By Nilesh Sah, Jeeri Deka and Atul Goel 
Picture
Introduction

Crime audaciously flourishes in the modern era, and the latest emerging trend in crime is through a computer, which is generally referred to as Cyber Crime. Every year about $500 million are mislaid due to cyber crime.  Hence, the concepts of cyber security and cyber crime have expanded widely during the last decade. The key term associated with the above concepts is “Hacking”. For a person who doesn’t know the basic definition of hacking, to put it in a simpler way, “Hacking is a process where computers are hypnotized by professionals and then used for both legal and illegal activities”.  In hacking, a computer buff referred to as hacker, breaks into a computer system and exploits the information of that system.

Key terms and process of hacking

Hackers are fully aware about the ins and outs of a computer system and its security. There are some trusted hackers called white hats, which are appointed by large organizations, so that they know the vulnerability of their systems and fix it. This process is generally known as ethical hacking. On the other hand, there is a process of cracking, where a cracker (unethical hacker called black hats) gets hold of one’s personal information such as credit card number, personal number, financial data etc. and uses it for his or her own advantage. A hacker doesn’t harm others, but a cracker surely does.

Hacking is basically a nine part process as described in the book “Hacking Exposed”.

·         First come Footprinting, where one gathers information about the server, user and IP address. IP address is internet protocol address which is like a thumbprint. It is a unique set of numbers assigned to each device on a network that allows a computer to communicate with the router. In short, a hacker/cracker can’t proceed without an IP address. 

·         The next step involves scanning for operating system being used and trying to find open ports.

·         Enumeration deals with poorly protected sources or user accounts that one can break into.

·         Now the hacker tries to access the system with the gathered information. For example through brute forcing the hacker tries all the combinations of the passwords until he gains access to the account.

·         The hacker tries to crack the password of the admin and exploits it to increase the level of access.

·         Again the hacker seeks to gather information to gain access to other systems in the network.

·         The hacker aims to cover up his tracks by clearing the system log files on the operating system.

·         The hacker strives to leave back doors so that he won’t experience much difficulty in entering into the system the next time.

·         Lastly, if hackers are unsuccessful in the above cases, they simple use a DOS (denial of service) that breaks down the entire system.