<div class="separator" style="clear: both; text-align: center;">
</div>
<b><i><u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif; font-size: large;">Can Hacking Be Ethical?</span></u></i></b>
<div style="border: medium none;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4SsF3qSAXn1Fj7yDl8pv1I6QELWegErKzapcXe3QdvCz2bitMR2ohIBKUvopGirKiHpOFVXcpzKFogcsU-CRStL8shrVscAhlxfPD_F-7ASyKaW9UWrlta9gIoW9ChxOn4ppfXcF1uyA/s1600/hacking.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4SsF3qSAXn1Fj7yDl8pv1I6QELWegErKzapcXe3QdvCz2bitMR2ohIBKUvopGirKiHpOFVXcpzKFogcsU-CRStL8shrVscAhlxfPD_F-7ASyKaW9UWrlta9gIoW9ChxOn4ppfXcF1uyA/s200/hacking.gif" width="176" /></a></div>
<div style="border: medium none;">
</div>
<div style="border: medium none;">
</div>
<div style="border: medium none;">
</div>
<div style="border: medium none;">
</div>
<div style="border: medium none;">
</div>
<div style="border: medium none;">
</div>
<div style="border: medium none;">
</div>
<div style="border: medium none;">
</div>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="color: #9fc5e8;">The noun '<a href="http://www.cdefenders.tk/">hacker</a></span><span class="Apple-style-span" style="color: #9fc5e8;">' refers to a person who enjoys learning the details of computer systems and stretch their capabilities.</span></b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b> </b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>The verb '<a href="http://www.cdefenders.tk/">hacking</a>' describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b> </b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>The term '<a href="http://www.cdefenders.tk/">cracker</a>' refers to a person who uses his hacking skills for offensive purposes.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b> </b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>The term '<a href="http://www.cdefenders.tk/">Ethical hacker</a>' refers to security professionals who apply their hacking skills for defensive purposes.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>So these are some terms which u should know.Now u have to decide weather u want to be a ethical hacker or a cracker.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>for more hackers communities .click <a href="http://ethicalspot.blogspot.com/p/terms.html">here</a></b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<b><i><u><span style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif; font-size: large;">Essential Terminology</span></u></i></b>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b> </b></span>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="color: #b6d7a8; font-size: large;">Threat</span><span class="Apple-style-span" style="color: #9fc5e8;"> - An action or event that might prejudice security. A threat is a potential violation of security.</span></b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b> </b></span>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="color: #b6d7a8; font-size: large;">Vulnerability</span><span class="Apple-style-span" style="color: #9fc5e8;"> - Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system.</span></b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b> </b></span>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="color: #b6d7a8; font-size: large;">Target of Evaluation</span><span class="Apple-style-span" style="color: #9fc5e8;"> - An IT system, product, or component that is identified/subjected as requiring security evaluation.</span></b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b> </b></span>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="color: #9fc5e8;"> </span><span class="Apple-style-span" style="color: #b6d7a8; font-size: large;">Attack </span><span class="Apple-style-span" style="color: #9fc5e8;">- An assault on system security that derives from an intelligent threat. An attack is any action that attempts to or violates security.</span></b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b> </b></span>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="color: #9fc5e8;"> </span><span class="Apple-style-span" style="color: #b6d7a8; font-size: large;">Exploit</span><span class="Apple-style-span" style="color: #9fc5e8;"> - A defined way to breach the security of an IT system through vulnerability.</span></b></span>
