Hacking and Cracking

by 15:32 0 comments


By: Harshit Bansal, BCA 4th Sem, 2nd Shift
One question, can you count the numbers between 0&1? the answer is NO because there exist infinite numbers. This is the deep thinking behind every hacker’s mind.
“FINDING THE LOOPHOLE”, when you stop being or acting as a hacker you will find the magic tricks you believe you can perform. Hacking is generally known by gaining unauthentic access into the foreign vulnerable system with or without permission and the key behind this is finding the loophole. Maybe you will be shocked after reading this, the first hack ever tried was not on a mechanical system! Yes, this is true. A guy named Kevin Mitnick collected the unused bus tickets by dump yard and using those tickets and by just sniffing what serial is used when he could travel all day long to years without paying a single penny. Hacking is gaining expertise knowledge about anything. Technically, it is creative manipulation of code, distinguished amorphously from programming by focusing on the manipulation of already written code. It is done through gathering information about the target machine as the first step also known as Footprinting and scanning. Metaphorically, it extends to social engineering which is manipulation of social identity to gain information. Next step is to gain access and maintain a backdoor for the same. Once you had access you can find any program that could let you maintain that access to the target machine.


Have you ever thought about how the magician pulls out a pigeon out of the hat? Surely it’s not magic. It’s the illusion that the magician had practiced a thousand times and the same applies to hacking, the trick you see is just an after effect of everything the hacker has created.
Some real tips and tricks: How to gain physical access, just create a live CD of any operating system and switch the target machine on, insert CD that contains live OS and press F10 or del to enter boot menu, select DVD drive to let target machine use your operating system instead of what it already have. You have gained unauthorized access to hard drives which contains every data your target machine has, now to create a backdoor either get SAM file (security access manager) of preinstalled OS of target machine which contains password in form of hashes, decrypt those hashes using any utility tool. So without any backlog, you have accessed a system. Deleting or black-marketing crucial information is a tag of cracking.
Now where cracking comes into the scenario is that hacking is challenging the utility of mechanisms which are used to secure a communication network while cracking is a malicious act of breaking into the system or over the network without permission with a motive of destruction. Both have different objectives. Contrary to the widespread myths, cracking does not usually involve some mysterious leap of hacker’s brilliance, but rather a persistence and dogged repetition of a handful of fairly well-known tricks that exploit common weaknesses in the security of the target system.

Talking about Google, fairly everyone knows it’s the most widely used search engine, what about “HACKING GOOGLE SEARCH ENGINE”? Don’t be too eager, the technical term is referred as Google DORKS, i.e. filtering and getting most refined search in one go by prefixing in title: in url: in text: file type: before searched keyword and putting them into “ “(quotes). Using quotes the Google will treat your searched keywords as a single string and give you better results. Try this trick and definitely, you will save your time.

0 comments:

Post a Comment