Skip to main content

What Is Hacking?Who can be a Hacker?


Well the question is quiet simple,but i choose to explain it basically so that every one can understand it.

Before that i must say,don't be interested to hacking by seeing images of hacker like the one above,if you think you wanna be portrayed as above,all you need to learn is Photoshop :)
Most of us,in Our childhood must have had toys.When we have one we try to know how it functions,by somehow opening it and once we know its working, we try to alter it to our own wish even though most of us fail!
A hacker has same mind set where he try to break through the security measures applied by the application or website makers.When we hear the name hacker first thing that comes to our mind is he will hack our facebook,twitter,computer and everything.Even though a very elite hacker may know to bypass the security of all these ,mostly they may not . What i mean is may be a hacker know to bypass security of webpages but not to crack games but still he is a hacker.
In simple words,Hacking is a mindset.
Never think the hackers are just like the ones portrayed by Hollywood movies,with a black screen and green letters and where he could do anything with just two or three lines or may be words.Hacking isn't that simple.
Now,Who can be a hacker.Anyone who has this mindset can be a hacker.But a hacker always keep learning more and more and keep himself up to date.Some elite hackers know almost every scripting and programming languages exceptionally well.They use their knowledge for exploit.

There are Three types of hackers

White Hat

These are people who use hacking for providing security to the website owners and companies.how? they test to hack the webpage or server they got permission for and if they find any exploit or flaw, they will inform it and will help to fix it so that these errors and flaws will not be exploit by any other especially black hats.

Gray Hat
They usually doesn't work for any company or institution, they work on their own.They hack servers or websites without prior permission but doesn't use it for personal gain,instead they deface it or somehow take developers attention to the exploit.Some of them do hack to gain popularity.
Black Hat
These are the guys you should fear because they hack into networks,servers,websites,etc for their personal gain.They wont be authenticated.Usually white hat hacker's job is to defend against the black hats.

Hope  you got some idea about the topic.Feel free to send me suggestion for the next topics or if you have any questions . 


Comments

Popular posts from this blog

Hack This Site Basic 10

Please enter a password to gain access to level 10 Only this much is written as hint.What we should do? I have tried reading the source code and there is no hint how the password is validated.So,we have no other way than intercepting the data.Once we enter the password and hit submit the password along with some request is sent to the server by the browser.There can be very vital information in this request.What we do is intercept this request before it is sent to the server.For this we use "Burp Suit" or some extensions for tampering data.For chrome and firefox,we have tamper data addon.Iam using chrome add on:  Tamper Chrome HOW TO USE IT? *Right click somewhere and select inspect. *Now select the three arrows pointing right on top right corner. *Now select  Tamper from it(make sure you have added the extension in             chrome). *Now input some password in out mission or leave it empty and hit submit. *You will see a new tab with the request det

Hack This Site Basic 6

Network Security Sam has encrypted his password. The encryption system is publically available and can be accessed with this form: There we have been given with the same encryptor used by Sam .There is no other choice in my mind than guessing the password with the help of this encryptor. We have Sam's encrypted password already :3ff8;j<9 >Now we need to find by giving which value we get the output as 3. >when i given 'a' my output was 'a',which means no change. >So,I tried giving '3' and as expected, answer was 3. >So i pushed my luck and tried '3f',the first two letters,in encryptor ,Output was '3g'    this was clearly giving us hint.first letter has no change,second letter change by one alphabet or           letter ,clearly from 'abcdefg' >with this in mind iam giving input for encryption as '3ed',Huraaah!, it was successful and given output as '3ff'. >now its easy to break down ...

Hack This Site Basic 8

Sam remains confident that an obscured password file is still the best idea, but he screwed up with the calendar program. Sam has saved the unencrypted password file in /var/www/hackthissite.org/html/missions/basic/8/  However, Sam's young daughter Stephanie has just learned to program in PHP. She's talented for her age, but she knows nothing about security. She recently learned about saving files, and she wrote a script to demonstrate her ability. So, we know the password is stored in some obscured password file.  Lets try the same code as we did in level 7. But the code 'ls' is not treated as command. so lets try it differently. Try with aaa;<!--ls--> it also failed but got a message: If you are trying to use server side includes to solve the challenge, you are on the right track: but I have limited the commands allowed to ones relevant towards finding the password file for security reasons(because there will always be that one person who decides to