Hack Value
- Is something worth doing?
- Is the system worth hacking?
- Are the information worth something?
Vulnerability
- The existence of weakness/flaw in a system, process, software, etc.
- When exploited, it leads to undesirable and unexpected event compromising the security of information.
Exploit
- Breach of IT System security through vulnerabilities.
- Malicious software/commands
- How to take advantage of a vulnerability
Payload
- Part of a malware/exploit code that performs intended malicious actions.
- Includes creation of backdoor/remote access/deletion or modification of files, data theft/hijacking.
- Includes logic bombs/infected program.
Zero Day Attacks
- The attacker exploits the vulnerability before the developer can release patch.
Daisy Chaining
- Gaining access to a computer/network and then using the same information to gain access to multiple networks & computers that contain desirable information.
Doxing
- Gathering and publishing PII/SPII types of information from an organization.
Bot and Botnets
- Software application/program that can be controlled remotely to execute pre-defined tasks.
- These are used in Dos or DDoS attacks.
- A Botnet is a network of compromised machines.
Hacking Concepts
Hacking
- Hacking is a field of computer security.
- Exploiting system vulnerabilities.
- It includes compromising security controls.
- Unauthorized/inappropriate access.
- Modifying system/application features to achieve goals outside it’s creator’s original purpose.
- Steal, pilfer, and redistribute intellectual property.
- Leads to loss of business, money, reputation, etc.
Hacker
- A person who breaks into a network/system without authorization to destroy/steal sensitive data.
- Performs malicious attacks.
- Sometimes, it’s a hobby to test their skills.
- Note: Gaining authorized access is a crime, irrespective of intention.
Classes of Hacker
- Black Hats – illegal/malicious/criminal.
- White Hats – Pentesters/Work on the defensive side.
- Gray Hats – Works both offensively and defensively.
- Cyber Terrorists – Motivated by religious/political beliefs.
- State-Sponsored – Employed by the government to penetrate and gain top-secret information and damage systems of other governments.
- Suicide Hackers – Does not care if they get caught.
- Hacktivists – When a hacker breaks in to a corporate or government system as an act of protest (political/social agenda).