Basic Concept - Hacking
Learning Community
Introduction
 Hacking is an Art of Exploitation. You can say that Getting unauthorized access to
Some Online Files, Websites, Emails etc is Hacking, Finding Defects, Flaws, and
Vulnerabilities and later exploiting them to get access.
 What do you think when you hear the word hacking? You actually think of breaking
the security through some Automatic Magical softwares and getting an
unauthorized access to systems. Actually it is wrong. We will classify it later and
will come to know different types of hacking and hackers.
 Cybersecurity is the body of technologies, processes and practices designed to
protect networks, computers, programs and data from attack, damage or
unauthorized access. In a computing context, the term security implies
cybersecurity.
 Hacking means to check for security holes in order to make security. For example
if you want to protect your house from thieves, you will first check the gates of
your house and weakness in it before the thieves in order to cover those
weakness. Same goes for computer, network and web application hacking.
Types of Hackers
Black Hat Hackers
 Black hat hackers are those
hackers that get an unauthorized
access to your computers,
networks and web applications for
their own profit. They are intended
to cause damage and steal data.
These type of hackers are known
as cyber criminals.The most
Dangerous Type of Hackers.
White Hat Hackers
 White hat hackers are known as
ethical hackers or the security
guys. They check for vulnerabilities
and weaknesses in a system in
order to patch those flaws legally.
They get the permission from the
owner of companies in order to
test the security.
Magic of Facebook Hacking
 Well If you are here to learn Facebook hacking, then you are wrong and
shouldn’t be here. Hacking is much more than that. Facebook hacking or
social networks hacking is not really an easy process. It’s not like that you will
be given a software through which you will be able to hack all people. This is
absolutely wrong concept. If somebody offers you a software to hack
Facebook then he must be spamming or giving you a Trojan. Nothing is
impossible. Facebook accounts and all those social networking IDs can be
hacked and there are many ways to do so.
 Phishing
 Keylogging
 Ratting
 Social Engineering (the art of Human Hacking)
What is Phishing?
 The fraudulent practice of sending emails purporting to be from reputable
companies in order to induce individuals to reveal personal information, such
as passwords and credit card numbers, online”
 This is definition of phishing. Through phishing, somebody can hack your
Facebook account. For example you receive a link from your best friend
asking you to join a community or something else. When you open that link, a
Facebook login page opens which asks you for your username and password
and you fill those fields, these credentials will directly go to your friend. This
is an example of phishing. Basically a fake page pretending to be original.
Keylogging
 Key logging means to capture keystrokes of keyboard.
 This is most simplest definition of key logging. This can be done through
plenty of softwares available on internet. For example if your friend sends
you a file which is actually a virus or a keylogger, when you open it. You are
now trapped and all of your keystrokes will be recorded and will be send back
to the attacker. This is how attackers normally hacks Facebook.
Ratting
 RAT stands for remote administration tool. It is a piece of software that hacks
down the computer system and normally an attacker can steal everything
from your computer. He/she can upload, delete copy, move and can perform
different unauthorized actions. It can also capture keystrokes. Basically the
difference between key logger and ratting is that keylogger can only record
keystrokes while RAT gives complete access to the attacker. Same is the
scenario of your friend sending you a file and then you open it and that’s it.
You are now victim. Thousands of rats and keyloggers are being binded with
other softwares in order to make things look real while they are not.
Thanks for Watching
Clear your Concept, Open your mind for Hacking, and wait for next lecture. :-)

Introduction to Hacking

  • 1.
    Basic Concept -Hacking Learning Community
  • 2.
    Introduction  Hacking isan Art of Exploitation. You can say that Getting unauthorized access to Some Online Files, Websites, Emails etc is Hacking, Finding Defects, Flaws, and Vulnerabilities and later exploiting them to get access.  What do you think when you hear the word hacking? You actually think of breaking the security through some Automatic Magical softwares and getting an unauthorized access to systems. Actually it is wrong. We will classify it later and will come to know different types of hacking and hackers.  Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cybersecurity.  Hacking means to check for security holes in order to make security. For example if you want to protect your house from thieves, you will first check the gates of your house and weakness in it before the thieves in order to cover those weakness. Same goes for computer, network and web application hacking.
  • 3.
    Types of Hackers BlackHat Hackers  Black hat hackers are those hackers that get an unauthorized access to your computers, networks and web applications for their own profit. They are intended to cause damage and steal data. These type of hackers are known as cyber criminals.The most Dangerous Type of Hackers. White Hat Hackers  White hat hackers are known as ethical hackers or the security guys. They check for vulnerabilities and weaknesses in a system in order to patch those flaws legally. They get the permission from the owner of companies in order to test the security.
  • 4.
    Magic of FacebookHacking  Well If you are here to learn Facebook hacking, then you are wrong and shouldn’t be here. Hacking is much more than that. Facebook hacking or social networks hacking is not really an easy process. It’s not like that you will be given a software through which you will be able to hack all people. This is absolutely wrong concept. If somebody offers you a software to hack Facebook then he must be spamming or giving you a Trojan. Nothing is impossible. Facebook accounts and all those social networking IDs can be hacked and there are many ways to do so.  Phishing  Keylogging  Ratting  Social Engineering (the art of Human Hacking)
  • 5.
    What is Phishing? The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online”  This is definition of phishing. Through phishing, somebody can hack your Facebook account. For example you receive a link from your best friend asking you to join a community or something else. When you open that link, a Facebook login page opens which asks you for your username and password and you fill those fields, these credentials will directly go to your friend. This is an example of phishing. Basically a fake page pretending to be original.
  • 6.
    Keylogging  Key loggingmeans to capture keystrokes of keyboard.  This is most simplest definition of key logging. This can be done through plenty of softwares available on internet. For example if your friend sends you a file which is actually a virus or a keylogger, when you open it. You are now trapped and all of your keystrokes will be recorded and will be send back to the attacker. This is how attackers normally hacks Facebook.
  • 7.
    Ratting  RAT standsfor remote administration tool. It is a piece of software that hacks down the computer system and normally an attacker can steal everything from your computer. He/she can upload, delete copy, move and can perform different unauthorized actions. It can also capture keystrokes. Basically the difference between key logger and ratting is that keylogger can only record keystrokes while RAT gives complete access to the attacker. Same is the scenario of your friend sending you a file and then you open it and that’s it. You are now victim. Thousands of rats and keyloggers are being binded with other softwares in order to make things look real while they are not.
  • 8.
    Thanks for Watching Clearyour Concept, Open your mind for Hacking, and wait for next lecture. :-)