Zusammenfassung der Ressource
HACKING
- Unauthorized access into computers
- Spread computer worms and viruses
- MOTIVE
- Profit
- Protest
- Challenge
- TYPE
- White Hat
- Breaks security for non-malicious reasons
- To test their own security system
- Perform tests and
assessments within a
contractual agreement.
- Black Hat
- Break security for personal
gain
- To destroy data or make
the network unusable
- Grey Hat
- Combination of White + Black Hat
- Hack into system and notify the
administrator - the system security is
defect
- Offer to correct the defect
- Script kiddie
- non-expert
- using pre-packaged
automated tools written
by others
- TECHNIQUES
- Password cracking :
repeatedly try guesses
for the password.
- Phishing: masquerades
another website or system
until user revealing
confidential information,
such as user names and
passwords
- Social engineering:
pose as a user who
cannot get access to
his or her system.
- Keystroke logging: to
record every keystroke on
an affected machine for later
retrieval,