You are on page 1of 11

Hackers World the basics

Introduction Command prompt Denial of service (DOS) attacks Most used forms of hackin Mal!are and ransom!are "otential #obs for hackers

Introduction
Since the Internet started !ith the invention of electronic computers in the $%&'(s there has been hackers !ho e)ploit its uses* +nd still no! toda, as the internet is on a !ider ran e of devices and is a lot lar er and stron erhackers advanced !ith it makin there o!n technolo , to take do!n parts of it and take do!n others net!orks* .oda, not all hackers are the same- there are different t,pes of hackers (such as hacktivists- c,ber terroristssp, hackers- !hite and black hat hackers and various other t,pes) and !ith each different hacker the, have different motivations* .he most !ell kno!n hackers are hacktivists/ these hackers are motivated b, politics or reli ion (man, people ma, have heard of the hackin or ani0ation +non,mous- these hackers have been on the ne!s various times for shuttin do!n lar e companies temporaril, to e)pose there !ron 1doin *) With the Internet bein such a lar e part of most peoples lives hackin has become a federal offence and is punishable b, la!* +lthou h not all hackers are bad if so the Internet !ouldn(t e)ist due to the reason that hackers have the abilit, to create deadl, viruses and !ith S23 in#ection it has become simple to shut do!n sites* 4ood hackers are called !hite hat hackers- most of them are securit, e)perts !ho speciali0e in testin ho! to penetrate

sites and s,stems to ensure a compan,(s site and s,stem is secure* .hrou hout this e5ook I !ill e)plain to ,ou the basics of hackin since the !orld basicall, revolves around hackers so its important to et kno!led e on hackin *

Command prompt is the basic pro ram runnin behind ever, !indo!s computer- it is automaticall, put on ever, computer althou h some school or !ork place computers choose the option to block it because of its potential abilities to destro, a net!ork* If command prompt is blocked ,ou can easil, unlock it b, openin notepad and t,pin the follo!in then savin it as cmd*bat 6echo*off command command*com pause 7o! #ust open it and ,our command prompt is read, to o- belo! is a list of some of the basic commands that ,ou can use8 .o add a computer user8 7et user username pass!ord 9add .o delete a computer user8 7et user username 9del Chan e the te)t color 8(the number : can var,

Command "rompt

dependin on !hat color ,ou !ant) Color : Shutdo!n a computer connected to ,our net!ork8 echo off Shutdo!n I 7ote8 a !indo! !ill pop up click bro!se and select the computer ,ou !ant to shutdo!n* Disconnect a device connected to ,our net!ork8 Services*msc 7o! choose select a different computer and choose the one ,ou !ant to disconnect then o to D7S and stop the process* Sho! list of runnin pro rams .ree Disconnect Internet Ipconfi 9release "in a !ebsite "in !ebsite*com .here are much more commands ,ou can learn but these are #ust the basics of them* Command prompt has man, more abilities includin creatin viruses- makin a repeatin messa e- spammin or much more- to do these thin s #ust open notepad and t,pe the follo!in (dependin on !hich one ,ou !ant to do) ;epeatedl, open a messa e8

ms < an, messa e ms < an, other messa e as man, as ,ou !ant 4O.O5=4I7 Spammin a pro ram to open a lot of times Start Start Start Start Start Start Sa, start as much times as ,ou !ant cmd to open in different !indo!s* Cmd has man, more abilities ,ou can create includin makin viruses or dos attackers and much more*

Denial of Service (DOS) +ttacks


+ DOS attack is an attempt to make a !ebsite unavailable to its users b, spammin its server- hackers normall, use this to tar et hi h profile sites* Man, reat hackers reached there fame throu h takin do!n various sites usin DOS attacks althou h sendin DOS attacks is ille al so the, !ere punished for that* Man, famous tools have been made for that purpose includin 3OIC (3o! Orbit Ion Cannon) and HOIC (Hi h Orbit Ion Cannon) and those tools both !ork !ell e)cept 3OIC is sli htl, more advanced and po!erful* DOS attacks can also be sent usin cmd b, simpl, t,pin pin !ebsite*com t l >&&'' .he >&&'' part can be varied from '1>&&'' and the !ebsite*com part an, site can be put in* this attack #ust from cmd still have enou h po!er to brin do!n sites* .hese attacks can

also be used on a persons home net!ork if the I" address is kno!n #ust replace the !ebsite !ith the I" and it !ill overflo! the home net!ork and temporaril, brin it do!n* +s ,ou can see this is one of the most useful and ?uick !a,s to take do!n a site*

Most used forms of hackin


5aitin
5aitin is !hen someone preloads a @S5 !ith mal!are and then ives it to someone in the hopes the, !ill use it in there computer !hich enables the hacker to hack it*

Click1Aackin
Hidin 9concealin h,perlinks under le itimate clickable content on sites (for e)ample like or share buttons) !hich !hen clicked- the user unkno!in l, commits actions- !hich can include do!nloadin mal!are or sendin ,our I" to a person or site*

=licitation
.he use of conversation to take information from people !ithout them feelin like the, are bein interro ated*

Do)in
"ublicl, releasin a persons identif,in information*

Spoofin
Deceivin computer users b, hidin or fakin there identit,- the : most !ell kno!n forms of spoofin are email spoofin and I" spoofin *

Scams
Bake deals to trick people into enterin personal information such as bank detailscontact details- social net!orkin accounts or providin ,ou do a service in e)chan e for this deal (surve,s)*

Cross1Site Scriptin (CCS)


.his is !hen malicious code is in#ected into a beni n or trusted site/ there are : forms of this CCS attack- !hich are a stored CCS attackand a reflected CCS attack*

"harmin
;edirectin users from le itimate sites to fraudulent versions that look the same as the actual site- for the purpose of e)tractin confidential information*

"hishin
.his is normall, an email that looks as if it(s from a le itimate or ani0ation but is not and contains either a link or file containin mal!are*

"hreakin
.his is ainin unauthori0ed access to telecommunication s,stems* .here are man, more forms of hackin althou h these are the ones !hich are most used b, hackers*

Mal!are and ;ansom!are

Mal!are is infected pro rams- files- folders or various other thin s- that !hen do!nloaded or in#ected into ,our computer it infects it* .here are different forms of mal!are such as !ormstro#ans- and more* ;ansom!are is a pro ram that encr,pts all thin s on ,our computer and threatens do either destro, them or keep them encr,pted unless ,ou do somethin in

return for them like transfer mone, or complete a surve,* .hese are pro rammed b, hackers- the most famous !orm virus and also the first one !as the Morris !orm !hich !as named after its creator ;obert Morris* .here are man, !a,s to remove mal!are and ransom!are either manuall, (!hich takes a stron kno!led e on the computer s,stem) or a antivirus such as Mc+fee or 7orton*

"otential #obs for hackers


Hackers that hack for ood reasons are called !hite hat hackers- these t,pes of hackers can have various #obs !hich the, use there hackin skills some of there involve8

S,stem securit, test

I. teacher B5I computer e)pert Dulnerabilit, tester +nd much moreE


+ll the #obs listed above involve usin hackin skills includin most of the thin s listed throu hout this e5ook*

You might also like