{"id":16194,"date":"2019-09-14T14:32:43","date_gmt":"2019-09-14T18:32:43","guid":{"rendered":"http:\/\/bangla.salearningschool.com\/recent-posts\/hacking-basics-short-overview-a-short-breadth\/"},"modified":"2019-09-14T14:32:43","modified_gmt":"2019-09-14T18:32:43","slug":"hacking-basics-short-overview-a-short-breadth","status":"publish","type":"post","link":"http:\/\/bangla.sitestree.com\/?p=16194","title":{"rendered":"Hacking Basics: Short Overview: A Short Breadth"},"content":{"rendered":"<p>Hacking Basics: Short Overview: A Short Breadth<\/p>\n<p>Audience: Ethical Hackers, Wanna be security researchers, interested to know the basics of Security<\/p>\n<p>Objective: Identify the key hacking concepts. Just the names primarily.<\/p>\n<p>key Topics: Password Cracking, Keyloggers, Trojans, Viruses, Worms, Rootkits, Social Engineering, Privilege Escalation, Denial of service attack, Botnet, Alternate data streams, Steganography, Covering tracks.<\/p>\n<p>Password Cracking Techniques that hackers use or can be used as part of ethical hacking:<\/p>\n<p>Dictionary Attack, Brute Force Attack (uses combination of letters, digits, esp. characters &#8211; not dictionary words), Hybrid Attack (on top of dictionary attack such as world123), Syllable Attack (brute force attack on top of dictionary attack, combine dictionary and brute force), Rule based attack (when some hints are known then use rules to create passwords to use to crack), Rainbow Table Attack (uses pre-generated hashes of combinations\/permutations of a character set), distributed password attack (uses multiple systems to crack the password), non-technical attack (social engineering, shoulder surfing to see typing)<\/p>\n<p>Keyloggers: Used to steal passwords such as BIOS Embedded (sits in the BIOS), keylogger keyboard (replace keyboard with keyboards with internal memory), External Keyloggers (fits the PS\/2, serial keyboard port to intercept), Software keyloggers (most common, installed in the target system)<\/p>\n<p>Trojans: Hides inside trust-able applications can give the attacker full access to the system, can steal passwords and any other data. Two types: Overt channel (uses a genuine channel to communicate), Covert Channel (uses back\/secret door)<\/p>\n<p>Types of Trojans: Command shelf Trojans (gives command line access to the attacker), Document Trojans (hides inside word or pdf files), email trojans (attacker sends commands through email messages ), Botnet Trojans (uses bots to attack, for DOS attacks bots are usually used)<\/p>\n<p>Viruses: A malicious program itself. The life-cycle of a virus: design\/development, infection and replication (replicates itself on the target system to attack), detection (can be detected by anti-virus software), anti-virus signature development, Eradication<\/p>\n<p>Types of Viruses: System\/boot virus, File virus, Macro Virus (can be word and excel macro), Polymorphic virus (change code and behaviors of itself).<\/p>\n<p>Computer Worms: Similar to virus however they self-replicate themselves aggressively and try to attack aggressively to infect as many systems as possible (and as quickly as possible)<\/p>\n<p>Rootkits:<\/p>\n<p>Affect the operating system, changes the kernels. hard to remove. Changes system level code to remain undetected by anti-virus software.<\/p>\n<p>About Antivirus software: Not all anti-virus software can detect all viruses. VirusTotal a service scans submitted files using multiple anti-virus software to detect viruses.<\/p>\n<p>Social Engineering: Deceptive art to engage in communication with others to collect sensitive\/valuable information Such as the CRA scam, Lottery winner scam. Steps of Social Engineering: information gathering, choose the victim, establish trust, exploit the relationship.<\/p>\n<p>Types of Social Engineering: Human based, computer based, mobile based<\/p>\n<p>Privilege Escalation: First gets access to the system that can be a basic access. then tries to increase privileges that can be by using programming, or utilizing misconfiguration in the system.<\/p>\n<p>DOS Attack: Overwhelms the system resources so that even legitimate users cannot get access or use the system and services.<\/p>\n<p>Botnet: Can be used for DOS attacks. A Botnet is a group of systems that work together to shut the target system down. the botnet is controlled by the attackers.<\/p>\n<p>Alternate Data Streams: Data attached to a file. The attachment is invisible to the user. Such as hidden.txt file (will be hidden and will gwt data) can be attached to file.txt (will be visible). StreamArmor application can detect such hidden files.<\/p>\n<p>Steganography: techniques where data is hidden inside messages\/data. Only the related parties will have keys to see the hidden data. Example purpose: Copy prevention, Hiding meta-data, Covert communication, Authenticity testing.<\/p>\n<p>Covering Tricks:<\/p>\n<p>Covering Tricks: Attacker after attacking the target systems and after collecting information, can try to clear all traces. Clearing might involve: clear browser cache, remove all files it created, clear audit and event logs, close open ports, stop the service processes, restore the registry, delete user accounts it created, create temp files.<\/p>\n<p>Cleaner Programs: CCCleaner, File Shredder<\/p>\n<p>References: Sagar Ajay, CEH, Apress<\/p>\n<p>Sayed Ahmed<\/p>\n<p>Linkedin: <a href=\"https:\/\/ca.linkedin.com\/in\/sayedjustetc\">https:\/\/ca.linkedin.com\/in\/sayedjustetc<\/a><\/p>\n<p>Blog: <a href=\"http:\/\/sitestree.com\">http:\/\/sitestree.com<\/a>, <a href=\"http:\/\/bangla.salearningschool.com\">http:\/\/bangla.salearningschool.