What is hacking??



In a simple language I can say that hacking is a process of gaining information from another system to your system.

Why there is a need of hacking    
 
Most times, this security measure is used by network administrators for obvious security purposes. However, hackers can also infiltrate this security tactic to gain unauthorized access, which can open the door to other infiltration tactics and motivations.

Is hacking illegal or legal  

We can say illegal when you are fetching or collecting anyone's private information then it is illegal.
Hacking as such is not illegal. The kinds of things that are illegal (depending on jurisdiction) are "theft of services" or "unauthorized access to a computer system" or "fraud". ... If I do it to your computer, that's illegal unless you gave me permission.

When hacking becomes illegal 

The Computer Misuse Act deems it an offense to hack into a system belonging to someone else, or to send them a virus that will allow you to obtain private information. There are exceptions to this, of course. Many websites like Google actually offer bounties for anyone who can crack into their system, as the assistance of white-hat hackers can help to make their system stronger against legitimate threats. This said, you’ll want to make sure that a website’s owners want it to be hacked before you take a shot at it. Some companies won’t take it lightly and may pursue legal action against a benign hacker.
The law punishes hacking under the computer crime statutes. These crimes carry penalties ranging from a class B misdemeanor (punishable by up to six months in prison, a fine of up to $1,000, or both) to a class B felony (punishable by up to 20 years in prison, a fine of up to $15,000, or both).

Do you know the importance of hacking exactly  

Ethical hacking is a way of objectively analyzing an organization's data security structure. A new league of IT professionals called white hat hackers or ethical hackers are emerging and gaining prominence. The job of an ethical hacker is to purposefully penetrate security systems to fix these weak points. 


Types of hackers

There are Three Types of Hackers. The three types of hackers are the white hat hacker, the grey hat hacker, and the black hat hacker. Each type of hacker hacks for a different reason, a cause, or both. All have the required skills needed to accomplish their mission. 
  1. White Hat Hackers -The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.
  2. Grey Hat Hackers-The term "grey hat", alternatively spelled as "greyhat" or "gray hat", refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  3. Black Hat Hacker-A black hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
What types of tools hackers use  
  
1 – Metasploit Framework
The tool that turned hacking into a commodity when it was released in 2003, the Metasploit Framework made cracking known vulnerabilities as easy as point and click. Although sold as (and used by white hats) as a penetration testing tool, Metasploit’s free version is still where most neophyte hackers cut their teeth.  
2 – Nmap
Nmap is a free and open-source security scanner, originally written by Gordon Lyon, used to discover hosts and services on a computer network, thus building a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses.

3 – OpenSSH
OpenSSH is a suite of low-level tools that rights many of the wrongs built into the original network-level utilities in most Internet operating systems.

4 – Wireshark
Wireshark is the de facto standard in network protocol analysis tools. It allows deep inspection and analysis of packets from hundreds of different protocols, from the ubiquitous TCP to the exotic CSLIP.

5 -Aircrack-ng 
Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic.

A hacking tool is a program designed to assist with hacking, or a piece of software which can be used for hacking purposes. Examples include Nmap, Nessus, John the Ripper, p0f, Winzapper, mSpy and iKeyMonitor.

What programming do hackers use     

Programming is the basic skill that a hacker should possess and master. If you don't know any programming languages, start by learning a basic language like Python or Java. ... However, if you want to target some specific areas of hacking, you must choose the programming languages wisely.
 It's best, actually, to learn all five of Python, C/C++, Java, Perl, and LISP. Besides being the most important hacking languages, they represent very different approaches to programming, and each will educate you in valuable ways.

Requirements of Ethical hackers in India 

In India companies like wipro ,infosys and IBM are interested in employing ethical hackers. Moreover salaries are higher than other areas of IT.According to Nasscom, India will require at least 77,000 ethical hackers compared to the present figure of 15,000.Also A Certified Ethical Hacker (CEH) earns an average salary of Rs 367,249 per year. Most people with this job move on to other positions after 10 years in this career. Experience strongly influences pay for this job.  

When to start learning ethical hacking and requirement for getting job as a ethical hacker


This is a concept which you can start anytime in your life and ethical is a very big course which will take to understand for that you should have some programming and coding knowledge requires.It's common for information security analysts to obtain Certified Information Systems Security Professional (CISSP) certification, which can be done by completing an exam after earning a bachelor's degree. Certified Ethical Hacker (CEH) certification, which typically involves five days of training, is also available.  
It is not necessary get job and go to the company, in field if you have knowledge of Ethical Hacking you can get job at your home by contacting the companies which needs security or requirement of Ethical hacker.


The top 10 countries with most cyber criminals that have expertise in hacking

1. CHINA

China is the most notorious country when it comes to hacking.This has also led to an increase in cybercrime and rise in the number of cyber criminals. According to various estimates 41% of the world’s cyber attacks have their genesis in China. It is believed that organized hacker networks are run in China which are supported by People’s Liberation Army of China. The purpose is to mostly hack in U.S govt networks and those of its allies.

2. United States of America

USA is responsible for 10% of cyber attacks in the world. Many famous hacking groups such as Masters of Deception (MOD); Legion of Doom (LOD); Level7; and Cult of the Dead Cow, originated in America. The whole hacking scene started in America where the computer age first began.

3. Turkey

A surprise in the top 3 is Turkey which is responsible for 4.7 percent of the hacking in the world. Black-Spy and Whoole are handles used by Turkish hackers. TurkHack Team recently celebrated Victory Day by hacking 350 websites.

4. Russia

Russia hosts very powerful hackers who along with other Eastern European hackers are considered to be some of the strongest and most dangerous hackers in the world. Russia contributes to about 4.3 percent of the world’s cyber attacks. Top companies around the world such as Microsoft, Apple, Nokia, Facebook, Twitter etc. are on the radar of Russian hackers.

5. Taiwan

Taiwan claims to be free but China claims it is one of their provinces. Whatever be the political scenario, Taiwan alone contributes to 3.7 percent of the worldwide cyber attacks. Taiwan is a hub for internet piracy and a large number of computers in Taiwan have been infected by malware.

6. Brazil

Brazil is responsible for about 3.3 percent of the world’s hacking attacks. Brazil has become a major hub outside Europe and Asia for hackers. A large part of the population in Brazil is online and their banks have been pioneers in the use of electronic money. This has also given rise to cyber criminals who like to steal that electronic money.

7. Romania

Romania is another small European country that has a large population of hackers. About 2.8 percent of hacking attacks come from Romania. Ramnicu Valcea is a small town in Romania that has become a global hub for hackers and a safe haven for cyber criminals. It has been nicknamed “Hackerville” because of all the cyber thefts that originate from this small town.

8. India

India is a leading country in IT and computer science and this shows in the world of hacking as well. About 2.5 percent of hacking in the world happens from India. Hackers sometimes also turn to activism and protest censorship of the internet.

9. Italy

Italy contributes about 1.6 percent of the cyber attacks around the world. Luigi Auriemma and Donato Ferrante are two famous Italian hackers who work for ReVuln, a company that hacks government websites and provide information about the security threats.

10. Hungary

Hungary is a small European country but it is responsible for 1.4 percent of the world’s hacking attacks. Many European countries have a strong culture of hacking and Hungary just made it into the top 10, closely beating South Korea.








 


 

Post a Comment

0 Comments