Welcome to The Engineering Articles
What is Hacking?
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker .
Or
Computer Hacking is a practice of peeping into the extreme technical details of any computer application, program, or the whole system in order to extend its capabilities or alter its functionalities. People who rightly follow this practice of hacking are termed as ‘hackers’ . A hacker’s vision towards solving any technical problem is undoubtedly beyond the perception of any normal computer expert.
This practice can either be ethical or unethical.
The activity where one breaks into the system but do not violate its security and credentials is called Ethical Hacking . Ethical hackers aim to bring into the administrator’s notice, vulnerabilities and voids in the system thereby, improvising the robustness and security. They are purely tech- geeks with immaculate programming skills and hands-on knowledge on both computer hardware and software. On the other hand, there are people who can though break into systems, get access to secured accounts but their actions are usually unauthorized while they make a backdoor entry into your system. These people (often misinterpreted as hackers) are called as ‘crackers’ . They try and crack passwords, security codes, etc using various hacking softwares which are already available. Such softwares are meant to break the code using millions of trials programmed into it by other hackers.
While hacking can prove really useful when companies hire hackers to keep a check on the security of their network and transactions, it may be equally harmful even to an individual operating his/her personal computer sitting at home.
Footprinting
Footprinting is an analogous step which hackers take before gaining access into any network. The systematic footprinting of an organization enables attackers to create a complete profile of an organization’s security posture like system architecture, network blocks and IP addresses exposed on the Internet .
Hackers gain reconnaissance of the target following a sequence of steps as:
1. Open Source Footprinting- The first step a hacker takes is to visit the website of a potential target. He then looks for contact information of the administrators which may help in guessing the password or in Social Engineering.
2. Network Enumeration- This is the next step in gaining information where the hacker tries to identify the domain names and the network blocks of the target network.
3. Scanning- Once the network block is known, the next step is to spy for active IP addresses on the target network. The Internet Control Message Protocol (ICMP) is a good alternative for identifying active IP addresses.
4. Stack Fingerprinting- Once the hosts and port have been mapped by scanning the target network, the final footprinting step can be performed. This step is called stack fingerprinting. This is the process of determining the operating system and different version of services running on target hosts.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them. Due to the mass attention given to blackhat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime. This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them, from who the term itself originated.
What is Hacking?
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker .
Or
Computer Hacking is a practice of peeping into the extreme technical details of any computer application, program, or the whole system in order to extend its capabilities or alter its functionalities. People who rightly follow this practice of hacking are termed as ‘hackers’ . A hacker’s vision towards solving any technical problem is undoubtedly beyond the perception of any normal computer expert.
This practice can either be ethical or unethical.
The activity where one breaks into the system but do not violate its security and credentials is called Ethical Hacking . Ethical hackers aim to bring into the administrator’s notice, vulnerabilities and voids in the system thereby, improvising the robustness and security. They are purely tech- geeks with immaculate programming skills and hands-on knowledge on both computer hardware and software. On the other hand, there are people who can though break into systems, get access to secured accounts but their actions are usually unauthorized while they make a backdoor entry into your system. These people (often misinterpreted as hackers) are called as ‘crackers’ . They try and crack passwords, security codes, etc using various hacking softwares which are already available. Such softwares are meant to break the code using millions of trials programmed into it by other hackers.
While hacking can prove really useful when companies hire hackers to keep a check on the security of their network and transactions, it may be equally harmful even to an individual operating his/her personal computer sitting at home.
Footprinting
Footprinting is an analogous step which hackers take before gaining access into any network. The systematic footprinting of an organization enables attackers to create a complete profile of an organization’s security posture like system architecture, network blocks and IP addresses exposed on the Internet .
Hackers gain reconnaissance of the target following a sequence of steps as:
1. Open Source Footprinting- The first step a hacker takes is to visit the website of a potential target. He then looks for contact information of the administrators which may help in guessing the password or in Social Engineering.
2. Network Enumeration- This is the next step in gaining information where the hacker tries to identify the domain names and the network blocks of the target network.
3. Scanning- Once the network block is known, the next step is to spy for active IP addresses on the target network. The Internet Control Message Protocol (ICMP) is a good alternative for identifying active IP addresses.
4. Stack Fingerprinting- Once the hosts and port have been mapped by scanning the target network, the final footprinting step can be performed. This step is called stack fingerprinting. This is the process of determining the operating system and different version of services running on target hosts.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them. Due to the mass attention given to blackhat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime. This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them, from who the term itself originated.
No comments:
Post a Comment