Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 5/
  5. Cyber Security (4353204)/

7 mins· ·
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Hacking Basics

Hacking Basics

Introduction to Computer Hacking and Security Testing

Understanding the Fundamentals of Cyber Attacks and Defense

Hacking Steps

Hacking Definition

Hacking is the practice of identifying weaknesses and vulnerabilities in computer systems, networks, or applications to gain unauthorized access or manipulate system behavior, either for malicious purposes or security improvement.

Original Meaning vs Modern Context:

  • Original (1960s): Creative problem-solving and system optimization
  • Modern: Unauthorized system access and security exploitation
  • Technical Definition: Exploiting system vulnerabilities to bypass security measures
  • Broader Context: Any unconventional or clever solution to technical problems
Core Elements: Knowledge of systems, creativity, persistence, technical skills, and understanding of security weaknesses

Types of Hackers

White Hat Hackers:

  • Motivation: Improve security
  • Authorization: Explicit permission
  • Goal: Find and fix vulnerabilities
  • Legal Status: Legal and ethical
  • Examples: Security consultants, penetration testers
  • Activities: Vulnerability assessments, security audits

Black Hat Hackers:

  • Motivation: Personal gain, malice
  • Authorization: No permission
  • Goal: Steal, damage, profit
  • Legal Status: Illegal and unethical
  • Examples: Cybercriminals, data thieves
  • Activities: Data breaches, financial theft

Gray Hat Hackers:

  • Motivation: Mixed motives
  • Authorization: Often without permission
  • Goal: Expose vulnerabilities
  • Legal Status: Legally questionable
  • Examples: Independent researchers
  • Activities: Unauthorized disclosure
Additional Categories: Script kiddies (use existing tools), hacktivists (political motives), state-sponsored hackers (government backing)

Hacker Classifications by Skill Level

Script Kiddies:

  • Skill Level: Beginner/Low
  • Methods: Use pre-made tools and scripts
  • Knowledge: Limited understanding of techniques
  • Motivation: Recognition, curiosity, mischief
  • Threat Level: Low to moderate
  • Examples: Using Metasploit without understanding

Intermediate Hackers:

  • Skill Level: Moderate
  • Methods: Modify existing tools, basic programming
  • Knowledge: Understanding of systems and vulnerabilities
  • Motivation: Learning, financial gain
  • Threat Level: Moderate to high
  • Examples: Custom payload development

Advanced/Elite Hackers:

  • Skill Level: Expert/Master
  • Methods: Zero-day exploits, advanced persistent threats
  • Knowledge: Deep system knowledge, custom exploit development
  • Motivation: Various (financial, political, research)
  • Threat Level: Very high
  • Examples: Nation-state actors, elite cybercriminal groups

Hacker Motivations

Financial Gain:

  • Credit card fraud and identity theft
  • Ransomware and extortion
  • Cryptocurrency theft and mining
  • Selling stolen data
  • Banking and financial fraud

Political/Ideological:

  • Hacktivism and social causes
  • Government espionage
  • Corporate espionage
  • Whistleblowing activities
  • Protest and disruption

Personal/Research:

  • Learning and skill development
  • Challenge and recognition
  • Security research
  • Bug bounty programs
  • Academic research

Malicious Intent:

  • Revenge: Targeting specific individuals or organizations
  • Vandalism: Defacing websites or destroying data
  • Chaos: Disrupting services and operations
  • Fame: Seeking notoriety and media attention

General Hacking Methodology

Systematic Approach: Professional hackers (both ethical and malicious) follow structured methodologies to maximize success and minimize detection.
Common Hacking Phases:

1. Reconnaissance (Information Gathering):
• Passive information gathering
• Target identification and profiling
• Social media and public records research
• Network and system discovery

2. Scanning and Enumeration:
• Port scanning and service discovery
• Vulnerability identification
• System fingerprinting
• Network mapping

