Professional Documents
Culture Documents
Introduction Command prompt Denial of service (DOS) attacks Most used forms of hackin Mal!are and ransom!are "otential #obs for hackers
Introduction
Since the Internet started !ith the invention of electronic computers in the $%&'(s there has been hackers !ho e)ploit its uses* +nd still no! toda, as the internet is on a !ider ran e of devices and is a lot lar er and stron erhackers advanced !ith it makin there o!n technolo , to take do!n parts of it and take do!n others net!orks* .oda, not all hackers are the same- there are different t,pes of hackers (such as hacktivists- c,ber terroristssp, hackers- !hite and black hat hackers and various other t,pes) and !ith each different hacker the, have different motivations* .he most !ell kno!n hackers are hacktivists/ these hackers are motivated b, politics or reli ion (man, people ma, have heard of the hackin or ani0ation +non,mous- these hackers have been on the ne!s various times for shuttin do!n lar e companies temporaril, to e)pose there !ron 1doin *) With the Internet bein such a lar e part of most peoples lives hackin has become a federal offence and is punishable b, la!* +lthou h not all hackers are bad if so the Internet !ouldn(t e)ist due to the reason that hackers have the abilit, to create deadl, viruses and !ith S23 in#ection it has become simple to shut do!n sites* 4ood hackers are called !hite hat hackers- most of them are securit, e)perts !ho speciali0e in testin ho! to penetrate
sites and s,stems to ensure a compan,(s site and s,stem is secure* .hrou hout this e5ook I !ill e)plain to ,ou the basics of hackin since the !orld basicall, revolves around hackers so its important to et kno!led e on hackin *
Command prompt is the basic pro ram runnin behind ever, !indo!s computer- it is automaticall, put on ever, computer althou h some school or !ork place computers choose the option to block it because of its potential abilities to destro, a net!ork* If command prompt is blocked ,ou can easil, unlock it b, openin notepad and t,pin the follo!in then savin it as cmd*bat 6echo*off command command*com pause 7o! #ust open it and ,our command prompt is read, to o- belo! is a list of some of the basic commands that ,ou can use8 .o add a computer user8 7et user username pass!ord 9add .o delete a computer user8 7et user username 9del Chan e the te)t color 8(the number : can var,
Command "rompt
dependin on !hat color ,ou !ant) Color : Shutdo!n a computer connected to ,our net!ork8 echo off Shutdo!n I 7ote8 a !indo! !ill pop up click bro!se and select the computer ,ou !ant to shutdo!n* Disconnect a device connected to ,our net!ork8 Services*msc 7o! choose select a different computer and choose the one ,ou !ant to disconnect then o to D7S and stop the process* Sho! list of runnin pro rams .ree Disconnect Internet Ipconfi 9release "in a !ebsite "in !ebsite*com .here are much more commands ,ou can learn but these are #ust the basics of them* Command prompt has man, more abilities includin creatin viruses- makin a repeatin messa e- spammin or much more- to do these thin s #ust open notepad and t,pe the follo!in (dependin on !hich one ,ou !ant to do) ;epeatedl, open a messa e8
ms < an, messa e ms < an, other messa e as man, as ,ou !ant 4O.O5=4I7 Spammin a pro ram to open a lot of times Start Start Start Start Start Start Sa, start as much times as ,ou !ant cmd to open in different !indo!s* Cmd has man, more abilities ,ou can create includin makin viruses or dos attackers and much more*
also be used on a persons home net!ork if the I" address is kno!n #ust replace the !ebsite !ith the I" and it !ill overflo! the home net!ork and temporaril, brin it do!n* +s ,ou can see this is one of the most useful and ?uick !a,s to take do!n a site*
Click1Aackin
Hidin 9concealin h,perlinks under le itimate clickable content on sites (for e)ample like or share buttons) !hich !hen clicked- the user unkno!in l, commits actions- !hich can include do!nloadin mal!are or sendin ,our I" to a person or site*
=licitation
.he use of conversation to take information from people !ithout them feelin like the, are bein interro ated*
Do)in
"ublicl, releasin a persons identif,in information*
Spoofin
Deceivin computer users b, hidin or fakin there identit,- the : most !ell kno!n forms of spoofin are email spoofin and I" spoofin *
Scams
Bake deals to trick people into enterin personal information such as bank detailscontact details- social net!orkin accounts or providin ,ou do a service in e)chan e for this deal (surve,s)*
"harmin
;edirectin users from le itimate sites to fraudulent versions that look the same as the actual site- for the purpose of e)tractin confidential information*
"hishin
.his is normall, an email that looks as if it(s from a le itimate or ani0ation but is not and contains either a link or file containin mal!are*
"hreakin
.his is ainin unauthori0ed access to telecommunication s,stems* .here are man, more forms of hackin althou h these are the ones !hich are most used b, hackers*
Mal!are is infected pro rams- files- folders or various other thin s- that !hen do!nloaded or in#ected into ,our computer it infects it* .here are different forms of mal!are such as !ormstro#ans- and more* ;ansom!are is a pro ram that encr,pts all thin s on ,our computer and threatens do either destro, them or keep them encr,pted unless ,ou do somethin in
return for them like transfer mone, or complete a surve,* .hese are pro rammed b, hackers- the most famous !orm virus and also the first one !as the Morris !orm !hich !as named after its creator ;obert Morris* .here are man, !a,s to remove mal!are and ransom!are either manuall, (!hich takes a stron kno!led e on the computer s,stem) or a antivirus such as Mc+fee or 7orton*