Hacking Contents:· History ofhacking· What is hacking?· Who is hacker ?· Famous hackersin history· Types of hacking· Advantages of hacking· Disadvantages ofhacking· Conclusion· References What ishackingIn general, penetration is the ability to reach a target illegally through gaps in the protection system of the target and of course is a bad feature characterized by the hacker ability to enter the organs of others and without the will of them and without knowledge of them, regardless of the serious damage that may occur either Their personal devices or their souls when dragging files and pictures of their own.
What is the difference here between the hacker and the personal devices and penetrated safe houses safe?And the penetration of devices is like any other breakthrough has ways and foundations through which the hacker intrusion on the devices of others through the gaps in that system … This means that you are vulnerable to penetrate at any time and in any way was targeted by one of hackers – hackers – for some reason or random as The best way is not to put your important and special data inside your device such as your bank card number or your secret numbers and passwords and to take the possible protection methods and take the precaution and caution on an ongoing basis. Causes and motives 1 – political and military motivation 2.
Commercial motivation 3. Individual motivation (mental illness ‘competition among programmers’ desire to harm a particular person). History of hacking•Hacking has beena part of computing for 40 years•The firstcomputer hacker emerged at MIT•Hacking isbegan in 1960s at MIT ,origin of the term “hacker”•The truthhacker amongst our societies have thirst for the knowledge•Boredom isnever an object of challenge for the hackerBig hackings inhistory1990: OperationSundevil starts: The Secret Service, in conjunction with Arizona’s sorted outwrongdoing unit, discloses Operation Sundevil, an across the country ventureagainst 42 PCs and seizing 23,000 floppy circles. They in the long run seize PChardware in 14 urban communities, including Tucson, Miami and Los Angeles1995: KevinMitnick is captured. One of America’s most acclaimed programmers Kevin Mitnickis at long last gotten and was condemned to five years in prison.
2015:Catastrophic eBay hack: One of the biggest individual hacks ever, eBay had morethan 145,000,000 records stolen from their database.2003: Anonymousis framed. The hacktivist assemble is framedthrough a site.2015:Catastrophic eBay hack: One of the biggest individual hacks ever, eBay had morethan 145,000,000 records stolen from their database.
2008:Breakthroughchurches Houses of worship were not delivered from hacker attacks. In 2008, anunknown group infiltrated the Churchology Corps and published classified videosindicating its involvement in terrorist operations and attacks. They alsopublished videos relating to recruitment and recruitment. 2014: SonyPictures Breakthrough Sony Pictures North Korea’s sympathetic”peacekeepers” were on a date in December 2014 with an incident thatrocked the world, breaking through the Sony Pictures Entertainment site becauseof the film, The Interview, which tells the story of two American journalistswho wanted to meet the North Korean leader. After being recruited from the CIAhackers managed to publish classified data about the company’s plans for thefilms to be produced, and four films were leaked, causing the company losses inbillions, and leaked data and addresses of senior employees at the company. 2015:Carbanak-cybergang is a process that took about two years and was worth abillion dollars.
Pirates have penetrated the financial systems of several banksaround the world, most of them in Russia, Japan, Switzerland and the UnitedStates. Thirty countries and some 100 international banks were hit by theattack, dubbed “Carbanak cybergang,” the name of the program used bythe group in February 2015, according to Kaspersky, a company specializing inantivirus and computer security the hackers used malicious word files totransplant them into data access and then the process lasted for two yearsuntil hackers were able to reach their destination through e-mail fraud. 2014: Thebiggest data theft of August 2014 Largest-operation-theft-data Russian hackersknown as Cyber Four have hacked over 500 million e-mail accounts, disclosedtheir usernames and passwords the data has been stolen from 420,000 websites,including major corporate websites.
