped and protect yourself.

 

!!! INFORMATION PROVIDED IS FOR KNOWLEDGE PURPOSE. AUTHORS NOT RESPONSIBLE FOR ANY FURTHUR CONSEQUENCES FROM THE INFORMATION PROVIDED!!!

 

 

An article by AKASH THAKUR

Contact him at: facebook.com/akashrajputsky

Leave a Reply

Your email address will not be published. Required fields are marked *