What should a beginner hacker learn
There are three types of hackers:
1. White hat
2. Black hat
3. Gray hat.
A white hat (also known as ethical) hacker tries to breach network systems in order to help
businesses and organizations in improving their digital defenses. A black hat hacker,
meanwhile, accesses digital records and/or devices for malicious purposes. A gray hat
hacker is a combination of the first two types: he may be a white hat this time and become
a black hat in the next.
Important Note: There are laws that prohibit black hat hacking. You can get incarcerated if
you’ll try to access digital information without the owner’s permission. Because of that,
this book will help you become an ethical hacker. It will provide you with tips, tricks, and
techniques that you can use in hacking systems ethically
Benefits of Ethical Hacking
To protect yourself from thieves, you need to think like one. This principle serves as the
core of white hat hacking.
The total number of hackers is growing each day. And these people are on a continuous
quest to improve their skills and expand their knowledge. If you will consider the
vulnerabilities that exist in machines and digital networks, you will realize the awful state
of security that people have against hackers. You need to protect your system from the bad
guys. To achieve this goal, you should know how to hack.
The goals of a white hat hacker are:
.Attack a system without destroying it
.Identify system vulnerabilities
.Prove that vulnerabilities exist
.Help in improving the security of his targe
Different Types of Hacking Attacks
Hackers divide their attacks into different types. These types are:
Nontechnical
These techniques focus on the end-users (i.e. the people who use the target devices).
Because humans have a natural tendency to trust others, hackers can break through a
system’s defenses without using any electronic tool. These hackers may use “social
engineering” tactics to obtain a user’s trust and gain access to a network or file. You’ll
learn more about social engineering later on.
A hacker may also implement a physical attack against his target. For instance, he may
break into a computer room and access one or more devices that are present. As an
alternative, he may check the dumpsters in the building and try to look for useful
information (e.g. passwords). Hackers refer to this approach as “dumpster diving”.
Network
Hackers can implement this kind of attack easily, since most networks are accessible
through the internet. The most common forms of network attacks are:
.Accessing a network using a rigged modem
.Taking advantage of vulnerabilities in digital transport mechanisms (e.g. NetBIOS)
.Sending a continuous stream of requests to a network
.Rigging the system and collecting data packets to access confidential information
Operating System
These attacks play an important role in any hacker’s toolkit. That’s because each computer
has an operating system. And there are a lot of tools that you can use to crack the OS (i.e.
operating system) of a computer.
There are a lot of operating systems out there. However, hackers usually focus on the most
popular ones (e.g. Windows systems). Here are some of the OS attacks that you can use:
.Destroying the security of a file system
.Deciphering passwords
.Attacking pre-installed authentication mechanisms
.Taking advantage of vulnerabilities in certain protocol
Application
Some hackers utilize computer programs to attack networks. Often, a hacker gains access
to a machine through a web-based application or an email-related program. The most
popular members of this type are:
.Sending “spam” (i.e. junk mail) to people
.Installing malware (i.e. malicious software) in target systems
.Bypassing security mechanisms (e.g. firewall) through “online” protocols (e.g.
.SMTP, HTTP, IMAP, etc.