0% found this document useful (0 votes)
12 views

assignment 2 of pp

Uploaded by

aminfurqan631
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

assignment 2 of pp

Uploaded by

aminfurqan631
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Assignmen

t #2
NAME: MUHAMMAD FURQAN AMIN
ID: FA24-BSE-044
Class: BSE-1A
Subject: Professional Practice
Instructor: Mr. Shehzad Ali
Date: 20th Oct 2024
Deadline: 23rd Oct 2024
What is Hacking?
Hacking is when someone breaks into a computer system or network without permission. The
goal is usually to steal information, cause damage, or take control of the system. Hackers
look for weaknesses in software or trick people into giving up important information.

How Do Hackers Hack?

Hackers use different tricks to break into systems. Here are some common methods they use:

1. Tricking People (Social Engineering):


o Phishing: Hackers send fake emails or create fake websites to trick people
into giving up things like passwords or credit card numbers.
o Pretending (Pretexting): Hackers might pretend to be someone else, like tech
support, to convince you to share personal information or access to your
account.
o Baiting: They might offer something tempting, like free software or music,
which actually contains harmful programs that infect your computer.

2. Finding Weaknesses in Software:


o Exploiting Bugs: Hackers find flaws in software that haven't been fixed yet,
known as "zero-day exploits." They use these to break into systems.
o Buffer Overflow: Hackers make a system crash by entering too much data
into a form, giving them a chance to sneak in harmful code.
o SQL Injection: They trick websites into revealing data by inserting special
commands in the input fields (like login forms).

3. Guessing Passwords (Brute Force):


o Hackers use programs that try many different password combinations until
they find the right one. This works best when passwords are weak or easy to
guess.

4. Intercepting Communication (Man-in-the-Middle):


o Hackers can listen to or change the data being sent between two devices (like
your computer and a website) without you knowing. This can happen on
insecure public Wi-Fi networks.

5. Overloading a System (Denial of Service):


o Hackers can overload a website or server with so many requests that it crashes
or becomes too slow for real users to access. A larger version of this attack,
using many computers at once, is called a Distributed Denial of Service
(DDoS) attack.

Tools Hackers Use:

Hackers have different tools to help them with their attacks. Some of these include:

1. Malware Programs:
o Metasploit: A tool that helps hackers find and exploit weaknesses in systems.
o Viruses and Ransomware: Programs created to infect and take over
computers.

2. Keyloggers:
o These tools record everything you type on your computer, like passwords, and
send that information back to the hacker.

3. Network Monitors:
o Wireshark: A tool ha ckers use to capture and see data being sent over a
network. They use it to find unprotected information.

4. Password Crackers:
o Tools like John the Ripper or Hashcat help hackers guess passwords by
trying many possibilities until they get the right one.

5. Botnets:
o Hackers can take control of lots of infected computers and use them together
to launch large-scale attacks, like DDoS attacks.

6. Trojans:
o These are programs that pretend to be useful but secretly give hackers access
to your computer once installed.

You might also like