Sunday, 4 December 2011

TYPES OF HACKING ATTACKS

                            There are various types of hacking attacks  :>>>>


1. VIRUS ATTACK:The most common attack is virus attack.They are self duplicating programs that infects and attach with other executable files on victims system.




2. WORMS:worms are self-replicating programs or code fragments that attach themselves to other programs or machines (worms).Worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.


3. TROJAN HORSE: Trojan is a malicious program disguised as something benign. Trojans are often downloaded along with another program or software package. Once installed on a system, they can cause data theft and loss, and system crashes or slowdowns . Many Trojans are used to manipulate files on the victim computer, manage processes, remotely run commands, intercept keystrokes, watch screen images, and restart or shut down infected hosts.


4.BACK DOORS: backdoor is a program or a set of related programs that a hacker installs on a target system to allow access to the system at a later time. A backdoor’s goal is to remove the evidence of initial entry from the system’s log files. But a backdoor may also let a hacker retain access to a machine it has penetrated even if the intrusion has already been detected and remedied by the system administrator.




5. DENIAL OF SERVICE: A DoS attack is an attempt by a hacker to flood a user’s or an organization’s system.DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).Distributed DoSs (DDoS5) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses. 


6.SNIFFING: Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister. Sniffers are used to capture traffic sent between two systems. Depending on how the sniffer is used and the security measures in place, a hacker can use a sniffer to discover user names, passwords, and other confidential information transmitted on the network.


7. SPOOFING:  Spoofing is the act of sending an        illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.


8. PHISHING: Phishing involves sending an e-mail, usually posing as a bank, credit-card company, or other financial organization. The e-mail requests that the recipient confirm banking information or reset passwords or PIN numbers. The user clicks the link in the e-mail and is redirected to a fake website. 


9. INSIDE JOBS: Most security breeches originate inside the network that is under attack. Inside jobs include stealing passwords (which hackers then use or sell), performing industrial espionage, causing harm (as disgruntled employees), or committing simple misuse. Sound policy enforcement and observant employees who guard their passwords and PCs can thwart many of these security breeches.


10. ROGUE ACCESS POINTS:Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) Rogue APs are most often connected by well-meaning but ignorant employees.




                         only for educational and knowledge purposes

Security, Functionality, and Ease of Use Triangle



As a security professional, it’s difficult to strike a balance between adding security barriers to prevent
an attack and allowing the system to remain functional for users. The security, functionality,
and ease of use triangle is a representation of the balance between security and functionality and
the system’s ease of use for users. In general, as security increases, the system’s functionality
and ease of use decrease for users.
SECURITY (INCREASES)
FUNCTIONALITY(DECREASES)
EASE OF USE(DECREASES)
AND VICE VERSA 

TYPES OF HACKERS

                                MAINLY HACKERS ARE OF THREE TYPES
>>> WHITE HAT.
>>> BLACK HAT.
>>> GREY HAT.

WHITE HAT :White Hats are the good guys, the ethical hackers who use their hacking skills for
defensive purposes. White-hat hackers are usually security professionals with knowledge of hacking and the hacker tool set and who use this knowledge to locate weaknesses and implement.
countermeasures.

BLACK HAT : Black hats are the bad guys: the malicious hackers or
crackers who use their skills for illegal or malicious purposes. They break into or otherwise violate the system integrity of remote machines, with malicious intent. Having gained unauthorized access, black-hat hackers
destroy vital data, deny legitimate users service, and basically cause problems for their targets.
Black-hat hackers and crackers can easily be differentiated from white-hat hackers because their
actions are malicious

GREY HAT :Grey hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker. Both are powerful forces on the Internet,
and both will remain permanently. And some individuals qualify for both categories. The
existence of such individuals further clouds the division between these two groups of people...

ONLY FOR EDUCATIONAL PURPOSE

How Do Malicious Hacker Hack?

A HACK ATTACK CAN BE DISSECTED INTO


Reconnaissance( ist phase)
This is the phase where the attacker gathers information about a target using active or passive means.




Scanning(second phase)  
In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited.



Gaining Access(third phase)
If vulnerability is detected, the attacker can exploit it to gain access into the system.



Maintaining Access(4th phase)
Once the attacker gains access, he usually maintains his access to fulfill the purpose of his entry.


Covering Tracks(last phase)

Most attackers attempt to cover their tracks so that they cannot be detected or penalized under criminal law.


    Saturday, 3 December 2011

    HACKERZ MESSAGE TO THE WORLD

    Hackers often call them self as ANONYMOUS. 
    They say>>>>>>>>






    We r anonymous,but we don't hack the humanity.......
    We hate studies, but we love technology....
    World can't change us, but we can change the world.......
    We don't have Books, but we have revolution in mind.......
    We R The Rarest Common RACE On Earth,
    MEET US,
    WE ARE ANONYMOUS,
    WE ARE LEGION,
    WE DO NOT FORGET, 
    WE DO NOT FORGIVE,
    EXPECT US.....
          The Corrupt - FEAR US 
          The Honest - SUPPORT US
          The Heroic - JOIN US
      

    Fail 2011 Year of the Hack


    According to IT Security Experts YEAR 2011 have labelled as "Year Of the Hack" or "#Fail 2011".Hacking has become much easier then Ever before, which is why year 2011 had lot of hackings happen so far.
               Hackers are coming up with tools as well as finding new methods of hacking faster than companies can increase their security.
      Every year is the year of hacking as hackers ready to execute their new malicious programs and attain their goals stealing and gathering information from their victims.
    2011 could produce another generation of Hacking