Thus, data can be used to communicate withtheir owners and to send viruses through which their computers can be hacked. At thebeginning of every April, since 2012, Israel is preparing to face the attacksof the Anonymous group, which annually infiltrates Israeli and non-governmentalIsraeli sites in response to settlement and occupation policy last April, thehackers sent a message to Israelis warning them that their attacks would be anelectronic war against Israel. A young man from the group said in a video:”We will not stand idly by, we will defend humanity against Zionistcrimes.”The Israeli public security apparatus decided to set up a privateelectronic room to confront the group. In the latest infiltration of Israel byAnonymus, hackers succeeded in penetrating the education site, disruptingpostal services in Israel and penetrating the prime minister’s office Shadow Brokersand $ 580 millionThe latesthacking occurred on August 17, after hackers calling themselves “ShadowBorkers” hacked the US National Security Agency (NSA) and hacked hackersand hackers created by the agency and its four allies, Britain, Canada,Australia and New Zealand the hackers claimed to have acquired what they called”cyber weapons” that included US-run programs to sabotage Iran’snuclear program. They offered what they had for sale for $ 580 million. Who is hacker ?Hacker is an English word for people who have supernatural intelligence inthe field of computer and information security, and hackers are a group of verysmart programmers who have the ability to challenge any system and penetrate itwithout knowing themselves or mentioning their real names.
Sometimes they donot intend to commit a misdemeanor or a crime, but they test their skills andabilities during the hacking operations, but the law considered them guilty becausethey entered places they should not enter, and there are many people whoexploited these extraordinary abilities in operations Subversive and criminalsuch as money theft, espionage.Many people disagree about the definition of hackers. Many people linkHackers to hackers because they are always influenced by the media as criminalsand saboteurs, some of whom are considered creative developers, because many ofthe projects were the result of group work of hackers. These projects includeLinux, Wikipedia, and open source projects, and there is another term, thecracker. This term has emerged to distinguish between good hacker and corrupthacker. The cracker is the one who always carries out subversive, criminal andintrusive actions that occur to corporate systems. He deserves the title ofpirate computer, while the hacker is always trying to invent solutions andalways seeks to creativity what he is doing.Types of hackers The types of hackers vary according to purpose andpurpose, and we can divide it into three types of: good hacker: whose purpose is to repair something and not to hurt one.
Hacker spoiler: whose goal is to harm and harm. Hacker wavering betweenspoiler and reformer.Famoushackers in history · KevinMitnick The U.
S.Department of Justice called him the “most wanted computer criminal in U.S.history”· Jonathan james· Albert Gonzalez· Kevin poulsen· Gary Mckinnon· Robert Tappan Morris· Loyd Blankenship· Julian Assange· Guccifer 2.0· Anonymous Types of hackingThere are too many Hacking types, but we can limit them to several keyconcepts: 1 – Hacking sites andservers and forums.2 – Hacking the localnetworks LAN.3 – Hacking personal computers (PC). First: hacking sitesand servers and forums: -If we want toexpand in this concept of breakthroughs, we find that iis divided into threetypes of penetration: hacking sites in general, hacking servers, hacking forumsof all kinds.
But I will explain the mechanism and principle of penetratingsites in general.It is knownthat all sites are based on the programming languages ??of the network and theInternet and the Internet .Of these languages ??PHP, HTML, JAVA, PERL .
Ofcourse there is nothing in this universe perfect for God, of course, and theremust be security holes or errors in this software Programs and systems preparedand built on sites and servers.And here comesthe role of hackers in the discovery of these “gaps” as they call andtranslate them to serve them in access to the main files in the site, such asthe Config file, for example This fileis one of the most important files forbidden to the public access to it ..
..And read them, and these vulnerabilities are detected by special programs inthe search for loopholes One of themost important tools used in this type of penetration• Perl loops,a type of programming language used in websites.
• CGI gaps arerelatively weak gaps for other gaps.• XSS loopsand relies on the withdrawal of passwords from the ADMIN website.• SQL exploitsare low-use and depend on database errors in sites, servers and forums.
• FILE INCLUDEgaps are the most serious of all the gaps where it is possible to controlcompletely the sites penetrated. One of themost important tools used in this type of penetration .1. Exploit search programs as mentioned above.2.
interpreterPerl gaps is specifically for this type of gaps.3 – The mostimportant types are C99 **** l, Re57 **** l, My **** l.4 – a specialsite, whether free or paid to raise the ****. This is only avery short description of this broad subject ..
.. And I want to add that thereare in this type of breakthroughs so-called random penetration and also thereis another term called mass attacks, which are useless only with the presenceof a very large number of attackers carry out the attack at one time, and theseattacks are indicated by one of the orders Dos called the PING. Second: LANpenetration: – In a very brief way, the penetration of localnetworks depends on the volumes of sharing in the devices that are the networkwhether the network is a network of devices in Internet cafes or home networksor networks of university and school networks and networks .
