Hacking
Hacking
COURSE: BIT
YEAR: I
SESSION: II
TASK: COURSEWORK
QUESTION
Traditional view of hackers is a lone rogue programmer who is highly skilled in coding and
modifying computer software and hardware systems. But this narrow view does not cover the
true technical nature of hacking. Hackers are increasingly growing in sophistication, using
stealthy attack methods designed to go completely unnoticed by cyber security software and IT
teams. They are also highly skilled in creating attack vectors that trick users into opening
malicious attachments or links and freely giving up their sensitive personal data.
As a result, modern-day hacking involves far more than just an angry kid in their bedroom. It is a
multibillion-dollar industry with extremely sophisticated and successful techniques.
HISTORY OF HACKING/HACKERS
Hacking first appeared as a term in the 1970s but became more popular through the next decade.
An article in a 1980 edition of Psychology Today ran the headline “The Hacker Papers” in an
exploration of computer usages addictive nature. Two years later, two movies, Tron and War-
games, were released, in which the lead characters set about hacking into computer systems,
which introduced the concept of hacking to a wide audience and as a potential national security
risk.
Sure enough, later that year, a group of teenagers cracked the computer systems of major
organizations like Los Alamos National Laboratory, Security Pacific Bank, and Sloan-Kettering
Cancer Center. A Newsweek article covering the event became the first to use the word “hacker”
in the negative light it now holds.
This event also led Congress to pass several bills around computer crimes, but that did not stop
the number of high-profile attacks on corporate and government systems. Of course, the concept
of hacking has spiraled with the release of the public internet, which has led to far more
opportunities and more lucrative rewards for hacking activity. This saw techniques evolve and
increase in sophistication and gave birth to a wide range of types of hacking and hackers.
Kevin Mitnick's Biography. Born Aug 6, 1963, Kevin David Mitnick grew up immersed in the
era of newly emerging phone and computer technology. And, boy, did it fascinate him
Unauthorized Code Execution. Or bot. Thus, the very aspect of possessing unprecedented
access can lead to an infecting an Unauthorized Code Execution motives can be a bit
complicated. Typically, hackers aim at computer. Running unauthorized code can be one of the
first steps in turning a user's computer into a zombie user with malware to take control of said
user's computer via the execution of a code or commands. This extremely powerful form of
hacking permits hackers to take complete control of the victim’s unlimited number of suspicious
activities that a hacker can accomplish without even a trace of being caught.
Money. No surprises here, a lot of hackers are simply motivated by money. Hackers don’t just
hack businesses and ask for a ransom, they also try hacking into regular user accounts and try to
take advantage of things like online banking, online retail or anywhere where financial
transactions are involved. In 2020 the biggest ransom ware attack occurred called WannaCry
where millions of computers around the world were hacked and users had to pay a ransom to get
access back to their computers. Hackers will infiltrate a company’s database of credit card
information and use it to generate duplicate credit cards or steal the identities of victims. Once an
identity is stolen, the thief can open up credit accounts in the victim’s name and ring up
thousands of dollars in charges. Larger organizations are obviously a more attractive target to a
hacker, but ransom ware against individuals via phishing schemes can also attract a sizable
payout.
Steal/Leak Information. One of the most common reasons for hackers to hack is to steal or leak
information. This could be data and information about your customers, your employees or
private business data. One of the biggest and most public examples of this, is the Ashley
Madison hack, where hackers were able to break into the customer database and get access to all
of the site’s information. This incident was a big shakeup in the world of technology and hugely
affected the lives of many people.
Disruption. These hackers don’t care about money or data; they seem to feel that they have a
higher purpose in life. Sometimes known as ‘Activism’, some hackers are driven by a specific
purpose. They take it upon themselves to expose injustice. Some have political, environmental,
religious or moral motives, and they are hacking in an attempt to be heard, make a difference and
to promote a particular agenda. A major example is the activist group ‘Anonymous’ who have
been known worldwide for challenging and taking down many governments.
