BASICS OF HACKING




Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context.

Classifications:-

Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie.
White hat:-

A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council , also known as the International Council of Electronic Commerce Consultants has developed certifications, course ware, classes, and online training covering the diverse arena of Ethical Hacking.
Black hat:-

A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.
Part 1: Targeting

The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system.

Part 2: Research and Information Gathering

It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.
Part 3: Finishing The Attack

This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).
Grey hat:-

A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.
Elite hacker:-

A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.
Script kiddi:-

A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature).
Neophyt:-

A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.
Blue hat:-

A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Hacktivis:-

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks. Nation state Intelligence agencies and cyberwarfare operatives of nation states.
Attack:-

A typical approach in an attack on Internet-connected system is:

1. Network enumeration: Discovering information about the intended target.

2. Vulnerability analysis: Identifying potential ways of attack.

3. Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.
Security exploit:-

A security exploit is a prepared application that takes advantage of a known weakness. Common examples of security exploits are SQL injection, Cross Site Scripting and Cross Site Request Forgery which abuse security holes that may result from substandard programming practice. Other exploits would be able to be used through FTP, HTTP, PHP, SSH, Telnet and some web-pages. These are very common in website/domain hacking.
Techniques

Vulnerability scanner:-

A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses.Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)
Password cracking:-

Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.

Packet sniffer:-

A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
Spoofing attack (Phishing):-

A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.
Rootkit:-

A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.
Social engineering:-

When a Hacker, typically a black hat, is in the second stage of the targeting process, he or she will typically use some social engineering tactics to get enough information to access the network. A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system.
Trojan horses:-

A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)
Viruses:-

A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. While some are harmless or mere hoaxes most computer viruses are considered malicious.
Worm:-

Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.

Key loggers:-

A key logger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Some key loggers uses virus-, trojan-, and rootkit-like methods to remain active and hidden. However, some key loggers are used in legitimate ways and sometimes to even enhance computer security. As an example, a business might have a key logger on a computer used at a point of sale and data collected by the key logger could be used for catching employee fraud.

Viruses, Trojans, Worms and Malware.

I. What is Malware?
The word Malware is short for malicious software, and is a
general term used to describe all of the viruses, worms,
spyware, and pretty much anything that is specifically
designed to cause harm to your PC or steal your
information.

II. Viruses --> Wreak Havoc On Your Files. The term computer virus is often used interchangeably
with malware, though the two don’t actually have thesame meaning. In the strictest sense, a virus is a programthat copies itself and infects a PC, spreading from one fileto another, and then from one PC to another when the files are copied or shared.Most viruses attach themselves to executable files, but
some can target a master boot record, autorun scripts, MS Office macros, or even in some cases, arbitrary files. Many of these viruses, like CIH, are designed to render your PCcompletely inoperable, while others simply delete or corrupt your files—the general point is that a virus is designed to cause havoc and break stuff. You can protect yourself from viruses by making certain
your antivirus application is always updated with the latest definitions and avoiding suspicious looking files coming through email or otherwise. Pay special attention to the filename—if the file is supposed to be an mp3, and the name ends in .mp3.exe, you’re dealing with a virus.

III. Spyware --> Steals Your Information Spyware is any software installed on your PC that collects
your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers.
Since spyware is primarily meant to make money at your expense, it doesn’t usually kill your PC—in fact, many people have spyware running without even realizing it, but generally those that have one spyware application installed also have a dozen more. Once you’ve got that many pieces of software spying on you, your PC is going to become slow. What many people don’t realize about spyware is that not every antivirus software is designed to catch spyware. You should check with the vendor to make sure the application you are using to protect you from malware is actually checking for spyware as well. If you come across a PC that is already heavily infected, run a combination of MalwareBytes and SuperAntiSpyware to clean it thoroughly.

IV. Trojan Horses --> Install a Backdoor Trojan horses are applications that look like they are doing
something innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don’t replicate themselves—they must be installed by an unwitting user. Once your PC has been infected with the trojan, it can be used for any number of nefarious purposes, like a denial of service (DoS) attack against a web site, a proxy server for concealing attacks, or even worse—for sending out buckets of spam. Protection against trojans works the same way as viruses—make sure that your antivirus application is up to date, don’t open suspicious attachments, and think long and hard before you try and use a downloaded crack for Photoshop—that’s one of malware authors’ favorite spots to hide a trojan.

V. Worms --> Infect Through the Network Computer worms use the network to send copies of
themselves to other PCs, usually utilizing a security hole to travel from one host to the next, often automatically without user intervention. Because they can spread so rapidly across a network, infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses. Because worms often exploit a network vulnerability, they are the one type of malware that can be partially prevented by making sure your firewall is enabled and locked down.

