Cyber Hacker Project 1
Cyber Hacker Project 1
National Rehabilitation
University
Subject
Information technology
Topic
Cyber hacking
Submitd to Submited by
Dr vijeta dua mam Vaibhav Shukla
Faculty of Law 10-semester
D.S.M.N.R.U D.S.M.N.R.U
ACKNOWLEDGEMENT
PRINCIPLES OF HACKING
In this article, attacks and hacking techniques are two different concepts
that are, nevertheless, closely related to each other. An attack typically
goes through several steps or phases. In each phase, some attack actions
will be carried out by the hacker, and these attack actions will typically
involve the use of one or more hacking techniques. The hacking
techniques involved in different attack phases could be different.
Moreover, an attack or hacking (software) tool may cover several phases
of an attack and involve multiple hacking techniques.
Reconnaissan
Probe
Toehold
Toehold is to exploit security weaknesses and gain entry into the system.
Once a vulnerability is found, the intruder will first exploit this
vulnerability to build a connection (or session) between his machine and
the target host, and then remotely execute hostile commands on the
target. (For example, the intruder can generate an X terminal emulation
on his own display.) In this way, a toehold into the target network has
been established and the intruder can go further to compromise the
system. Gaining entry into the system, the intruder can also search for
more critical system information. If the current user identification (UID)
is for a privileged user, the intruder will jump to the stealth step;
otherwise, he will get into the advancement phase.
Overview of Hacking Toolkits
Password Crackers
Bugs in Software
Dumpster Diving
Trash is not trash in the eyes of a serious hacker. Trash usually contains
shattered and incomplete information. The intruder can sift through
garbage of a company to find and recover the original information so
that he can break into the company’s computers and networks.
Sometimes, the information is used as an auxiliary to help intrusion,
such as making social engineering more credible.