<b><i><u><span style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif; font-size: large;">Malicious hacker strategies:</span></u></i></b>
<b><i><span class="Apple-style-span" style="color: #ea9999; font-family: Arial, Helvetica, sans-serif;">"THE ONE WHO CAN HACK IT ONLY RESTORE IT"</span></i></b>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW3bAJCik_RkNnjvBON55_L0ThdwSCPGVyT2px-uF3rMRki9GJdhLiX5EXcXXWG1l6DBPhNTx4rAXd6ei48dY-PgnhYHD2E43suWoOu4E3f1-8uRj5BXS_9kJQ9h08_aiV-jTg4RAJNsE/s1600/untitled.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="272" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW3bAJCik_RkNnjvBON55_L0ThdwSCPGVyT2px-uF3rMRki9GJdhLiX5EXcXXWG1l6DBPhNTx4rAXd6ei48dY-PgnhYHD2E43suWoOu4E3f1-8uRj5BXS_9kJQ9h08_aiV-jTg4RAJNsE/s320/untitled.bmp" width="320" /></a></div>
<span class="Apple-style-span" style="color: #b4a7d6; font-family: Arial, Helvetica, sans-serif;"><b><i><u>HACKING phase 1.- Information Gathering</u></i> </b></span>
<div class="separator" style="border: medium none; clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh63g_FEe-MNt2_8Mqfgz1hIREqmQLMYyQ9mVigcSmMOiyedljiwHQzUOuB24uwtmpwXBl0k0D9qJcMzzCxGl2DIErhqxFix_fE6nKqw058RmwNcrK1YwtNrjIWeSMj0oxXJAc96L2RF50/s1600/altavista_logo-vert.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="48" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh63g_FEe-MNt2_8Mqfgz1hIREqmQLMYyQ9mVigcSmMOiyedljiwHQzUOuB24uwtmpwXBl0k0D9qJcMzzCxGl2DIErhqxFix_fE6nKqw058RmwNcrK1YwtNrjIWeSMj0oxXJAc96L2RF50/s320/altavista_logo-vert.jpg" width="320" /></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Information gathering is initial process as far as hacking a investingating is concerned.It is the process of profiling any organisatiom,system,server ar an individual using methodological procedure.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Information gathering is used by attacker as well as investigator to get more information about target.</b></span>
<u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;"><b>Attackers point of view:</b></span></u>
<u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span></u>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Attacker will first gather initial information like domain name,ip address,network ip range,operating system,services,control pannel information,vulnerable services etc before attacking into system.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Footprinting is required to ensure that isolated information repositories that are critical to the attack are not overlooked or left undiscovered. footprintingmerely comprosis on aspect of the entire information gathering process,but is considered one of the most inportant stages of a mature hack.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Attacker will take 90% of time in information gathering & only 10% of time while attacking & ganing an acess to the system.</b></span>
<u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;"><b>Investigator's point of view:</b></span></u>
<u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span></u>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Investigator will gather initial information like traces of criminal on an internet,about his name ,occupation,adress,contact, about his/her company/organisation before taking any legel action .</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">This will help investigator to profile the criminal & his/her activities properly during interrogation.</span></b>
<u><span class="Apple-style-span" style="color: #cfe2f3; font-family: Arial, Helvetica, sans-serif;"><b>Following are the various methodologies for informatin gathering.:</b></span></u>
<b><i><u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;">1.Information gathering using search engine:</span></u></i></b>
<b><i><u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;">