लंदन से न्यूयॉर्क सिर्फ़ तीन घंटे में!


Image copyrightOSCAR VINALS
ख़्वाब देखना बेहद ज़रूरी है क्योंकि उन्हीं ख़्वाबों को हक़ीक़त में तब्दील करने की कोशिश में कुछ नया होता है. ऐसा ही एक ख़्वाब देख रहे हैं स्पेन के एयरक्राफ़्ट डिज़ाइनर, ऑस्कर विनाल्स. वो एक ऐसा विमान बनाने का ख़्वाब देख रहे हैं, जो परमाणु रिएक्टर से चले और आवाज़ से भी तीन गुनी तेज़ रफ़्तार से उड़े.
उन्होंने अपने ख़्वाबों वाले इस विमान का नाम रखा है 'फ़्लैश फ़ाल्कन'.
अगर यह ख़्वाब हक़ीक़त में तब्दील होता है, तो लंदन के हीथ्रो हवाई अड्डे से आपको न्यूयॉर्क पहुंचने में महज़ तीन घंटे लगेंगे. आपके विमान की रफ़्तार होगी 3680 किलोमीटर प्रति घंटे और और उसका सफ़र भी शाही होगा.
हालांकि 'फ़्लैश फ़ाल्कन' अभी सिर्फ़ एक कल्पना है. मगर ऑस्कर विनाल्स ने इसका एक एनिमेशन वीडियो बनाया है, जो हैलो नाम के वीडियो गेम में दिखने वाले एयरक्राफ्ट जैसा लगता है.
Image copyrightOSCAR VINALS
स्पेनिश इंजीनियर ऑस्कर के डिज़ाइन वाले इस विमान की कई ख़ूबियां होंगी. ये 250 लोगों को लेकर उड़ान भर सकेगा. आवाज़ से भी तेज़ उड़ने वाले कॉन्कॉर्ड विमान से भी तेज़ होगी इसकी रफ़्तार. और, इसके पंख भी आज के विमान से दोगुने बड़े होंगे. इसके इंजनों में इतनी ताक़त होगी कि ये हेलीकॉप्टर की तरह अपनी जगह से ही उठकर उड़ सकेगा.
मगर ऑस्कर के इस कॉन्सेप्ट की सबसे बड़ी ख़ूबी है कि ये एटमी ताक़त से उड़ेगा, आज के विमानों की तरह तेल से नहीं.
ऑस्कर कहते हैं कि वो हाइड्रोजन बम वाली तकनीक, यानी न्यूक्लियर फ्यूज़न से अपने विमान को ताक़त देना चाहते हैं. ऑस्कर के मुताबिक़, हमारी ज़रूरतों का ईंधन, न्यूक्लियर फ्यूज़न ही है. जिसमें दो परमाणुओं के मेल से ऊर्जा बनायी जाती है. हालांकि अभी इस ख़्वाब का साकार होना बहुत दूर की कौड़ी है.
आज की तारीख़ में न्यूक्लियर फ्यूज़न की तकनीक को लेकर कई तजुर्बे हो रहे हैं. इनमें सबसे अहम है फ्रांस में बन रहा फ्यूज़न रिएक्टर आइटर.
Image copyrightOSCAR VINALS
हालांकि ये भी अपने मूल कार्यक्रम से काफ़ी पीछे चल रहा है. कुछ निजी कंपनियां भी फ्यूज़न तकनीक को आज़माने की कोशिश कर रही हैं. फ्यूज़न तकनीक को भविष्य का ईंधन बताया जा रहा है. ये सस्ता भी होगा और इससे एटमी कचरा भी नहीं पैदा होगा.
मगर, अभी इसे बनाने के लिए एक भी रिएक्टर तैयार नहीं हो सका है. ऐसे में ऑस्कर विनाल्स के विमान का सपना पूरा होना अभी बहुत दूर की बात है.
1950 के दशक से ही विमान बनाने वाले इंजीनियर, एटमी रिएक्टर से विमान उड़ाने का ख़्वाब देख रहे हैं. पचास से दशक में आई एटमी तकनीक से सस्ती ऊर्जा तो मिलने लगी. मगर इसमें दिक़्क़त ये थी कि रिएक्टर बहुत बड़े होते थे, लेकिन उसका भी हल बहुत जल्दी निकल आया, जब पानी के जहाज़ों और पनडुब्बियों को एटमी रिएक्टर की मदद से चलाया जाने लगा.
पचास के दशक में विमानों के भी कई नए डिज़ाइन आए. शीत युद्ध के दौरान अमरीका और सोवियत संघ ने एक दूसरे से आगे निकलने की होड़ में कई नई तकनीकें ईजाद कीं. अमरीका ऐसे विमान बनाने लगा, जिन्हें देर तक हवा में रखा जा सके. जिन पर एटमी मिसाइलें तैनात की जा सकें. इस काम में एटमी रिएक्टर काफ़ी मददगार हो सकते थे.
Image copyrightGETTY
