System hacking
Information gathering from previous phases is required to perform the hack.From footprinting and scanning attacker gather information about the target and finds the vulnerability.Now using the same vulnerability, in the phase of system hacking, attacker performs the actual HACK.
Password Cracking
Password cracking attacks are of following types:
Passive online Cracking :
In this, an attacker tries to authenticate into a system by cracking the passwords using brute force, dictionary attacks or rainbow tables.There is no surety of getting successful and this method is quite complex and time-consuming.Active online cracking :
In this, the attacker generally guesses the password in order to gain access to the system.Generally, bad passwords and open authentication points are vulnerable to active online cracking.Although it consumes a lot of time and is a less efficient way.
Offline attacks :
In this, an attacker tries to exploit Lan manager hash (LM hash), they are much vulnerable because of short length and short key they used.they are also time-consuming.generally, in offline attacks, attacker performs dictionary, hybrid or brute force attack.Non-electric media attacks :
This generally required technical medium.Generally, Shoulder suffering, dumpster diving, and social engineering are used to gain the password.Hardware keylogger can also be used to stiff each and every type of keyboard.This is commonly used in non-electric media attacks.Default password database :
Many websites contain the database of default usernames, passwords, ports and various information of networking or other devices.some websites are as follows :
www.defaultpasswords.com
- https://cirt.net/passwords
Manual hacking cracking:
- Ping the target network to check whether it is live or not.
- Make a list of all the possible passwords(easily available online).
- Define the priority of each password on the basic of key defined.
- Try to get access using password, in case of failure.again try with a different password.
keyloggers
keyloggers are specially designed softwares or hardwares which are use track keystroke activities of the target system.They may also track every activity of the target system depending on the various keyloggers.
They are of two types:
Software-based keyloggers :
Software-based are installed on a target system.They have the ability to run into the background without getting caught by antivirus.They track every keystroke and anonymously send all the data to the attacker on a fixed interval of time.Hardware-based keyloggers :
Generally, a hardware is connected to keyboard and CPU, this intermediate hardware device track every keystroke typed and save them into proper log files, which is accessible by an attacker.
Types of hacking:
white hat :
A white hat hacker is someone who has non-malicious intent whenever he breaks into system and whatnot.In fact, a large number of white hat hackers are security experts themselves who want to push the boundaries of their own IT security ciphers and shields or even penetration testers specifically hired to test out how vulnerable or penetrate a present protective setup currently is.A white hat that does vulnerability assessments and penetration tests is also known as an ethical hacker.
Black hat :
A black hat hacker, also known as a cracker, is the type of hacker that has malicious intent whenever he goes about breaking into computer security systems with the use of technology such as a network, Phone number, or computer and without authorization.His malevolent purposes can range from all sorts cybercrimes such as piracy, identity theft, credit card fraud, vandalism, and so forth.He may or may not utilize questionable tactics such as deploying worms and malicious sites to meet his ends.
Grey hat :
A grey hat hacker is someone who exhibits traits from both white and black hats.More to the point, this is the kind of haker that is not a penetration tester but will go ahead and surf the internet for vulnerable systems he could exploit.like a whitw hat, he will be inform the administration of the website of the vulnerabilites he found after hacking through the site.Like the black hat and unlike a pen tester, he will hack any site freely and without any prompting or authorization from owners whatsoever.He will even offer to repair the vulnerable site he exposed in the first place for a small fee.
Elite Hacker :
As with any socity, better than average people are rewarded for their talent and treated as special. This social status among the hacker underground, the elite (or, acco9rding to the hacker language the eventually devolved into leetspeak, 31337) are the hacker among the hackes in this subculture of sorts.They are the master of deception that have a solid reputation among their peers as the cream of the hacker crop.
Script Kiddie :
A script kiddie is basically an amateur or nonexpert hacker wannabe who breaks into people's computer systems, not through his knowledge in IT security and the ins and outs of a given websites, but through the prepackaged automated scripts, tools, and software written by people who are real hackers,unlike him.he usually has little to known knowledge of the underlying concept behind how those scripts he has on hand works.
NEXT WILL BE HOW TO MAKE VIRUSES (PRACTICAL)THANK YOU........




