yelska .ek yefudau wy,d ;sfhkjd' we;a;gu fudloao fï yelska lshkafka@ ir,j lsjfyd;a fjk;a moaO;shlg fyda cd,hlg wkjirfhka we;=,;a ùu yelska f,i yÿkajhs' kuq;a iuyre fuh Cracking hkqfjkao kï lrhs' m%Odk jYfhka WHITE HATS hkqfjka kï lrkakka BLACK HAT jre" CRACKERS ,d jYfhka yeÈkaúh hq;= hehs ;¾l lrhs' ljqo fï yel¾jre @ ir,j f;areï .kak fï ,smsh ilia lr,d ;sfhkjd' fï ,smsfhka Thd,g ta ms,sno ukd wjfndaOhla ,nd.kak mq¿jka fõú'
WHITE HAT HACKERS
mß.Kl iy cd, wdrlaIl m%uqLhka f,i yeÈka fõ'
^ Computer and Network Experts& fudjqka ydkslr fkdue;s fya;=ka ioyd moaO;shl we;=¿ jkakka fõ'
^breaks security for non-malicious reasons&
BLACK HAT HACKERS
ydkslr fya;=ka ioyd cd,hlg fyda mß.Kl moaO;shlg we;=¿ jkakka' ^Breaks security for malicious reasons&'
GRAY HAT HACKERS
by; fomd¾Yjfhau tl;=jla f,i yeÈkafõ' wka;¾cd,h ;=, ießirñka wfkla cd, ;=,g we;=,a fõ' fndfyda ÿrg iq¿ uqo,la ioyd moaO;s iy cd, j, wkdrlaIs; ia:dk wÆ;a jeäh lrhs'
wOHmk wjê'
Elite Hacker
úIfha oejeka;fhda fuu kñka yÿkajhs " kj wkdrlaIs; ia:dk fidhkakka " kj we;=¿ jk l%u fidhkakka fuu >kfha ,d ie,fla '
Script Kiddie
lsisu yelsx ms,sn| oekqula ke;s " wjfndaohla ke;s wh fõ" wks;a mqoa.,hka úiska ks¾udKh lrk ,o Application wdOdrfhka jev .kafkda fj;s'
Neophyte
iuyr fmdrj,a hhs is;d isákakka lsisÿ fohla fkdokakd wka wh wduka;%Kh lrkafka fujeks kñks ' ^Noob Newbie&
Blue hat
moaO;s j, wdrlaIdj fidhd n,kakka fï kñka yeÈkafõ '
Hacktivist
iudc " wd.ñl" foaYmd,k wjYH;d ioyd we;=¿ jkakka '
fudkjo wjYH iqÿiqlï@
ld,h " wjfndaoh " lshùu " m%fhda.sl w;a yod ne,Su'
Ndú;d jk l%u
Client Side Hacking
Server Side Hacking
Client Side Hacking
Social Engineering
yelska j, Nhdklu iy m%n,u f,i i,lkak mq¿jka " ;u nqoaêh iy wfkla mqoa.,hdj /jàfï olaI;djh u; fuh rod mejf;a'
Wod ( uqKq fmdf;a .eyeKq <ufhlaf.a fm%d*hs,a tllska ;udg ;rack lsÍug wjYH mqoa.,hd iu. ñ;% ù Tyq .ek úia;r oek .ekSu ;=,ska ryia m%Yakh ioyd ms<s;=re fidhd .ekSu'
Social Engineering Expert flfkl= idudkHfhka Èk .dkla ;udg wjYH mqoa.,hd foi n,d isáñka Tyq wOHkh lrhs' Tyqf.a ðjk rgdj' leu;s hqj;shka j¾.' fldkav ú,dis;d jeks foa' uf.a ;SrfKa yeáhg fïl ;rï wks;a tlla j;a jeo.;a keye'
fldákau lsfjd;a ljqre yß f.dkdg wekaoùu'
Shoulder Surfing
fïl;a álla f,ais iy wkjYH jevla' fldfydu;a wfma f.dvdla whg f,ais fohla' wfkldf.a uqr moh foi wei fldfkka fyda n,d isàu' b;ska ,. md;l ljqrej;a bkakjd kï uqr moh we;=,a fkdlr isàu we.g .=Khs '
Guessing
hy¿fjla kï Social Engineering okakjd kï fïl f,aishs'
is;Su
ta ksid fl,a,f.a " wïuf.a ku jf.a fudav uqr mo we;=,a lrkak tmd'
Keylogging
uq,slju fuh u.ska wks;a mqoa.,hd úiska ghsma lrk ishÆu wl=re yel¾ jrhd fj; ,efí '
Wod ( RapZo Logger " Accuracy Logger " Keystork Dante
Cookies Stealing
hï wvúhlg we;=,a ùfï § ;u mß.Klfha ;ekam;a jk l=lsia fidr .ekSu ;=,ska f,d.a jk hqi¾ fkaï iy ryia mo fidr.ekSu '
