SQL:
SQL is responsible for storing and managing sensitive and confidential data such as user credentials, bank and personal information about the website visitors.Black hat hackers mostly target SQL database and steal information which are later sold on underground dark web forum.If you want to be good security researcher, you should learn SQL to that you can find flaws in a website and report them.
2. Exploit Writing
After web hacking, another most important feature of hacking is exploits.You can crack a particular software by writing a exploit. But to wrtite an exploit youj need to learn either Python or Ruby.
PYTHON
It is said that a security researcher or hacker should know python because it the core language for creating exploits and tools. Security experts and even pro hackers suggest that master python is the best way to learn hacking. Python offers wider flexibility and you can create exploits only if you are good in python.
RUBY:
Ruby is a simple yet complicated object-oriented language. Ruby is very useful when it comes to exploit writing.It is used for meterpreter scriptintg by hackers. The most famouse hacker tool, Metasploit framwork is programmed in Ruby. Through Ruby may not be as versatile as python, Knowledge of Ruby is must in understanding exploits.
3. Reverse Engineering
Reverse Engineering, the process of taking a software program,s binary code and recreating it so as to trace it back to the orginal source code. If you know reverse engineering you can find flaws and bugs easily. If you waant to learn reverse engineering you need to know C,C++ and java. The process of convertring the code written in high level language into an low level language without changing the original program is known as reversee engineering.
Phases of Hacking.
Hacking is broken up into five phases,Reconnaissancy,scanning,gaimimg Access, and finally clearing tracks.The more you get closeto all phases, the more stealth will be your your attack.
1.Reconnaissance: this is the primary phase where the the hackers tries to collect as much information as possible aout the target. It includes identifying the target, finding out the target ip address range, network, domain name registration records of the target, Mail server records, DNS records.
2. Scanning: This makes up the base of hacking ! this is where plannning for attack actually begins. After reconnaissance the attacker scans the target for services running open ports, firewall, detection,finding out vulnerabilities , opreating system detection.
3. Gaining access: After scanning, the hackers designs the blueprint of the network of the target with the help of stuffs collected during phase one and 2! Now, the attacker, executes the attack based on the vulnerabilities which were identified during scanning! After the successful attack, he gets access to the target network! so cool! He is now, the king!!
4.Maintaining Access: After gaining access, the attacker escalates the privileges to root/admin and uploads a piece of code (usually called as backdoor) on the target network so that he always maintain the gained access and can connect to target anytime.
5. Covering Track: After gaining access and maintaining the same, hacker exploits the weakness and hacks the network or misuses the access. After that, comes the important phase covering the tracks! To avoid getting traced and caught, hacker clears all the tracks by clearing all kind of logs and deleted and uploaded backdoor and anything related stuff which may later reflect his presence! so these are five important phases of hacking which every hacker must follow for a successful attack!
SQL is responsible for storing and managing sensitive and confidential data such as user credentials, bank and personal information about the website visitors.Black hat hackers mostly target SQL database and steal information which are later sold on underground dark web forum.If you want to be good security researcher, you should learn SQL to that you can find flaws in a website and report them.
2. Exploit Writing
After web hacking, another most important feature of hacking is exploits.You can crack a particular software by writing a exploit. But to wrtite an exploit youj need to learn either Python or Ruby.
PYTHON
It is said that a security researcher or hacker should know python because it the core language for creating exploits and tools. Security experts and even pro hackers suggest that master python is the best way to learn hacking. Python offers wider flexibility and you can create exploits only if you are good in python.
RUBY:
Ruby is a simple yet complicated object-oriented language. Ruby is very useful when it comes to exploit writing.It is used for meterpreter scriptintg by hackers. The most famouse hacker tool, Metasploit framwork is programmed in Ruby. Through Ruby may not be as versatile as python, Knowledge of Ruby is must in understanding exploits.
3. Reverse Engineering
Reverse Engineering, the process of taking a software program,s binary code and recreating it so as to trace it back to the orginal source code. If you know reverse engineering you can find flaws and bugs easily. If you waant to learn reverse engineering you need to know C,C++ and java. The process of convertring the code written in high level language into an low level language without changing the original program is known as reversee engineering.
Phases of Hacking.
Hacking is broken up into five phases,Reconnaissancy,scanning,gaimimg Access, and finally clearing tracks.The more you get closeto all phases, the more stealth will be your your attack.
1.Reconnaissance: this is the primary phase where the the hackers tries to collect as much information as possible aout the target. It includes identifying the target, finding out the target ip address range, network, domain name registration records of the target, Mail server records, DNS records.
2. Scanning: This makes up the base of hacking ! this is where plannning for attack actually begins. After reconnaissance the attacker scans the target for services running open ports, firewall, detection,finding out vulnerabilities , opreating system detection.
3. Gaining access: After scanning, the hackers designs the blueprint of the network of the target with the help of stuffs collected during phase one and 2! Now, the attacker, executes the attack based on the vulnerabilities which were identified during scanning! After the successful attack, he gets access to the target network! so cool! He is now, the king!!
4.Maintaining Access: After gaining access, the attacker escalates the privileges to root/admin and uploads a piece of code (usually called as backdoor) on the target network so that he always maintain the gained access and can connect to target anytime.
5. Covering Track: After gaining access and maintaining the same, hacker exploits the weakness and hacks the network or misuses the access. After that, comes the important phase covering the tracks! To avoid getting traced and caught, hacker clears all the tracks by clearing all kind of logs and deleted and uploaded backdoor and anything related stuff which may later reflect his presence! so these are five important phases of hacking which every hacker must follow for a successful attack!
No comments:
Post a Comment