… The hackersfirst identify the main device in the network and usually have a name andnumber number 1 ….
Such as …
PC1, and after selecting the device theyattempt to break the PASSWORD of the main device through certain programs suchas the famous program giant . Remote Anything known for its effective controldevices. Third: thepenetration of personal computers PC: – There are severalmethods hackers use to hack personal computers, all of which rely on sending apatch file to the victim and the process of connecting between the computer andthe victim’s computer and control the device remotely through programs such asthe help of the program giant Turkish ProRat.Passing passesthrough several stages are: -• Patchformation phase.• Patchdecompression phase.
• Patchencoding phase.• Patchcompression phase.• Patchintegration phase.• The stage ofsending the bat to the victim.Thus thepenetration is very brief and we will expand with this type of penetration.Detailedexplanation of hardware penetrationAs I mentionedearlier that the hardware penetration depends on a file called Server or Patchand that this file goes through several stages .
.. server configuration, serverdecompression, server encryption, server compression, server consolidation,server sending to the victim.There are alsoseveral ways to configure the server and several methods used to receivenotification .
. What I mean by the notification: It is a computer computer thatthe victim reaches the hacker after sending the file server ..
. The generalform of reporting contains the following information: There areseveral types of reporting, the most important of which are: 1 – Reportingby e – mail: – This method of reporting is used by the start class of hackers,the rate of success of access to reporting is only 50% because of the existenceof walls of protection in e – mail companies such as Yahoo, *******, The bestof these companies is Google’s mail because it is not free so you can notactivate the firewall. 2 – Reportingthrough the CGI page: – a page page created by the hacker to be reported serversent to the victim, and the features of this type of reporting .. Speed ??andensure the arrival of reporting by 70%, and users of this type of reportingfrom the owners of advanced stages in this the field . 3 – Reportingthrough the site of No-IP: – This type of reporting is the most dangerous andstrongest .
. It ensures the arrival of the notification of 100% without anyproblems and very high speed, and the difference between this reporting andother types of reporting that this site after the work of the account It givesyou a fixed IP number without changing the number, especially for dial-upusers, and users of this type of communication are considered the mostdangerous and most experienced people. What happenswhen the victim receives the server from the hacker and open it ??! After theopening of the server in the victim’s device occurs the process of opening theport PORT used by the program where each program has a special port in it andtake for example the famous ProRat program that uses port number 80, and afteropening the port, the server copies itself automatically in the area of??startup “Start Up” It also makes a copy of itself in a sensitiveWindows folder, the System32 folder. The purpose of this process is to ensurethat the victim stays in contact with the hacker and to ensure that the so-calledBack Door or as some call it the reverse connection or the back line. In partsof a second so that the victim does not feel that there is a defect or Chtrachas happened to the computer.
After that,there is the process of reporting to the intruder and the process ofcommunication penetrating the victim’s device or as a term of the process ofconnecting with the victim … Thus became the victim’s device at the hacker’saccess and was left only to receive information and exploitation and to sabotagethe privacy.Advantages of hacking1.-One of the advantages of being ahacker is that you can find and access hidden files that contain importantinformation, and you can use this knowledge to help others. 2.-This information can also be used toanticipate different problems that may arise in the future such as changes inthe school or in the work of the people.
3.-: Get on computers with valuableinformation and use it for your benefit 4.-See everything that people do on theInternet to talk to their contacts or steal money from their bank accounts oruse the street lights etc … but that they do what they are lounging …
.. andthe disadvantages that you can be imprisoned for doing this because it is acrime 5 .- You can find and access filesor break protectors on Internet pages as well as being able to steal theInternet, online movies, video games and various things like hacking computersof your acquaintances eh even your school.
Disadvantagesof hacking Hacking is quite dangerous if it is done with harmful intent. Itcan cause ?§ Massive security breach.§ Unauthorized system access on private information.§ Hampering system operation.
§ Denial of service attacks.§ Malicious attack on the system. ConclusionInconclusion, the FBI’s estimation that hackers pose a substantial threat tobusinesses and individuals as well as an increasing threat to national securityshould not and must not be taken lightly. To be sure, hacking has evolved fromplaying simple pranks against the unsecure computers of a high school classmateor a local telephone company to complex, sophisticated and persistent attacksagainst the highly secured the computers that run the world and the networksthat form the backbone of how we work, study, and live. hacking can use for badand good things