What You know abut Hacking?

yelska .ek yefudau wy,d ;sfhkjd' we;a;gu fudloao fï yelska lshkafka@ ir,j lsjfyd;a fjk;a moaO;shlg fyda cd,hlg wkjirfhka we;=,;a ùu yelska f,i yÿkajhs' kuq;a iuyre fuh Cracking hkqfjkao kï lrhs' m%Odk jYfhka WHITE HATS hkqfjka kï lrkakka BLACK HAT jre" CRACKERS ,d jYfhka yeÈkaúh hq;= hehs ;¾l lrhs' ljqo fï yel¾jre @ ir,j f;areï .kak fï ,smsh ilia lr,d ;sfhkjd' fï ,smsfhka Thd,g ta ms,sno ukd wjfndaOhla ,nd.kak mq¿jka fõú'



    WHITE HAT HACKERS
mß.Kl iy cd, wdrlaIl m%uqLhka f,i yeÈka fõ'
^ Computer and Network Experts& fudjqka ydkslr fkdue;s fya;=ka ioyd moaO;shl we;=¿ jkakka fõ'
^breaks security for non-malicious reasons&


    BLACK HAT HACKERS
ydkslr fya;=ka ioyd cd,hlg fyda mß.Kl moaO;shlg we;=¿ jkakka' ^Breaks security for malicious reasons&'


    GRAY HAT HACKERS
by; fomd¾Yjfhau tl;=jla f,i yeÈkafõ' wka;¾cd,h ;=, ießirñka wfkla cd, ;=,g we;=,a fõ' fndfyda ÿrg iq¿ uqo,la ioyd moaO;s iy cd, j, wkdrlaIs; ia:dk wÆ;a jeäh lrhs'

wOHmk wjê'

    Elite Hacker

úIfha oejeka;fhda fuu kñka yÿkajhs " kj wkdrlaIs; ia:dk fidhkakka " kj we;=¿ jk l%u fidhkakka fuu >kfha ,d ie,fla '


    Script Kiddie
lsisu yelsx ms,sn| oekqula ke;s " wjfndaohla ke;s wh fõ" wks;a mqoa.,hka úiska ks¾udKh lrk ,o Application wdOdrfhka jev .kafkda fj;s'

    Neophyte
iuyr fmdrj,a hhs is;d isákakka lsisÿ fohla fkdokakd wka wh wduka;%Kh lrkafka fujeks kñks ' ^Noob  Newbie&

    Blue hat
moaO;s j, wdrlaIdj fidhd n,kakka fï kñka yeÈkafõ '

    Hacktivist
iudc " wd.ñl" foaYmd,k wjYH;d ioyd we;=¿ jkakka '

fudkjo wjYH iqÿiqlï@

ld,h " wjfndaoh " lshùu " m%fhda.sl w;a yod ne,Su'

Ndú;d jk l%u

    Client Side Hacking
    Server Side Hacking
    Client Side Hacking
    Social Engineering


yelska j, Nhdklu iy m%n,u f,i i,lkak mq¿jka " ;u nqoaêh iy wfkla mqoa.,hdj /jàfï olaI;djh u; fuh rod mejf;a'

Wod ( uqKq fmdf;a .eyeKq <ufhlaf.a fm%d*hs,a tllska ;udg ;rack lsÍug wjYH mqoa.,hd iu. ñ;% ù Tyq .ek úia;r oek .ekSu ;=,ska ryia m%Yakh ioyd ms<s;=re fidhd .ekSu'

Social Engineering Expert flfkl= idudkHfhka Èk .dkla ;udg wjYH mqoa.,hd foi n,d isáñka Tyq wOHkh lrhs' Tyqf.a ðjk rgdj' leu;s hqj;shka j¾.' fldkav ú,dis;d jeks foa' uf.a ;SrfKa yeáhg fïl ;rï wks;a tlla j;a jeo.;a keye'
fldákau lsfjd;a ljqre yß  f.dkdg wekaoùu'

    Shoulder Surfing

fïl;a álla f,ais iy wkjYH jevla' fldfydu;a wfma f.dvdla whg f,ais fohla' wfkldf.a uqr moh foi wei fldfkka fyda n,d isàu' b;ska ,. md;l ljqrej;a bkakjd kï uqr moh we;=,a fkdlr isàu we.g .=Khs '

    Guessing

hy¿fjla kï Social Engineering okakjd kï fïl f,aishs'

is;Su
ta ksid fl,a,f.a " wïuf.a ku jf.a fudav uqr mo we;=,a lrkak tmd'

    Keylogging

uq,slju fuh u.ska wks;a mqoa.,hd úiska ghsma lrk ishÆu wl=re yel¾ jrhd fj; ,efí '
Wod ( RapZo Logger " Accuracy Logger " Keystork Dante

