When you hear the name hacking, you want to know more about it sometimes and of course a lil bit Interest grows in the mind, right??
Who doesn't want to pretend to be something special by knowing something a little different from ordinary people!!! However, if you think that you have learned hacking by knowing a YouTube tutorial or the rules of a recovery system and you have become a hacker, get rid of this misconception. Again, if you think that hacking is a very bad thing, then you need to know the reasons why it is very important to learn ethical hacking. Hopefully, once you know this, you won't look down on hacking anymore. Since some of us want to know about hacking, let's talk a little bit about hacking today..
■What is hacking?
In simple terms, if we want to define hacking, then hacking is a kind of illegal attempt by which a person obtains confidential information through his reluctance and ignorance. You might be wondering how much fun it would be if you knew the system, but maybe you could have a lot of fun with your friends. You probably have no idea how terrible this can be. Hacking can be just as difficult as it is for a person, organization or country. You may not even know that a hacker is taking all the information from your computer or mobile phone where your bank account details may be. There may be intimate pictures or more that you might be afraid to show or tell anyone else.
■What is a hacker?
A hacker is someone who exploits vulnerabilities in computer systems or networks to gain access to them. Hackers are usually skilled computer programmers with a knowledge of computer security. The story of a Bangladeshi hacker in the cyber world will surprise you. However, I have been able to give ideas about hacks and hackers in as simple a language as possible. From this you must understand that no ordinary person can exist in this hacking world. So let's find out what a hacker is good at.
■How many types of hackers and what are they?
1) White hat hacker: White hat hacker proves that hacking is not a bad thing. Their other name is Ethical Hacker. For example, a white hat hacker detects flaws in a security system and notifies the owner of the security system. Which saves your computer and networking system from attack damage. A security system can be a computer, a computer network, a web site, a software, and so on. A white hat hacker hacks the system with permission and finds fault with it and does no harm to it. Another name for this work is penetration testing.
2) Gray hat hackers: Gray hat hackers work like themselves. Gray hat hackers mainly do hacking work as a hobby. When they find out the loopholes in a security system, he will do as he pleases. He will do whatever his mind wants. If he wishes, he can report the error to the owner of the security system or view or destroy the information. Again, he can use it for his own benefit. Most hackers are like this. Gray hat hacking allows hackers to publicly report this hack and fix your computer system by notifying them after the system has been hacked. The gray hat hacker may not steal any information. But publicly informing the organization can cause financial loss. Maybe some other black hat hacker can come and fix the error and hack again and steal the information.
3) Black Hat Hacker: The most feared hacker is Black Hat Hacker. When they find out the loopholes in a security system, they quickly use that error to their advantage. Such as- destroying the system, spreading various viruses. They pave the way for him to re-enter in the future. After all, it tries to get into the subsystems that are under the system. Black hat hackers hack various computer systems and networks to commit various crimes to achieve their personal goals. Such as: stealing credit card passwords, stealing personal information and selling it to another group, attacking various websites and taking down websites,etc..
■Primary steps of learning hacking
1) Social Engineering
2) Shell Function
3) DDOS
4) Phishing
5) Single & Mass Defacement
2) Virus
2) Server Rooting
৮) XSS Basic
9) Web Development
10) Access Point
■What is a server? Some information about how to create and file management
Basics of PHP, ASPX: To be an experienced hacker, you must first be a good quality web developer. It is useful to edit or create different tools at different times. You also need to know scripting. You also need to have an idea about DNS.
C Panel: As Linux is more popular nowadays, most sites use Linux servers, so you need to have practical experience using Cpanel.
■Some information about the best hackers in the world
1) Kevin Mitnick: Kevin Mitnick is an American. Born in Los Angeles, USA. Like all other hackers, he has a pseudonym. The pseudonym is "The Condor". He is a security consultant writer. Mitnik entered the hacking world at the age of 12. His hacking life began with punch card hacking on a Los Angeles bus. So that he could travel for free. In 1989, at the age of 18, Mitnick gained access to the Internet. ARPANET was a network of the US Department of Defense. Then Motorola hacked the computers of big companies like Nokia. He earned the nickname Glenn Cage for his hacking skills.
2) Gary McKinnon: Gary McKinnon was a Scottish system developer. Gary was immersed in his work. He kept himself completely separate from the outside world. In medical terms, he is suffering from Asperger's disease. The US military, navy, and NASA hacked 96 computers. The loss in the United States is 6 million dollars. Displays a message on the computer of the US Department of Defense (Your security system is crap, I am Solo. I will continue to disrupt at the highest levels). The big hackers were surprised to see the depth and knowledge about his software. He also studied UFOs.
3) Michael Kells: Michael Kells is the mafia of the internet world. He created Denial of Service which has the power to hack big commercial websites. This mafia in Quebec deprived the big companies of the world like Yahoo, Amazon, Dell, eBay, CNN of sleep. He hacked Yahoo, the most popular search engine of the time, for an hour. In 2001, the Montreal Youth Court ordered Michael Kells under surveillance for six months and banned him from using the Internet.
4) Albert Gonzalez: From 2005 to 2006 Albert Gonzalez and his group made headlines by selling around 160 million card numbers. This is the first time there has been such a commotion over ATM corruption. So that the police administration could not get over the issue of how it disrupted the ATM network. He somehow used the SQL injection method, with all the computer data on the Internet corporate network in his hand. When police arrested him, 1.8 million in cash was found in his home. Among them was লার 1.1 million in a drum buried in the ground behind the house. Albert Gonzalez was sentenced to twenty years in prison.
5) Adrian Lamo: Adrian Lamo made headlines in 2003 for breaking high-profile computer networks such as Google, Yahoo, Microsoft, and The New York Times. An arrest warrant was issued in the name of Adrian Lamore after the Times filed a complaint. The US military says he was behind a video of an airstrike in Baghdad on July 12, 2006. This caused a commotion in America. In 2010, Adrian Lamo made headlines. He was given the title of 'Homeless Hacker'. He was arrested in 2004 and fined 65,000$. Now he works as a threat analyst.
6) Anonymous: Anonymous is the most influential hacker group in the world today. They speak out against unjust oppression. If they see any wrongdoing, they call for cyber warfare. They are a disguised hacker group. Fans also know them as 'Digital Robinhood'. This group hacks their anonymity. They all participate in hacking in an organized way and thwart their goals. Again they attack various government, religious and corporate websites. They carry out their activities on the Deep Web. Some of their notable objectives are FBI, CIA, PayPal, MasterCard, Visa etc. They also target various countries such as the Vatican, China, Israel, Tunisia.
Many people think that hacking is not possible in any way if you do not know programming. I would say, be a believer in white hat and keep practicing with hacking tools, without wasting time to learn programming in the beginning. Getting started is a challenge, you will succeed if the goal is right..
Hope you all enjoyed!!🤗🤗
Knowledgable about that aspects mostly had that advantage