Friday 24 July 2009

Group 7 Task 2: Hacking

Group 7:
UMADURGA KALVAKOLANU
BABU ALAPATI
DHARMENDRA BOGIREDDI
VENUMADHAV DUSA
PREETHI ADDLA
SUNITHA RAVI


HACKERS
“Hacker is a term used by some to mean "a clever programmer" and by others,
especially those in popular media, to mean "someone who tries to break into
computer systems.”

The term “hacker” tends to carry a mystique about it that ranges in definition
from anti-social computer genius to malicious virus writer. Thus, modern
hackers as defined in media stories tend to attack networks for identity theft,
to steal credit cards, extort banks , or launch denial-of -service attacks.
Brief definition of hackers A hacker is someone who gains unauthorized access to
a computer system. Many hackers just like the challenge of breaking through a
computer security system but not all hackers are harmless. It must also be said
that not all hackers are bad. Government and huge companies use hackers to
maintain their security systems. People normally confuse hackers with crackers.
While hackers crack the code of passwords to hack into a security system,
crackers crack the code of software to bypass its security mechanisms like
copyright protection etc. Hacking and cracking are two different methods, but
hackers normally possess cracking skills and crackers, hackings skills. Also
note that not all hackers are humans. You also get computerized hackers, but
they are developed by humans of course.
There are basically three types of hackers: Coders, Admins, and
script kiddies. This characterization is based upon overall competence and
ability to compromise computer technology, networks, protocols, and systems.

CODERS
Coders are programmers who have the ability to find unique vulnerabilities in
existing software and to create working exploit codes. These hackers, as a
whole, are not seeking publicity and are rarely part of front-page news
stories. As a result, they are known only to the security community for the
programs they write and the exploits they have uncovered.

Coders are individuals with a deep understanding of the OSI model and the TCP
stack. Coding is more than just a hobby, and they dedicate a great deal of time
and energy to it. They are committed to keeping their technical knowledge and
skills current. Not all coders are malicious. In fact, some are actively
involved in developing technologies that can be used to improve overall network
security, such as hackers from the ISS X-force, the Bind view Razor Team, and
the AXENT SWAT team.

Coders can work independently or through a network of hacking teams that run
exploits from a variety of locations, making it difficult to trace the
activities back to their source. These teams can be developed in Internet Relay
Chat (IRC) channels, in conferences such as DefCon, or in small groups of
computer savvy friends. Often coders create the programs and other members of
the team run them against target networks. This creates a reputation for the
group rather than a single individual.

ADMINS
Admins are far more common than Coders and may have experience with several
operating systems, understand TCP/IP, and know how to exploit several
vulnerabilities. They generally have less depth of knowledge but possibly
greater breadth than Coders. This level of hacker would be part of a security
team in a large organization. Some level of programming or scripting ability is
required. For example, they should be able to port a tool form on flavour of
Unix to another.

A majority of security consultants fall into this group. Admins have worked with
computers for most of their computer careers and understand how they work. They
have an extensive collection of tools, a reliable methodology, and ability, but
they generally rely on other people to identify and code most exploits due t
lack of time to specialize in a particular technology.

Admins like to play with new tools as soon as they come out and are often
beta-testers and part-time developers for freeware and open-source security
tools. They also found as regular contributors to security mailing lists or
post news articles online.

SCRIPT KIDDIES
The lowest and most populated part of the hacker pyramid is the Script kiddie.
Their name comes from the fact that members of this group generally rely on
previously coded scripts and pre-packaged hacking tools downloaded from the
Internet to do their hacking. Script kiddies are usually individuals who are
intrigued by the notion of gaining unauthorized access and a reopen to using
untested pieces of code, especially while others (target networks and users)
are at risk.

For this reason, script kiddies get the least respect but are often the most
annoying and dangerous. Script kiddies can cause big problems against networks
without truly understanding what the scripts do and what the consequences may
be. This combination of irresponsible experimentation and incomplete knowledge
often leads to disaster, such as the unintended loss of information.

Script kiddies do not necessarily have computer related professions. In fact,
given that they are often younger people on the Internet, they may still be in
high school. They run the code they find on the Internet on their office, home,
or school network. Script kiddies are generally precipitants of security mailing
lists, though they may not be regular contributors, and are often vocal in
hacker IRC channels. They spend most of their time surfing the Internet in
search of the latest and greatest automated hacker tools. Curiosity about how
the tools work and what information might be obtained leads to an unauthorized
security breech.

1 comment:

Anonymous said...

very informative, i didn't understand the difference hackers and crackers prior to reading this. i however feel the definition concentrates on black hat hackers. Amina Abdul-Hamid (for Grp 4)