HACKER
Ethical Hacking Training
About Ethical Hacking Training
The Ethical Hacking Training by CREZYTECH4U is online training program in the field of web application security. In this training program, you will learn how to perform a vulnerability assessment and penetration test on a live web application in a virtual lab environment. This training program is created by CREZYTECH4U'S team of STUDENT. You will learn through video tutorials. For a great hands-on learning experience, this training program is packed with practice exercises.
What is Hacking? Introduction & Types
The Ethical Hacking Training by CREZYTECH4U is online training program in the field of web application security. In this training program, you will learn how to perform a vulnerability assessment and penetration test on a live web application in a virtual lab environment. This training program is created by CREZYTECH4U'S team of STUDENT. You will learn through video tutorials. For a great hands-on learning experience, this training program is packed with practice exercises.
What is Hacking? Introduction & Types
What is Hacking?
Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system
Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.
Who is a Hacker? Types of Hackers
A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.
What is Cybercrime?
Cyber crime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers, etc. Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using Mobile phones via SMS and online chatting applications.
Type of Cybercrime
- The following list presents the common types of cybercrimes:
- Computer Fraud: Intentional deception for personal gain via the use of computer systems.
- Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, websites, etc.
- Identity Theft: Stealing personal information from somebody and impersonating that person.
- Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc.
- Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.
- Electronic money laundering: This involves the use of the computer to launder money.
- ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.
- Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
- Spam: Sending unauthorized emails. These emails usually contain advertisements.
What is Ethical Hacking?
Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules.
Symbol | Description |
---|---|
Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration Testing and vulnerability assessments. | |
Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. | |
Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner. | |
Script kiddies: A non-skilled person who gains access to computer systems using already made tools. | |
Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website. | |
Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers. |
- Get written permission from the owner of the computer system and/or computer network before hacking.
- Protect the privacy of the organization been hacked.
- Transparently report all the identified weaknesses in the computer system to the organization.
- Inform hardware and software vendors of the identified weaknesses.
Why Ethical Hacking?
- Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money.
- Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.
Legality of Ethical Hacking
Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time.
Summary
- Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.
- Cybercrime is committing a crime with the aid of computers and information technology infrastructure.
- Ethical Hacking is about improving the security of computer systems and/or computer networks.
- Ethical Hacking is legal.
practice exercises.
exercises. 1
1. Kevin Mitnick is an American Security expert and called the “World’s most famous hacker”. He was arrested twice for cyber crime and wire fraud; an event quoted as the “manhunt”. Read more and find out such interesting facts about Kevin Mitnick.
2. You may watch the following movies and TV series and learn a trick or two..
Hackers- 1995
Mr. Robot (TV series)
3. Read about some other types of hackers, such as:
Script Kiddies
Elite Hackers
State Sponsored Hackers
Hacktivists
Phreaks
4. Read more about Indian cyber laws and the Indian IT act.
exercises. 2
1. Check for your internal and external IP addresses using the steps given below.
For Windows Users:
1. Click on the start menu and type cmd to open the command prompt.
2. Type ipconfig and press enter.
3. Your will see your Internal IP Address.
For Linux/Mac Os users:
1. Open your "Terminal" (Ctrl/Cmd + Alt + T).
2. Type ifconfig and press enter.
3. Your will see your Internal IP Address.
exercises. 3
To find the external IP address, just search for ip address on google and to use these free websites to check your external IP address.
whatsmyip.com
ipchicken.com
ipcow.com
2. Find the internal and external IP addresses of 2 devices connected to the same WiFi network and check the following:
a. Are the Internal Addresses same?
b. Are the External Addresses same?
c. Does the Internal Address change after restarting the WiFi router?
d. Does the External Address change after Restarting the WiFi router?
For Windows users:
Press windows+r to open the Run dialog box.
Type cmd and press enter.
Type nslookup, space, the domain name that you want to see the IP address for, example: google.com, and press enter.
This will give you the most recent IP addresses of Google.
π¦πΊπ¦πΊπ¦πΊπ¦πΊπ¦πΊπ¦πΊπ¦πΊπ¦πΊπ¦πΊπ¦πΊπ¦πΊπ¦πΊπ¦πΊπ¦πΊπ¦πΊπ¦πΊ
To check for open ports on a windows machine:
1. Go to the start menu and type cmd.
2. Right click on the command prompt and click on the ‘run as administrator’ option.
3. Type netstat -a | find /i "listening"
You will see a list of all ports that are listening for a request.
To check for open ports on a Mac OS:
1. Open the terminal and run the following command.
2. netstat -an | grep LISTEN
To check for open ports on a Linux machine:
1. Open the terminal and run the following command.
2. netstat -lpnt
exercises. 4
Links for ‘free web proxy’:
https://hide.me/en/proxy
https://www.croxyproxy.com/
https://kproxy.com/
Links for ‘public proxy server list’:
https://www.proxynova.com/proxy-server-list/
https://free-proxy-list.net/
How to configure proxy settings on firefox:
1. Open firefox.
2. Click ☰
3. Now click on the ‘options’ tab. For MAC users, this will be ‘preferences’.
4. Then click on ‘general’ tab.
5. Scroll down to the ‘network proxy’ section and click on settings.
6. Now check the ‘manual proxy configuration’ box and enter your proxy’s information.
7. Then click on okay, and your proxy settings are enabled.
NOTE
will give you an introduction to Ethical Hacking. This is a beginners tutorial covering all the fundamentals of Ethical Hacking. is in above the topics covered in video AND Theroy:
Next update will be soon #crezytech4u
Do COMMENT to our blog and SHARE the BLOG to Never miss an update from us in the future from crezytech4u
Comments