क्योंकि उन्हें बार-बार ईंधन के लिए ज़मीन पर उतरने की ज़रूरत नहीं होती. विमान में अगर शिफ्ट में काम करने वाले क्रू मेम्बर होते, तो ऐसे विमान कई दिनों तक हवा में रह सकते थे.
लेकिन, ब्रिटेन के एरोस्पेस टेक्नोलॉजी इंस्टीट्यूट के साइमन वीक्स कहते हैं कि एटमी रिएक्टर से जहाज़ उड़ाने की राह में कई मुश्किलें हैं. इसमें सबसे पहले तो एटमी कचरे को ठिकाने लगाने का इंतज़ाम करना होगा. फिर रिएक्टर के इर्द-गिर्द सुरक्षा घेरे का इंतज़ाम करना होगा. ताकि विमान में सवार मुसाफिर रेडिएशन का सामना न करें.
दुनिया में गिने चुने ही ऐसे विमान हुए हैं जो एटमी रिएक्टर के साथ हवा में रहे हैं. इनमें से एक था अमरीका का B-36 बमवर्षक विमान. ये पचास के दशक की शुरुआत में उड़ा करता था. इसे एटमी ताक़त से उड़ाया नहीं गया था. इसके लिए तेल ही इस्तेमाल होता था. बस इस विमान में एटमी रिएक्टर रखकर उड़ाया गया था. इसके लिए भी इतने इंतज़ाम करने पड़े थे कि विमान का वज़न 11 हज़ार किलो बढ़ गया था.
Image copyrightUS DEPARTMENT OF DEFENSE
फिर, अगर किसी को ये मालूम हो कि विमान में एटमी रिएक्टर है, तो बहुत मुश्किल है कि लोग उस विमान में सफ़र कर सकें.
जानकार कहते हैं कि एटमी ताक़त से उड़ान भरने वाले विमान बनाने में अभी भी पचास से सौ साल का वक़्त लगेगा.
तब तक हमें ऑस्कर विनाल्स के सपने 'फ्लैश फाल्कन' से काम चलाना पड़ेगा. इसकी सबसे ख़ास बात ये है कि ये न्यूक्लियर फिज़न के बजाय न्यूक्लियर फ्यूज़न तकनीक की मदद से उड़ान भरेगा. जिसमें एटमी कचरा नहीं निकलता. जो एटमों की टक्कर से नहीं, उनके मेल से ऊर्जा पैदा करता है.
हालांकि अभी दुनिया में ऐसा कोई रिएक्टर नहीं बना है जो न्यूक्लियर फ्यूज़न से ऊर्जा पैदा कर सके. मगर इस दिशा में कई जगह काम चल रहा है. वैज्ञानिकों को उम्मीद है कि इंसान के पास जल्द ही न्यूक्लियर फ्यूज़न से ऊर्जा पैदा करने की तकनीक होगी. ऑस्कर विनाल्स को भी उसी दिन का इंतज़ार है. हालांकि ये उनकी ज़िंदगी में मुमकिन होगा, ऐसा लगता नहीं.
Image copyrightOSCAR VINALS
जैसे कि फ्रांस में बन रहा फ्यूज़न रिएक्टर आइटर अभी भी तैयार होने में दस बरस का वक़्त लेगा. और अगर ये रिएक्टर कामयाब भी हो जाएंगे, तो चुनौतियों की शुरुआत भर होगी. फिर इतने छोटे फ्यूज़न रिएक्टर तैयार करना होगा जो विमान में लगाए जा सकें.
साइमन वीक्स मानते हैं कि इसमें बीस से तीस साल लग जाएंगे. ऐसा एटमी रिएक्टर बनाना बहुत टेढ़ी खीर है.
आवाज़ से तीन गुना तेज़ गति से उड़ने वाला विमान बनाना तो फिर भी आसान है. मगर उसके लिए ईंधन का जुगाड़ करना टेढ़ी खीर है. आज केरोसीन से विमान उड़ाए जाते हैं. इसका इस्तेमाल बहुत आसान है. इसे सिर्फ़ ईंधन ही नहीं, कूलिंग और लुब्रिकेशन के लिए भी इस्तेमाल किया जाता है. इसमें एक ही दिक़्क़त है कि इससे प्रदूषण बहुत होता है.
Image copyrightGETTY
पूरी तरह से न्यूक्लियर फ्यूज़न से चलने वाले विमान बनने में सौ बरस लगने का अंदेशा है. साइमन वीक्स मानते हैं कि उससे पहले हाइब्रिड विमान बन सकते हैं. जिनमें विमान को ज़मीन से उड़ने के लिए तेल का और फिर हवा में उड़ने के लिए फ्यूज़न एनर्जी का इस्तेमाल हो.
'फ्लैश फाल्कन' का ख़्वाब तो उससे बहुत आगे का है. आज की तकनीक से उसे नहीं साकार किया जा सकता. लेकिन, इंसान ने बहुत से ऐसे ख़्वाब देखे हैं, जो शुरू में ऐसे लगे थे. क्या पता, आगे चलकर ये असंभव बात, संभव में तब्दील हो जाए.