3. Gaining Access:
• Exploit execution
• Password attacks
• Social engineering
• Physical security bypass

4. Maintaining Access:
• Installing backdoors and rootkits
• Privilege escalation
• System persistence
• Covering tracks

5. Covering Tracks:
• Log file manipulation
• Evidence destruction
• Anti-forensics techniques

Information Gathering Techniques

Passive Reconnaissance:

  • OSINT (Open Source Intelligence): Public information gathering
  • Search Engines: Google dorking, specialized searches
  • Social Media: LinkedIn, Facebook, Twitter analysis
  • DNS Records: Whois, DNS enumeration
  • Website Analysis: Source code, metadata
  • Public Databases: Shodan, Censys

Active Reconnaissance:

  • Port Scanning: Nmap, network discovery
  • Service Enumeration: Banner grabbing
  • Vulnerability Scanning: Nessus, OpenVAS
  • Web Application Testing: Directory enumeration
  • Social Engineering: Direct contact attempts
  • Physical Reconnaissance: Site surveys
Information Gathering Tools:
Search: Google, DuckDuckGo, Shodan, Censys
DNS: dig, nslookup, fierce, dnsrecon
OSINT: Maltego, theHarvester, Recon-ng
Social Media: Social-Engineer Toolkit (SET)
Network: Nmap, masscan, Zmap
Web: Burp Suite, OWASP ZAP, dirb

Common Attack Vectors

Network Attacks:

  • Port scanning and service enumeration
  • Man-in-the-middle attacks
  • ARP poisoning and spoofing
  • DNS poisoning and hijacking
  • DDoS and DoS attacks
  • Packet sniffing and injection

Application Attacks:

  • SQL injection and NoSQL injection
  • Cross-site scripting (XSS)
  • Cross-site request forgery (CSRF)
  • Buffer overflow attacks
  • Directory traversal
  • Command injection

System Attacks:

  • Password attacks and brute forcing
  • Privilege escalation
  • Malware deployment
  • Rootkit installation
  • Registry manipulation
  • Service exploitation

Social Engineering in Hacking

Social Engineering: Psychological manipulation of people to divulge confidential information or perform actions that compromise security.

Common Techniques:

  • Phishing: Fraudulent emails and websites
  • Pretexting: Creating false scenarios
  • Baiting: Offering something enticing
  • Tailgating: Following authorized personnel
  • Quid Pro Quo: Offering help in exchange
  • Impersonation: Posing as trusted entities

Target Psychology:

  • Authority: People follow authority figures
  • Urgency: Time pressure reduces critical thinking
  • Fear: Threats motivate compliance
  • Trust: Familiar faces are trusted
  • Helpfulness: People want to be helpful
  • Curiosity: Unknown items attract attention
Social Engineering Attack Chain:
1. Research: Gather information about targets
2. Select Target: Choose vulnerable individuals
3. Develop Rapport: Build trust and relationship
4. Exploit Relationship: Request sensitive information
5. Execute: Use obtained information for access

Physical Security in Hacking

Physical Security: Often the weakest link in security - direct physical access can bypass many digital security measures.

Physical Attack Methods:

  • Lock Picking: Mechanical lock bypass
  • Tailgating: Following authorized personnel
  • Badge Cloning: RFID/proximity card duplication
  • USB Drops: Malicious USB devices
  • Shoulder Surfing: Observing credentials entry
  • Dumpster Diving: Searching discarded information

Physical Targets:

  • Workstations: Unlocked computers
  • Server Rooms: Network infrastructure
  • Network Closets: Switch and router access
  • Printers: Document interception
  • Reception Areas: Information gathering
  • Parking Lots: WiFi attacks, surveillance
Physical Security Tools:
Lock picking: Pick sets, bump keys, tension wrenches
RFID: Proxmark3, RFID cloners
USB: USB Rubber Ducky, Bash Bunny
Network: Network taps, WiFi Pineapple
Surveillance: Hidden cameras, keyloggers

Hacking Tools Categories

Network Tools:

  • Nmap: Port scanner and network discovery
  • Wireshark: Network protocol analyzer
  • Metasploit: Exploitation framework
  • Aircrack-ng: WiFi security testing
  • Ettercap: Network security tool

Web Application Tools:

  • Burp Suite: Web application security
  • OWASP ZAP: Web security scanner
  • SQLmap: SQL injection testing
  • Nikto: Web server scanner
  • Dirb/Gobuster: Directory enumeration

Password Tools:

  • John the Ripper: Password cracker
  • Hashcat: Advanced password recovery
  • Hydra: Network login cracker
  • Medusa: Parallel brute forcer
  • Cain & Abel: Password recovery

Legal and Ethical Considerations

Illegal Activities:

  • Unauthorized Access: Accessing systems without permission
  • Data Theft: Stealing personal or corporate data
  • System Damage: Destroying or modifying data
  • Service Disruption: DDoS attacks, system outages
  • Financial Fraud: Using access for monetary gain
  • Identity Theft: Stealing personal information

Legal/Ethical Activities:

  • Authorized Penetration Testing: Written permission
  • Bug Bounty Programs: Responsible disclosure
  • Security Research: Academic or professional research
  • Personal Systems: Testing own systems
  • Training Environments: Dedicated lab systems
  • Open Source Security: Community security testing

Legal Frameworks:

  • Computer Fraud and Abuse Act (CFAA): US federal computer crime law
  • Digital Millennium Copyright Act (DMCA): Copyright protection
  • General Data Protection Regulation (GDPR): EU data protection
  • State and Local Laws: Additional jurisdictional requirements

Common Defensive Measures Against Hacking

Technical Controls:

  • Firewalls and intrusion detection systems
  • Regular security updates and patches
  • Strong authentication and access controls
  • Network segmentation and monitoring
  • Encryption and secure communications
  • Vulnerability scanning and assessment

Procedural Controls:

  • Security awareness training
  • Incident response procedures
  • Regular security audits
  • Change management processes
  • Data backup and recovery plans
  • Physical security measures

Monitoring and Detection:

  • Security Information and Event Management (SIEM)
  • Network traffic analysis
  • Behavioral analytics
  • Threat intelligence feeds
  • Log analysis and correlation
  • Honeypots and deception technology

Career Paths in Ethical Hacking

Professional Roles:

  • Penetration Tester: Authorized security testing
  • Security Consultant: Security advisory services
  • Vulnerability Researcher: Finding and reporting vulnerabilities
  • Security Analyst: Monitoring and incident response
  • Forensics Investigator: Digital crime investigation
  • Red Team Member: Attack simulation specialist

Required Skills:

  • Technical Skills: Networking, systems, programming
  • Security Tools: Proficiency with testing tools
  • Communication: Report writing, presentation skills
  • Legal Knowledge: Understanding of relevant laws
  • Continuous Learning: Staying current with threats
  • Problem Solving: Creative thinking and analysis

Professional Certifications:

  • CEH (Certified Ethical Hacker): Entry-level ethical hacking
  • OSCP (Offensive Security Certified Professional): Hands-on penetration testing
  • CISSP (Certified Information Systems Security Professional): Security management
  • SANS GPEN: Penetration testing certification
  • CompTIA Security+: Fundamental security knowledge

Key Takeaways

  • Hacking involves exploiting system vulnerabilities to gain unauthorized access
  • Hackers range from script kiddies to sophisticated state-sponsored groups
  • Motivations include financial gain, political activism, and security research
  • Hacking methodology follows structured phases from reconnaissance to covering tracks
  • Social engineering and physical security are often the weakest links
  • Legal and ethical boundaries must be clearly understood and respected
  • Defensive measures require both technical controls and human awareness
  • Ethical hacking provides legitimate career opportunities in cybersecurity
Remember: Knowledge of hacking techniques is essential for defense, but must always be applied ethically and legally with proper authorization

Thank You

Questions & Discussion

Next: Types of Hacking