Espionage. Espionage is another type of theft except, instead of direct financial gain, the
hackers are seeking protected information. Both governments and private organizations can be
victims of information theft, and the information stolen can be either sold or used by adversaries
to gain tactical advantages. Generally speaking, those who hack into governments are seeking
state secrets while those who hack into private organizations are seeking trade secrets.
Spamming. Some malware can take over your web browser’s systems and overwhelm you with
unwanted ads. It’s from this that spammers are able to steal passwords so they can use your e-
mail or social media accounts to spam others in an attempt to sell products.
Vulnerability Testing. One of the best ways to test your systems and security measures is to
have it hacked. Many Cyber security firms, government agencies, and a number of large
businesses actively employ hackers to test their systems, locate vulnerabilities, and
develop protections.
Fun. A lot of hackers will tell you that breaking into a secure system is an enjoyable hobby that
tests their knowledge and skills. For these people, the only motivation is to gain some experience
and have some fun. Yes crazy but true!
White hat hackers. can be seen as the “good guys” who attempt to prevent the success of black
hat hackers through proactive hacking. They use their technical skills to break into systems to
assess and test the level of network security, also known as ethical hacking. This helps expose
vulnerabilities in systems before black hat hackers can detect and exploit them. The techniques
white hat hackers use are similar to or even identical to those of black hat hackers, but these
individuals are hired by organizations to test and discover potential holes in their security
defenses.
Grey Hat Hackers. Grey hat hackers sit somewhere between the good and the bad guys. Unlike
black hat hackers, they attempt to violate standards and principles but without intending to do
harm or gain financially. Their actions are typically carried out for the common good. For
example, they may exploit a vulnerability to raise awareness that it exists, but unlike white hat
hackers, they do so publicly. This alerts malicious actors to the existence of the vulnerability.
DEVICES MOST VULNERABLE TO HACKING
Smart Devices. Smart devices, such as smartphones, are lucrative targets for hackers. Android
devices, in particular, have a more open-source and inconsistent software development process
than Apple devices, which puts them at risk of data theft or corruption. However, hackers are
increasingly targeting the millions of devices connected to the Internet of Things (IoT).
Webcams. Webcams built into computers are a common hacking target, mainly because hacking
them is a simple process. Hackers typically gain access to a computer using a Remote Access
Trojan (RAT) in rootkit malware, which allows them to not only spy on users but also read their
messages, see their browsing activity, take screenshots, and hijack their webcam.
Routers. Hacking routers enables an attacker to gain access to data sent and received across
them and networks that are accessed on them. Hackers can also hijack a router to carry out wider
malicious acts such as distributed denial-of-service (DDoS) attacks, Domain Name System
(DNS) spoofing, or crypto mining
Email. Email is one of the most common targets of cyber-attacks. It is used to spread malware
and ransom ware and as a tactic for phishing attacks, which enable attackers to target victims
with malicious attachments or links.
Jailbroken Phones. Jailbreaking a phone means removing restrictions imposed on its operating
system to enable the user to install applications or other software not available through its
official app store. Aside from being a violation of the end-user’s license agreement with the
phone developer, jail breaking exposes many vulnerabilities. Hackers can target jail broken
phones, which allows them to steal any data on the device but also extend their attack to
connected networks and systems.
Avoid Clicking on Ads or Strange Links. Advertisements like pop-up ads are also widely used
by hackers. When clicked, they lead the user to inadvertently download malware or spyware onto
their device. Links should be treated carefully, and strange links within email messages or on
social media, in particular, should never be clicked. These can be used by hackers to install
malware on a device or lead users to spoofed websites.
Change the Default Username and Password on Your Router and Smart Devices. Routers
and smart devices come with default usernames and passwords. However, as providers’ ship
millions of devices, there is a risk that the credentials are not unique, which heightens the
chances of hackers breaking into them. It is best practice to set a unique username and password
combination for these types of devices.