STEP 1 - Introduction to Hacking and Hackers





This is the Very First Tutorial Of Hacking . In this tutorial we will discuss what is hacking.. ethical hacking security...who are hackers...why we do hacking...and Introduction to some basic terms...
First of all I will try Explain what the Hacking really is....



What Is Hacking??


Everyone Here thinks that hacking is just stealing of data and information illegally but this perception is absolutely wrong. 
The below is definition from Wikipedia.... Itz clearly showing hacking as a negative thing...


"Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)"


Hacking is not always unauthorized... Hacking also include Exploring the Things that are being Hidden from the general usage... So exploring things i.e being Hidden from general User is also hacking...


Hacking Definition by Me...
" Hacking is art of exploring the hidden things that are being hidden from general usage and finding loop holes in the security and use them to benefit the others"




WHO ARE HACKERS ??


Everybody here thinks thats hackers are criminals of the virtual world (i.e digital World ). But this thought is also wrong. Hackers are not always criminals.. It doesn't have any doubt that Hackers are extremely genious peoples in the field of Computers...


I want to Categorize hackers in three Categories:
1. Crackers or Black Hat hackers or cheaters or simply criminals : They are called criminals because they are having the mindset of causing harm to security and they steals very useful data and use it in wrong ways. Phishers also some in this category who steals account info and steal your credit card nos. and money over the Net.


2. Ethical hackers : Ethical Hacking Means you think like Hackers. i.e First you Hack the Systems and find out the loop holes and then try to correct those Loop Holes..These type of hackers protect the cyberworld from every possible threat and fixes the future coming security loop holes. These peoples are also called as "GURU's" of Computer Security.


3. Simply Prankers : The hackers who just do hacking for fun...play pranks to their friends..


INTRODUCTION TO SIMPLE TERMS RELATED TO HACKING !



Threat –An action or event that might compromise security. A threat is a potential violation of
security.


Vulnerability –Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system.


Exploit –A defined way to breach the security of an system through vulnerability. i.e Use the vulnerability to damage the database or system.


Attack –An assault on system security that derives from an intelligent threat. An attack is any action that violates security.


Target of Evaluation –An IT system, product, or component that is identified/subjected as requiring security evaluation.


Security – A state of well-being of information and infrastructures in which the possibility of successful yet undetected theft, tampering, and disruption of information and services is kept low or tolerable.


Security rests on confidentiality, authenticity, integrity, and availability.

•Confidentiality –The concealment of information or resources.
•Authenticity –The identification and assurance of the origin of information.
•Integrity –The trustworthiness of data or resources in terms of preventing improper and     unauthorized changes.
•Availability –The ability to use the information or resource desired.


INTRODUCTION TO TOPICS THAT WE COVER IN THESE CLASSES !



  • Introduction to Ethical hacking
  • Footprinting
  • Scanning
  • Hacking Systems and OS
  • Trojans and backdoors
  • Sniffers and DDOS(Denial of Service)
  • Social Enginnering
  • Hacking Websites
  • Hacking Web applcations and Softwares
  • Password Hacking and Cracking
  • Phising and fake pages
  • SQL Injection
  • Hacking Wireless (wifi's)
  • virus and worms
  • Creating Viruses and trojan and Making them undetectable
  • Exploit Writing and virus source codes of very famous viruses
  • Cryptography
  • Hacking Webservers
  • ...... And Much more... List is endless...





I think You all would have like this and want to see more.. I will regularly post material.
I think this deserves Comments

6 comments:

Unknown said...

Ya this is good..........
but not good it is best for me to know abt hacking and become good hacker........
plz post regularly abt d hacking.........

kiran said...

thanx dude,
this really nice, post regularly
plzzzZZZZZZZZZZZzzzzzzzzzzzZZZZZ.....

Anonymous said...

For three years i have been faithful to my husband. At first everything was sweet and smooth. He was really open to me but of late he kept more to himself. I am a very inquisitive person, i need to know why the sudden change in attitude. I went on an adventure in search of a good hacker. Came in contact with cyberprofessionalhacker@gmail.com . In less than 38 hours he got the job done and gave me details. it hurt because the same man i have been in love with and faithful to, turns out to be a cheat and a big liar. I am indeed grateful to cyberprofessionalhacker@gmail.com for knowing the truth

jane holly said...

CONTACT: onlineghosthacker247 @gmail. com
-Find Out If Your Husband/Wife or Boyfriend/Girlfriend Is Cheating On You
-Let them Help You Hack Any Website Or Database
-Hack Into Any University Portal; To Change Your Grades Or Upgrade Any Personal Information/Examination Questions
-Hack Email; Mobile Phones; Whatsapp; Text Messages; Call Logs; Facebook And Other Social Media Accounts
-And All Related Services
onlineghosthacker Will Get The Job Done For You
onlineghosthacker247 @gmail. com
TESTED AND TRUSTED!!!

GLENF THOMAS said...


We offer certified and verifiable bank instruments via Swift Transmission from a genuine provider capable
of taking up time bound transactions.
FOR LEASING OF BG/SBLC
MINIMUM FACE VALUE OF BG/SBLC $ EUR/USD 1M
LEASING FEE $ 4$+2$
FOR PURCHASE OF FRESH CUT BG/SBLC
PRICE $ 32$+2$
MINIMUM FACE VALUE OF BG/SBLC $ EUR/USD 1M
Our BG/SBLC Financing can help you get your project funded, loan financing by providing you with yearly. RWA ready to close leasing with any interested client in few banking days
renewable leased bank instruments. We work directly with issuing bank lease providers, this Instrument can be monetized on your behalf for 100$ funding: For further details contact us with the below information.
Contact:name:PHILIP GONZALEZ
Email:masfinancialservices1@cash4u.com text on 770-824-6784.
WHATSAPP NUMBER:+1-740-966-1107
wEBSITE:masfinancial.ctlxy.org

GLENF THOMAS said...

CONTACT US FOR ALL KINDS OF HACKING JOB @ GLENFTHOMAS@GmAIL.COM We offer professional hacking services , we offer the following services;
-University grades changing
-Bank accounts hack
-Erase criminal records hack
-Facebook hack
-Twitters hack
-email accounts hack
-Grade Changes hack
-Website crashed hack
-server crashed hack
-Skype hack
-Databases hack
-Word Press Blogs hack
-Individual computers hack
-Control devices remotely hack
-Burner Numbers hack
-Verified Paypal Accounts hack
-Any social media account hack
-Android & iPhone Hack
-Text message interception hack
-email interception hack
-Untraceable Ip etc.
Contact us at GLENFTHOMAS@GMAIL.COM for more inquiry..
Track Calls log and Spy Call Recording.
Monitoring SMS text messages remotely.
Cell phone GPS location tracking. Spy on Whatsapp Messages.
Free Update and 100% Undetectable.
Track BBM messages and Line messages.
View All Photos Captured.
Track Internet Browsing History and Read phone Access Address Book, totally worth your money, please no time wasters, he won't under any circumstances work for free, you can reach him by email GLENFTHOMAS@GMAIL.COM
WHATSAPP NUMBER:+1 917 809 8609.

Post a Comment

STEALTH HACKER

Sponsers