</span></u></i></b>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>" one leaves footprint /information everywhere while surfing internet "this is the basic principle for investigators as well as hackers .the only difference is the way they use this information</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Attacker will gather information about system information,operating system,vulnerable application running on themand later on exploit it.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Investigator will gather information in he got an access to system & where he left his /her footprint behind the same &later on traced it.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>search engine are the most powerful tool to search about any individual,organisation & system.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>following are the list of top 10 search engines:</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Google search:World's most powerful search engine</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b> <a href="http://www.google.com/">http://www.google.com/</a></b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgh9M6iRvwzIqhk4jkY2n3KfOZwXJDtUqCZ2iM8URxV7wN2GCH8-3cLTcwNNHmYRCa0QXk4VZaOx695J7nHtYMuN9EEMeD2Yqy_ZTvhOp88-hymWuN98dL1cz1_Sm-xEjMNNo54J2wAxtw/s1600/google-logo_2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="140" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgh9M6iRvwzIqhk4jkY2n3KfOZwXJDtUqCZ2iM8URxV7wN2GCH8-3cLTcwNNHmYRCa0QXk4VZaOx695J7nHtYMuN9EEMeD2Yqy_ZTvhOp88-hymWuN98dL1cz1_Sm-xEjMNNo54J2wAxtw/s200/google-logo_2.jpg" width="200" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Yahoo search: <a href="http://www.search.yahoo.com/">http://www.search.yahoo.com/</a></b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4Pd6fcxKTFS9pNO1HLNHXpH1uLg1LbQX5HkWFRoB82cAan6K5cNu7xLQHEjVnWJWKxg6sEzqSx6rdq5g_-DJTBLWaQNaysqMZTdfQqXx3_bHUdQlqkULfUjqbJ1AHe7ndQmiH7k25REE/s1600/untitled.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4Pd6fcxKTFS9pNO1HLNHXpH1uLg1LbQX5HkWFRoB82cAan6K5cNu7xLQHEjVnWJWKxg6sEzqSx6rdq5g_-DJTBLWaQNaysqMZTdfQqXx3_bHUdQlqkULfUjqbJ1AHe7ndQmiH7k25REE/s1600/untitled.bmp" /></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*AOL search:<a href="http://www.search.aol.in/">http://www.search.aol.in/</a> </b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5tLDL_-Cgsy9HsOMoi1Qg6pV7TVzipk7Cw7aShMN7w-IXE6SgUq263EFBlXJZnviKQjhoRwSpLbel3kdS4f6q70UW6bLl-LMuvIsFGoZfqCqalIBQCkhr0gLKptUYs3c-tnVVhpmlu7w/s1600/untitled78.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><b><i><img border="0" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5tLDL_-Cgsy9HsOMoi1Qg6pV7TVzipk7Cw7aShMN7w-IXE6SgUq263EFBlXJZnviKQjhoRwSpLbel3kdS4f6q70UW6bLl-LMuvIsFGoZfqCqalIBQCkhr0gLKptUYs3c-tnVVhpmlu7w/s1600/untitled78.bmp" /></i></b></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Ask search:<a href="http://www.ask.com/">http://www.ask.com/</a></b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiijmCUCAJexHOU1t5luio3Vxws7eyg5s2TeTPP0p8ScjhM36XbuJMdUeYnqaY0bQMhxf5OifeE1XIUHEKvccH2E6lRW-I7LJGqzGw7bfEAFABZInmiQgKhls1blhcK8G7nUBjZICCX1bo/s1600/untitled12.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiijmCUCAJexHOU1t5luio3Vxws7eyg5s2TeTPP0p8ScjhM36XbuJMdUeYnqaY0bQMhxf5OifeE1XIUHEKvccH2E6lRW-I7LJGqzGw7bfEAFABZInmiQgKhls1blhcK8G7nUBjZICCX1bo/s1600/untitled12.bmp" /></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Altavista search:<a href="http://www.altavista.com/">http://www.altavista.com/</a></b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH7a9Y4B6cOccB4eJmxSSrqTotLK38T7WZ1rVg9tIjkoZApjjydyO_slIdKTe36yY5nV9Z3XBYsyfCl6MUWp8pWA3S6QaYYnbxBCds__xJ5IWNKT85FKQHcecgr5y1ovlRxeg4AJEMClc/s1600/altavista_logo.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="131" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH7a9Y4B6cOccB4eJmxSSrqTotLK38T7WZ1rVg9tIjkoZApjjydyO_slIdKTe36yY5nV9Z3XBYsyfCl6MUWp8pWA3S6QaYYnbxBCds__xJ5IWNKT85FKQHcecgr5y1ovlRxeg4AJEMClc/s320/altavista_logo.gif" width="320" /></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Fast search:<a href="http://www.alltheweb.com/">http://www.alltheweb.com/</a></b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW0N35cswoZqgWdXy-KV7xpPk-ZvL7QTYqVALrCUOGthCwTFNKHC40Ax5H7hqFWcBZF7l4R1sGSkPvGLE0hALoirS8EqLJX4kI-bUw59qvWFYK9Guzd1K2jU7KFdWuJ-8v8YeQdvGYv5M/s1600/atwlogo_h.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW0N35cswoZqgWdXy-KV7xpPk-ZvL7QTYqVALrCUOGthCwTFNKHC40Ax5H7hqFWcBZF7l4R1sGSkPvGLE0hALoirS8EqLJX4kI-bUw59qvWFYK9Guzd1K2jU7KFdWuJ-8v8YeQdvGYv5M/s1600/atwlogo_h.gif" /></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Gigablast:<a href="http://www.gigablast.com/">http://www.gigablast.com/</a></b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl_JUBMwpSEg04BQ-I4qCqOOUJitiXxk0PVjuwBV_VQPJTCJirldfcbO7eJOPRh5M5qUamthiFwxm78hjECI2RqpxiNWEjA8rkWXdtVNV0aCwR_1Va6m6IE0DhxWK9-HuDd6lHusNRqAI/s1600/gigablast.