Remote Administration tools
yel¾ jrekaf.a m%n,u wúhls' yel¾ jrhdg wjYH mqoa.,hd f.a mß.Klh wjYH mßÈ yeisßúh yelsh' fjk;a tajd nd.; l, yelsh'
Wod ( Pro RAT " Dark Comet " BS " Spy Net " Cyber gate
Password Stealing
Key logging j,g iudk jqj;a fuys§ kshñ; Apps j, User Names and Password muKla yel¾ lrejdf.a b fï,a .sKqug fyda Tyqf.a wod< fjí wvúhlg tjhs'
Ex ( Emissray iStealer
Phishing Attacks
wod< fjí wvúh f,i iEÿ jHdc wvúhlg mqoa.,hdj f.k hhs'
Wod ( f*ia nqla wvúh f,i ;ekq jHdc tlg Tn f,d.a jQ úg Tfí o;a; yel¾ jrhdg ,efí'
Bot or Zombies
;j;a m%n, fohls' Password Stealing " Key logging hkak f,i;a l%shd;aul fõ' BOTNET tlla hkq fndfyda úkdY ldÍ fohls' Tfí ishÆ o;a; fidrd .kakdg oelsh yels fõ'
Wod ( Zeus bot
Server Side Hacking
Exploiting hkqfjka uq,slju oelafjkafka " hï moaO;shl fyda cd,hl we;s wkdrlaIs; ia:dkhlska we;=,a ùfuka ;udf.a jdish idod .ekSuhs'
fjí wvúhl fujekaklska l, yels foa "
1- SQL Injection
2- RFI LFI
3- Uploading Shells
4- XSS Cross Site Scripting
5- CSRF
6- Gaining Root Access to websites hosted on the same server and then intruding another site on the server
7- Using Scripts to gain information known as Exploits
Dictionary Attacks
f,fyisfhkau fuhska w;a ñfokak mq¿jka' kfï yeáhg jf.au lsisu ojil Dictionary tll we;=,;a fjkak mq¿jka kï uqrmohg we;=,a lrkak tmd' fudlo fm%da.%Eïia ;sfhkjd fï jf.a fmdä uqr mo f,fyisfhkau fidhd .kak mqÆjka
Brute(force Attacks
by; foag iudkhs ' kuq;a fndfyda ojila hk jevla' Tfí uqr moh È.= tlla kï wxl tl;= lsÍu" iudk ,l=Kq " jryka jeks foa iu. ;sfhkjd kï fndfyda ÿrg fuu m%ydrh Èh;a lrhs' t;a f.dvla f,dl= uqr mohla kï jevla fjkafka keye'
Reverting Attack
lsisu wvúhla u.ska lshk Hacking lr,d fokjd lshk foaj,a úYajdia lrkak tmd' Thdf.a i,a,s kslï f.or bkak n,a,g fi,a,ï lrkak fokak Bg jvd ys;g fydohs' lsisu fid*aÜfjhd tlla keye f*ia nqla " B fï,a " Th jf.a wks;a m%isoaO foaj,a HACK lrkak mq¿jka' fï by; úia;r j,g wu;rj yel¾jre oUdfkka wdj tjqka fkfuhsfka' hq áhqí j, jf.a ;sfhk yelska fm%da.%Eïia nd.; lrkak tmd ljodj;a' Programming language tlla bf.k .kafka ke;sj ;uka yel¾ flfkla lshd .kakj;a tmd ljodj;a' Script kiddie flfkla kï lshd .;a;g lula keye' fm%da.%eñka.a okakd m,shg yel¾,d fjkafk;a keye lsh, wu;l lrkakka tmd'wka flfklg wkjYH mßÈ yela lrkak fmf,Ukak tmd' ;ud yel¾ flfkla lsh, fndaâ .y, m%isoaÈfha nd,aÿ fjkak kï tmd' fjí wvúhla yela lr,d Deface lrkjg jvd tu wvúfha whs;s lrej oekqj;a lsÍfuka Tng uqo,a " /lshd ,eîfï iïNdú;dj jeähs' oeka ,xldfõ Cyber Laws jeähs' ta ksid fudlla yß f.dka; jevla ^BLACK HAT & jevla lrkak hkfldg ;udf.a wdrlaIdj ;yjqre lrf.k bkak' ´kEu cd,hl wkdrlaIs; ;ek f.dvla ;sfhkjd' ta ksid yela lrkak neye lshkak tmd' fydh,d bkak'
Wmqgd .ekSu i4cu'blogspot'com fj;ska
0 comments:
Post a Comment