    Cookies Stealing


hï wvúhlg we;=,a ùfï § ;u mß.Klfha ;ekam;a jk l=lsia‌ fidr .ekSu ;=,ska f,d.a jk hqi¾ fkaï iy ryia mo fidr.ekSu '

    Remote Administration tools

yel¾ jrekaf.a m%n,u wúhls' yel¾ jrhdg wjYH mqoa.,hd f.a mß.Klh wjYH mßÈ yeisßúh yelsh' fjk;a tajd nd.; l, yelsh'
Wod ( Pro RAT " Dark Comet " BS " Spy Net " Cyber gate

    Password Stealing


Key logging j,g iudk jqj;a fuys§ kshñ; Apps j, User Names and Password muKla yel¾ lrejdf.a b fï,a .sKqug fyda Tyqf.a wod< fjí wvúhlg tjhs'
Ex ( Emissray  iStealer

    Phishing Attacks
wod< fjí wvúh f,i iEÿ jHdc wvúhlg mqoa.,hdj f.k hhs'
Wod ( f*ia nqla wvúh f,i ;ekq jHdc tlg Tn f,d.a jQ úg Tfí o;a; yel¾ jrhdg ,efí'

    Bot or Zombies

;j;a m%n, fohls' Password Stealing " Key logging hkak f,i;a l%shd;aul fõ' BOTNET tlla hkq fndfyda úkdY ldÍ fohls' Tfí ishÆ o;a; fidrd .kakdg oelsh yels fõ'
Wod ( Zeus bot

Server Side Hacking


Exploiting hkqfjka uq,slju oelafjkafka " hï moaO;shl fyda cd,hl we;s wkdrlaIs; ia:dkhlska we;=,a ùfuka ;udf.a jdish idod .ekSuhs'

fjí wvúhl fujekaklska l, yels foa "


1- SQL Injection
2- RFI LFI
3- Uploading Shells
4- XSS Cross Site Scripting
5- CSRF
6- Gaining Root Access to websites hosted on the same server and then intruding another site on the server
7- Using Scripts to gain information known as Exploits



    Dictionary Attacks

f,fyisfhkau fuhska w;a ñfokak mq¿jka' kfï yeáhg jf.au lsisu ojil Dictionary tll we;=,;a fjkak mq¿jka kï uqrmohg we;=,a lrkak tmd' fudlo fm%da.%Eïia ;sfhkjd fï jf.a fmdä uqr mo f,fyisfhkau fidhd .kak mqÆjka

    Brute(force Attacks

by; foag iudkhs ' kuq;a fndfyda ojila hk jevla' Tfí uqr moh È.= tlla kï wxl tl;= lsÍu" iudk ,l=Kq " jryka jeks foa iu. ;sfhkjd kï fndfyda ÿrg fuu m%ydrh Èh;a lrhs' t;a f.dvla f,dl= uqr mohla kï jevla fjkafka keye'

Reverting Attack

lsisu wvúhla u.ska lshk Hacking lr,d fokjd lshk foaj,a úYajdia lrkak tmd' Thdf.a i,a,s kslï f.or bkak n,a,g fi,a,ï lrkak fokak Bg jvd ys;g fydohs' lsisu fid*aÜfjhd tlla keye f*ia nqla " B fï,a " Th jf.a wks;a m%isoaO foaj,a HACK lrkak mq¿jka' fï by; úia;r j,g wu;rj yel¾jre oUdfkka wdj tjqka fkfuhsfka' hq áhqí j, jf.a ;sfhk yelska fm%da.%Eïia nd.; lrkak tmd ljodj;a' Programming language tlla bf.k .kafka ke;sj ;uka yel¾ flfkla lshd .kakj;a tmd ljodj;a' Script kiddie flfkla kï lshd .;a;g lula keye' fm%da.%eñka.a okakd m,shg yel¾,d fjkafk;a keye lsh, wu;l lrkakka tmd'wka flfklg wkjYH mßÈ yela lrkak fmf,Ukak tm‍d' ;ud yel¾ flfkla lsh, fndaâ .y, m%isoaÈfha nd,aÿ fjkak kï tmd' fjí wvúhla yela lr,d Deface lrkjg jvd tu wvúfha whs;s lrej oekqj;a lsÍfuka Tng uqo,a " /lshd ,eîfï iïNdú;dj jeähs' oeka ,xldfõ Cyber Laws jeähs' ta ksid fudlla yß f.dka; jevla ^BLACK HAT & jevla lrkak hkfldg ;udf.a wdrlaIdj ;yjqre lrf.k bkak' ´kEu cd,hl wkdrlaIs; ;ek f.dvla ;sfhkjd' ta ksid yela lrkak neye lshkak tmd' fydh,d bkak'

Wmqgd .ekSu i4cu'blogspot'com fj;ska
Share on Google Plus

About Unknown

This is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.
    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment