In this blog post we will be looking at hacking on computers systems.
Along with the
usual intent of harm there is also another breed of hackers called the “Ethical
Hacker / White Hat Hacker” who tries to hack into the system to ensure that
there are indeed no security flaws in the system that can be used by the
harmful hackers to compromise the integrity of the data and / or cause the system
to behave in an errant way.
All of the above was from the
view point of a system. However individual users can also be hacked.
References -
Honan, Mat. "How Apple and Amazon Security Flaws Led to
My Epic Hacking”, 8th June 2012. "http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/”
The recent hacking of various
important websites, like the nsa.gov, the defacement of public sites show
hacking can also serve as a means to protest.
There are a few basic steps that
are taken when trying to hack into a system –
1. Recon – Gather information
about the intended target.
2. Analysis – Analysis of the
gathered information for possible ways to hack the system. Then a decision on using one or more
vulnerabilities is made and a plan is chalked out.
3. Attack – The plan is actually
put into action.
Edit : The hacking process |
Today individuals have a lot of
online accounts like email accounts, Facebook etc. If individually targets and
if the user has not taken precautions then an account can be easily hacked.
Moreover these accounts are often
linked to each other and sometimes what is public information on one account
forms the basis of identification for another account as this post (very
interesting read) over here shows. The hacker gained control of his Amazon,
Apple and Gmail accounts and wiped all the data on the users HDD. All of this
possible because Amazon shows the last four digits of the credit card number to
the account holder. Apple considers these same four digits along with a few
publicly available pieces of info to be sufficient information to reset the
password.
Simple steps to prevent hacking are
to have a good anti-virus installed and monitoring all the activities. Additionally
things like creating a strong enough password can go a long way towards
preventing dictionary attacks on account passwords.
References -