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="148" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl_JUBMwpSEg04BQ-I4qCqOOUJitiXxk0PVjuwBV_VQPJTCJirldfcbO7eJOPRh5M5qUamthiFwxm78hjECI2RqpxiNWEjA8rkWXdtVNV0aCwR_1Va6m6IE0DhxWK9-HuDd6lHusNRqAI/s320/gigablast.gif" width="320" /></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Snap search:<a href="http://www.snap.com/">http://www.snap.com/</a></b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSLpF54TjiuvxdAs5uDjCmvgoU44WlothOB08DaH4QiLk3icwrsP0F029J-tk3ZLgq5hgVstfL5r7vZl30d81ktaY61SID23fCQ9Qgta8SiIvQKnhgwJALWzMUR0JbDcxXaKh9G8ZRrj0/s1600/LZ0MCCA452TIBCAH3ZB2ICAJS7IGACA3F1IV6CAS1XCYHCAHORSDKCAYPO6IOCA81AD05CAC4XKTSCAKQNRB9CALBOE4WCA458BSBCATLZCXACA3JJ8AICAV2D2JSCAGCCG3WCANJQSKJCA6J5ZMB.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSLpF54TjiuvxdAs5uDjCmvgoU44WlothOB08DaH4QiLk3icwrsP0F029J-tk3ZLgq5hgVstfL5r7vZl30d81ktaY61SID23fCQ9Qgta8SiIvQKnhgwJALWzMUR0JbDcxXaKh9G8ZRrj0/s1600/LZ0MCCA452TIBCAH3ZB2ICAJS7IGACA3F1IV6CAS1XCYHCAHORSDKCAYPO6IOCA81AD05CAC4XKTSCAKQNRB9CALBOE4WCA458BSBCATLZCXACA3JJ8AICAV2D2JSCAGCCG3WCANJQSKJCA6J5ZMB.jpg" /></a></div>
<b><i><u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;">2.Information gathering using relational search engine:</span></u></i></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">This type of search engines gets results from different search engine &make relation or connections between those results.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">*<u><i> kartoo</i></u> <a href="http://www.kartoo.com/">http://www.kartoo.com/</a></span></b>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9mQI-acEniIUQb-C8op5SBWNiChPlo6wkFspc_Yb8KQ1ialMWkre_BCpAkyYl1Qv2oAvfr4Q0hGXg-wgXiCBrhlCQPqVc3JGPk1_iAaaefrcQ8phgzWgXlqELQ4svu0O-jrZkq9DWz-s/s1600/kartoo-search-result.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="251" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9mQI-acEniIUQb-C8op5SBWNiChPlo6wkFspc_Yb8KQ1ialMWkre_BCpAkyYl1Qv2oAvfr4Q0hGXg-wgXiCBrhlCQPqVc3JGPk1_iAaaefrcQ8phgzWgXlqELQ4svu0O-jrZkq9DWz-s/s320/kartoo-search-result.jpg" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">*<u><i><b>Maltego</b></i></u> <b><i><u><u> <a href="http://www.maltego.com/">http://www.maltego.com/</a></u></u></i></b></span>
<b><i><u>
</u></i></b>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd0n8zubgG6-4YGZL-0YB1IsIJSWcffOwia6TjOdwH-zdlt3vMQDlJeazX3NbuDSCEPXNYT6VKMQYFpCXQjKib_Zz8hoJ9keQeoiz8atIixObcj0qKKpqt3Fz0EWXQXA2TIbKnUdPPoaA/s1600/Maltego_in_action_610x435.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="228" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd0n8zubgG6-4YGZL-0YB1IsIJSWcffOwia6TjOdwH-zdlt3vMQDlJeazX3NbuDSCEPXNYT6VKMQYFpCXQjKib_Zz8hoJ9keQeoiz8atIixObcj0qKKpqt3Fz0EWXQXA2TIbKnUdPPoaA/s320/Maltego_in_action_610x435.png" width="320" /></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*<i><u>Yahoo</u></i> people search:<a href="http://people.yahoo.com/">http://people.yahoo.com/</a></b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXGeVVgx4yRqAaIQCOyKIKIawyWd10UKcjXYnJx_phduzrBJBrcVukOlIZbIK6xylVrvs0SQ2NeJf23wegdZ03fvDoNPFXNwXexAdQDwYlfAeVtzdrXBxEPHgBlEt3wqWIHSW84c4B6sQ/s1600/2613243426_814702354f.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="164" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXGeVVgx4yRqAaIQCOyKIKIawyWd10UKcjXYnJx_phduzrBJBrcVukOlIZbIK6xylVrvs0SQ2NeJf23wegdZ03fvDoNPFXNwXexAdQDwYlfAeVtzdrXBxEPHgBlEt3wqWIHSW84c4B6sQ/s320/2613243426_814702354f.jpg" width="320" /></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*<i><u>Intelius </u></i>search: <a href="http://www.intelius.com/">http://www.intelius.com/</a></b></span>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2Pba08F82L_rLRS1MMZUq1rVT6KaSrg6XkS_mA3EuSt4kV4nJTtsmCiJHs1-5MrYmcsAXWiJjatF8Wtuj5urFYsBOrFtjRSzfed1IrNca0bmf8IWBhjBq1qd329bTIogUQqJL985eOxs/s1600/untitled.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="172" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2Pba08F82L_rLRS1MMZUq1rVT6KaSrg6XkS_mA3EuSt4kV4nJTtsmCiJHs1-5MrYmcsAXWiJjatF8Wtuj5urFYsBOrFtjRSzfed1IrNca0bmf8IWBhjBq1qd329bTIogUQqJL985eOxs/s320/untitled.bmp" width="320" /></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*<i><u>Whois</u></i> look up :<a href="http://www.whois.net/">http://www.whois.net/</a></b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAAG5RxNWpTjhlPPXv9MbrOUYleVAGHZTsosF4comuq5gLeyNnwr8HCEM2inP0im5tQFtF06zOXJMrwNDuwSfz6cUtaTGgwG8TCSXdGv40tmXhYK2Mms-IFvvcJe2-ZB9Ky4-EwE4z74o/s1600/carolyn_01.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="165" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAAG5RxNWpTjhlPPXv9MbrOUYleVAGHZTsosF4comuq5gLeyNnwr8HCEM2inP0im5tQFtF06zOXJMrwNDuwSfz6cUtaTGgwG8TCSXdGv40tmXhYK2Mms-IFvvcJe2-ZB9Ky4-EwE4z74o/s320/carolyn_01.jpg" width="320" /></a></div>
