Skip to main content

Noob’s Guide: The Basics – Hacking Methodologies

Welcome back hackers! Here we are again to continue with our module 1 and in this tutorial we are going to discuss the basic methodologies of hacking. If you haven’t read my previous article about the series overview then kindly read it to know what all we are going to explore in the ‘Noob’s Guide Series’.

What is Ethical Hacking?

Hacking to me is a skill that every computer user must be aware of. Well, by being aware, I mean of the security measures that must be taken while we are on a public network or in other words, on internet.

Being specific, few decades back, when the word ‘hacking’ was not evolved into the true sense of crime, it was meant to quote computer geeks who generally never meant to cause any harm. As years went on, the word has evolved into a new meaning, i.e., cyber crime. Therefore, a new phrase has come to existence to define the actual meaning of hacking and that is ‘Ethical Hacking’.

Who is a hacker anyway?

A person who performs hacking is known to be a hacker. Now a days, due to sophistication of advanced tools such as Metasploit everybody is or can be a hacker.

Types of hackers

Basically, hackers are classified into four types:
White Hat: Computer professionals trained or possessed with hacking skills who use their skills in a defensive way fall under this category of hackers.
Black Hat: Computer professionals with extraordinary computing skills wanting to cause harm or damage to a system come under Black Hat and are also known as crackers.
Gray Hat: These are the individuals who work in both offensive and defensive way depending on the requirement at various times.
Script Kiddies: Non-professional individuals who are basically beginners and are not trained fall in this category. These kind of hackers mostly rely on hacking tools are considered negligible in the hacker community.

Different phases of hacking (Hacking Methodologies)

Hacking is divided into five important phases. They are:
Reconnaissance or Information Gathering: In this phase the attacker is supposed to collect all the possible information available about the victim or target before he attacks and without the target’s awareness. A legitimate attacker spends approximately 90% of his attack time on reconnaissance. This is generally a preparatory phase where the attacker seeks to gather information about the victim prior to launching an attack.

Basically, there are two types of reconnaissance. One is passive and another one is active.

Active reconnaissance: This includes extracting or gathering information about the victim without direct interaction with the target or victim i.e., through Google, social media sites and press releases.

Passive reconnaissance: This type reconnaissance involves a direct interaction with the victim i.e., through telephone or other means.
Scanning: This refers to the pre-attack phase where the attacker actually starts interacting with the system by looking for open ports and daemons on live systems in the network. A typical attacker uses this phase for enumeration and for finding vulnerabilities in the system on the basis of information gathered during the reconnaissance phase. This phase includes use of port scanners, network mappers, vulnerability scanners etc. The attacker extracts the information such as computer names, IP addresses, user accounts prior to launching attack.
Gaining Access: This is exactly where the real hacking begins. Once the attacker is done pointing the loopholes in the system he goes ahead into the exploitation process and that is what known to be gaining access. Here, the attacker tries all the possibilities to bypass the security and leverage into the system. The attacker tries to escalate the privileges on the victim’s machine to obtain the complete control of the system.
Maintaining Access: So now that the attacker has got the access into the system he has to retain his access for future. That is because the vulnerability may be patched up and hence in this phase the attacker plants Backdoors or a Trojans or Rootkits for future access into the system. Further, the attacker may even secure the system to avoid being owned by other attackers. Attacker may also use the compromised system to launch further attacks.
Clearing Tracks: This phase is the most important phase that every attacker must take care of. That is deleting the system logs or also known as clearing tracks. Nobody wants to get behind bars therefore this is the phase where an attacker wipes off his evidence on the target machine to avoid being prosecuted.

Skills of an Ethical Hacker:
Network Expert: An ethical hacker must have a sound knowledge in networking and should be in a position to understand the network terminologies.
Computer Geek: He is also expected to be well worse in basic computing stuff such as understanding the computer jargons and must have a strong grasp on the practical understanding over the latest and updated systems.
Platform Knowledge: A hacker should be able to mage his tasks on cross platform manner. That is he must have experience to work on different operating systems.
Security Expert: Good defense is obviously what is expected from an ethical hacker. An ethical hacker needs to be an information security expert and more importantly he should also be good at pointing gaping holes in the system.
Technical Knowledge: Typically, this is the foundation for any hacker, because an ethical hacker will only be able to pen-test applications when he is able to understand the inner workings of the software.

That’s all for this tutorial, in the next article we’ll look at the terms that will be commonly used across this field and also in this series. Hence that would be quite important for beginners to survive in the hacker’s community.

If you are looking for a video tutorial to better understand this article in a much better way then kindly watch this video embedded below.

Comments

Popular posts from this blog

JNTU-K B.Tech R10 All Results | Manabadi | Schools9 | jntuk.edu.in

Hi Friends...! It is some what difficult to search the all regular and supply results in google from manabadi, schools9 or from jntuk.edu.in for JNTU-Kakinada B.Tech students of R10 Regulation. So, that for this purpose Results Release team collected all the results and providing you to check the results of jntuk r10 regulation.  JNTU-K R10 B.Tech All Results [2010-14] JNTU-K R10 B.Tech All Results [2011-15] JNTU-K R10 B.Tech All Results [2012-16]

Adobe Acrobat XI Pro 11.0.0 Multilanguage (Cracked dll )

(Size: 530 MB) Adobe® Acrobat® XI Pro is more than just the leading PDF converter. It's packed with smart tools that give you even more power to communicate. Easily, seamlessly, brilliantly. NEW Edit text in a PDF - Fix a typo, change a font, or add a paragraph to your PDF as easily as you do in other applications using a new point-and-click interface. NEW Convert PDF files to PowerPoint - Get a head start on new projects by saving a PDF file as a fully editable PowerPoint presentation. NEW Create new PDF and web forms - Customize professional templates or design from scratch with the Adobe FormsCentral desktop app included in Acrobat XI Pro. IMPROVED Standardize routine PDF tasks - Make it easy to create PDFs consistently. Guide people through the correct series of steps with Actions. NEW Edit images in a PDF - Resize, replace, and adjust images in your PDF with no need to track down the original file or graphic.

The anatomy of anxiety

Mac OS X 10.8 Mountain Lion ISO Untouched OS download

Description I noticed that there are no complete and untouched Mountain Lion ISO images uploaded on any torrent sites. The only one available had its boot sector stripped so it could fit onto a 4.7 gb dvd. Therefore it is not bootable or very hard to boot! So here is a untouched copy of Mountain Lion in the ISO format. It will require a dual layer dvd to burn!  This iso was made by opening the golden master "InstallESD.dmg" in disk utility and converting it to a cd/dvd master. Macs use the extension ".cdr" for raw image files so I then changed it to ".iso". Now it is completely compatible to be burned with any iso image burner available! To burn on a mac in disk utility simply change the extension back to ".cdr".