25 Facts you don't know about INDIA

1. Kapil Dev once booted out Dawood Ibrahim from the Indian cricket dressing room

Dawood had access to the Indian dressing room and once tried to bribe the players. Kapil Dev, upon seeing suited men in the room, got furious and chucked them out saying, "chal bahar nikal."

Source: Cricket Country

2. Daenerys' dragons were 'Made in India'!

A subsidiary of Prana Studios in Mumbai is responsible for modelling Daenerys Targaryen's dragons. Well, "Make in India" is working well. (wink!)

Source: Vignette

3. India has an ice hockey team
....and it is registered with the International Ice Hockey Federation!

Source: SportsKeeda

4. Kerala consumes the highest quantity of liquor among all Indian states

It's not Punjab, it's 'God's own country'!

Source: e-Vartha

5. Only 3% of the Indian population pays taxes

Largely because agriculture is tax-free and a large chunk of the economy consists of unorganized labour, for which it's hard to collect taxes. 

Source: Answers

6. There is a radioactive device atop the Himalayas

An expedition, led by Captain Mohan Singh Kohli and CIA expert Kenneth Conboy, placed a nuclear device atop the Himalayas to monitor Chinese nuclear tests in the '60s. The device is still missing as repeated searches couldn't retrieve it!

Source: Emilio Silvera

7. India drinks 50% of the world's whiskey produce

Most of the whiskey is produced by UB India, the world's largest whiskey company by volume. 

Source: Independent

8. Hair is a ₹2500 crore business in India!

Buying and selling hair is a huge business in India. Tirumala Tirupati Devasthanams even holds an e-auction for the hair it tonsures off its devotees! 

Source: Img Arcade

9. India has more people than the entire population of the Western Hemisphere


Source: Terra Color

10. The iconic James Bond theme was inspired from the song 'Good sign Bad sign', sung by Indian characters in the novel 'A House for Mr. Biswas.' 


Source: Hippo Wallpapers

11. GoAir wanted more female attendants to 'save on fuel'

Women weigh less than men, according to GoAir's staff, which is why they thought having more female attendants could help save up on fuel. 

Source: Telegraph

12. There's a Taj Mahal in Bangladesh too

There is a scaled copy of Shah Jahan's Taj Mahal called 'Taj Mahal Bangladesh' in Dhaka.

Source: Wikipedia

13. Maneka Gandhi featured in a towel ad

The ‘Towels so good you want to wear them’ ad featured Maneka Gandhi in it. It was taken down soon!

Source: Imgur

14. Bear Grylls wanted to join the Indian Army

After leaving school, he considered joining the Indian Army and also hiked in the mountains of Sikkim and West Bengal.

Source: Dailymotion

15. Australian cricketer Stuart Clarke is of Indian origin

His father is from Chennai and mother hails from Bangalore. 

Source: Sportzwiki

16. India has an experimental township that has its own economy

Auroville in Tamil Nadu, does not have religion, politics or physical currency.

Source: Taringa

17. Mohun Bagan is older than most European clubs

Formed in 1889, it is older than European giants A.C. Milan, Manchester United, Liverpool etc. It also played a match in 1977 against the New York Cosmos, consisting of star players Pele and Franz Beckenbauer.

Source: Goal

18. There are more phones in India than there are toilets


Source: BBC

19. Samosa is actually from the Middle East


Source: Spice Catering

20. India has a 'village of twins'

Kodinhi in Kerala has 250 sets of twins officially registered. Experts also estimate that the figure could rise to 350. 

Source: Facts Legend

21. An average Indian needs to work for almost 6 hours to afford a 'Big Mac'!


Source: Business Insider

22. "Anal" is a language spoken by 23,000 people in India and Burma


Source: Meme Generator

23. The "Love Commandos" protects inter-caste couples from harassment

These vigilantes provides protection to inter-caste couples who fall in love.


24. The Satiyaa community from Rajasthan celebrates deaths and mourns births

Birth = Grief, Death = Happiness for this tribe

Source: National Geographic

25. Indian housewives hold 11% of the world's gold

That is more gold than the reserves of Germany, IMF, The U.S. and Switzerland put together!
But still, not as much as this guy!