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacking Basics: Short Overview: A Short Breadth Audience: Ethical Hackers, Wanna be security researchers, interested to know the basics of Security Objective: Identify the key hacking concepts. Just the names primarily. key Topics: Password Cracking, Keyloggers, Trojans, Viruses, Worms, Rootkits, Social Engineering, Privilege Escalation, Denial of service attack, Botnet, Alternate data streams, Steganography, Covering tracks. &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"http:\/\/bangla.sitestree.com\/?p=16194\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[182],"tags":[],"class_list":["post-16194","post","type-post","status-publish","format-standard","hentry","category---blog","item-wrap"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":26197,"url":"http:\/\/bangla.sitestree.com\/?p=26197","url_meta":{"origin":16194,"position":0},"title":"Hacking Basics: Short Overview: A Short Breadth #Root","author":"Author-Check- Article-or-Video","date":"April 19, 2021","format":false,"excerpt":"Hacking Basics: Short Overview: A Short Breadth Audience: Ethical Hackers, Wanna be security researchers, interested to know the basics of Security Objective: Identify the key hacking concepts. Just the names primarily. key Topics: Password Cracking, Keyloggers, Trojans, Viruses, Worms, Rootkits, Social Engineering, Privilege Escalation, Denial of service attack, Botnet, Alternate\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26260,"url":"http:\/\/bangla.sitestree.com\/?p=26260","url_meta":{"origin":16194,"position":1},"title":"Do you want to be an information security professional? #Root","author":"Author-Check- Article-or-Video","date":"April 21, 2021","format":false,"excerpt":"Do you want to be an information security professional or an Ethical Hacker? Then you can learn by finding answers to the following questions. You can search Google, read book, or even ask the security professionals around you to get the answers. Knowing these (and doing\/practicing\/analyzing\/thinking\/applying\/building\/relating) for sure will help.\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":16417,"url":"http:\/\/bangla.sitestree.com\/?p=16417","url_meta":{"origin":16194,"position":2},"title":"Do you want to be an information security professional?","author":"Sayed","date":"November 21, 2019","format":false,"excerpt":"Do you want to be an information security professional or an Ethical Hacker? Then you can learn by finding answers to the following questions. You can search Google, read book, or even ask the security professionals around you to get the answers. Knowing these (and doing\/practicing\/analyzing\/thinking\/applying\/building\/relating) for sure will help.\u2026","rel":"","context":"In &quot;\u09ac\u09cd\u09b2\u0997 \u0964 Blog&quot;","block_context":{"text":"\u09ac\u09cd\u09b2\u0997 \u0964 Blog","link":"http:\/\/bangla.sitestree.com\/?cat=182"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":65954,"url":"http:\/\/bangla.sitestree.com\/?p=65954","url_meta":{"origin":16194,"position":3},"title":"SCEA:Security in Java: Potential threats to a system and how to address the threats:Java Enterprise Architect #Java Short Notes","author":"Author-Check- Article-or-Video","date":"July 18, 2021","format":false,"excerpt":"Input Validation Failures: Input should be validated both at the client end and the server end (before any processing). Validating both from trusted and untrusted sources is important. Otherwise code injection attack may happen. Validation should include: data type (string, integer), format, length, range, null-value handling, verifying for character-set, locale,\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":16197,"url":"http:\/\/bangla.sitestree.com\/?p=16197","url_meta":{"origin":16194,"position":4},"title":"Machine Learning and Security Basics","author":"Sayed","date":"September 15, 2019","format":false,"excerpt":"Machine Learning and Security Basics Objective: Define\/describe key concepts on what Machine Learning can do for Security and how First of all, what are security threats? Malware, Worm, Trojan, Spyware, Adware, Ransomware, Rootkit, Backdoor, Bot, Botnet, Exploit, Scanning (port scanning), Sniffing (silently observe and record), Keylogger, Spam, Login Attack, Account\u2026","rel":"","context":"In &quot;\u09ac\u09cd\u09b2\u0997 \u0964 Blog&quot;","block_context":{"text":"\u09ac\u09cd\u09b2\u0997 \u0964 Blog","link":"http:\/\/bangla.sitestree.com\/?cat=182"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26199,"url":"http:\/\/bangla.sitestree.com\/?p=26199","url_meta":{"origin":16194,"position":5},"title":"Machine Learning and Security Basics #Root","author":"Author-Check- Article-or-Video","date":"April 19, 2021","format":false,"excerpt":"Machine Learning and Security Basics Objective: Define\/describe key concepts on what Machine Learning can do for Security and how First of all, what are security threats? Malware, Worm, Trojan, Spyware, Adware, Ransomware, Rootkit, Backdoor, Bot, Botnet, Exploit, Scanning (port scanning), Sniffing (silently observe and record), Keylogger, Spam, Login Attack, Account\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/16194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16194"}],"version-history":[{"count":0,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/16194\/revisions"}],"wp:attachment":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16194"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}