3. What is Hacking
Hacking is an attempt to exploit a computer system or a private network
inside a computer. Simply put, it is the unauthorised access to or control over
computer network security systems for some illicit purpose.
Hacking is usually doing something which you are not allow to do
Ex.
Viewing information
Viewing other privacy
4. Type Of ‘HACKERS’
1. Black hat hacker :-
Hack without permission and leak our data and steal money, steal
password, steal information.
2. White hat hacker :-
Hack with permission and do not leak our data ,do not steal money and do
not anything steal .
3. Grey hat hacker :-
Hack without permission but do not leak our data.
5. Why learn HACKING
Good scope of Career
Hacking is best for your career and you get higher earning.
Make Knowledge the power
Hacking develops your logic and build the knowledge.
Test system security
If you learn hacking then you can check whether you are safe or not.
6. What are the various qualities a hacker
should posses
Good coder
Well knowledgeable person both hard ware as well as software.
Should have knowledge on security system.
Trusted person.
7. Which system require for hacking ?
Kali linux
The ‘KALI LINUX’ operating system is use to hacking .
Kali linux provides all tools for ethical hacking and hacker use this operating
system.
BackBox
BackBox Linux is an Ubuntu-based operating system that is used for security
assessment and penetration testing.
8. New system for Ethical Hacking
Parrot Security OS
Parrot Security OS is a mixture of
Frozenbox OS and Kali Linux.
Moreover, this highly customizable
hacking operating system also comes
with a strong community support.
This is develop by Frozenbox Team.
The last Version of this os is parrot
4.1.
9. Hacker language
1->I or l
3->e
4->a
7->t
9->g
O->o
$->s
|->i or
||->n
||->n
|v|->m
S->z
Z->s
F->ph
Ph->f
X->ck
Ck->k
11. Hacking - process
Foot printing
Footprinting (also known as reconnaissance) is the technique used for gathering
information about computer systems and the entities they belong to.
Scanning
Scanning is a set of procedures for identifying live hosts, ports, and services,
discovering Operating system and architecture of target system, Identifying
vulnerabilities and threats in the network. ... Scanning refers to collecting more
information using complex and aggressive reconnaissance techniques.
Gaining access
Gaining access is the most important phase of an attack in terms of potential
damage, although attackers don't always have to gain access to the system to cause
damage.
Maintaining access
The 5 Phases of Hacking: Maintaining Access. Once an attacker
gains access to the target system, the attacker can choose to use both the system and
its resources and further use the system as a launch pad to scan and exploit other
systems, or he can keep a low profile and continue exploiting the system.
12. Hacking prone areas
North america, 67%Europe, 23%
New zealand, 6%
Australia, 2%
South america, 2%
Middle east, 4%
Asia,
6%