<b><i><u><span style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;">HACKING phase2.-Scaning</span></u></i></b>
<span style="color: #9fc5e8; font-family: Arial;"><b>Many times ago we scanned the different ports making telnet manually,today people use more sophiscated programmes with massive methods to scan IP ranges searching o lot of ports.</b></span>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<span style="color: #9fc5e8; font-family: Arial;"><b>Scaning is the process of finding out open /close ports,vernabilities in remote system,server&networks,scaning will reveal IP addresses ,operating systems,service runing on remote computer.</b></span>
<span style="color: #9fc5e8; font-family: Arial;"><b>There are three types of scaning.</b></span>
<span style="color: #9fc5e8; font-family: Arial;"><b> 1.Port Scaning</b></span>
<span style="color: #9fc5e8; font-family: Arial;"><b> 2.Network Scaning</b></span>
<span style="color: #9fc5e8; font-family: Arial;"><b> 3.Vulnerable Scaning</b></span>
<b><span class="Apple-style-span" style="color: #b6d7a8;"><u style="font-family: Arial, Helvetica, sans-serif;"><i>Hacking Phase 3 Gaining Access</i></u><span style="font-family: Arial, Helvetica, sans-serif;"> - </span></span></b>
<b><span class="Apple-style-span" style="color: #b6d7a8;"><span style="font-family: Arial, Helvetica, sans-serif;">
</span></span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">The hacker exploits the system </span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Gaining Access refers to the true attack phase. The hacker exploits the system.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">The exploit can occur over a LAN, locally, Internet, offline, as a deception or theft. Examples include stack-based buffer overflows, denial of service, session hijacking, password filtering etc.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Influencing factors include architecture and configuration of target system, skill level of the perpetrator and initial level of access obtained.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Business Risk - 'Highest' - The hacker can gain access at operating system level, application level or network level.</span></b>
<u><i><b><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;">Hacking Phase 4 - Maintaining Access </span></b></i></u>
<b><span class="Apple-style-span" style="color: #9fc5e8;">Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">The hacker has exploited a vulnerability and can tamper and compromise the system.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">Sometimes, hackers harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, Trojans and Trojan horse Backdoors.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">Hackers can upload, download or manipulate data / applications / configurations on the 'owned' system.</span></b>
<u><i><b style="font-family: Arial,Helvetica,sans-serif;"><span class="Apple-style-span" style="color: #b6d7a8;">Hacking Phase 5 - Covering Tracks </span></b></i></u>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Covering Tracks refers to the activities undertaken by the hacker to extend his misuse of the system without being detected.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Reasons include need for prolonged stay, continued use of resources, removing evidence of hacking, avoiding legal action etc.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Examples include Steganography, tunneling, altering log files etc.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Hackers can remain undetected for long periods or use this phase to start a fresh reconnaissance to a related target system.</span></b>
Grab This Widget
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment
Please feel free to comment !!!!!!!!!!!!!