Uploaded by Agyekum Daniel Darko

COMPUTER HACKING AND MOBILE PHONE HACKING

advertisement
COMPUTER HACKING AND MOBILE PHONE HACKING.
HACKING: Hacking is the act of compromising digital devices and networks through
unauthorized access to an account or computer system. Hacking is not always a malicious act,
but it is most commonly associated with illegal activity and data theft by cyber criminals.
It is referred to activities that seek to compromise digital devices, such as computers,
smartphones, tablets, and even entire networks misuse the to cause damage to or corrupt
systems, gather information on users, steal data and documents, or disrupt data-related
activity.
COMPUTER HACKING: Computer hacking, on one hand, describes the activities
practiced by individuals, organizations, and nations, in order to gain unauthorized access to
computer and technology dependent systems. These activities may involve the modification
or alteration of system's software and hardware in order to perform activities neither purposed
by the creator nor in line with the creator's original intentions.
On the other hand, and in a more positive connotation, it refers to the habitual activities of
someone who possesses exceptional skills and enjoys researching and analysing the
innermost intricacies in computer programming.
Looking at both sides of the definition, we can see that the general term is not permanently
doomed with a negative connotation. In fact, depending on the nature of the objectives of the
hacker, a differentiation has been stipulated in the computer world. As such, hackers with
malicious intent have been defined as crackers.
MOBILE PHONE HACKING: Mobile Phone Hacking involves any method where
someone forces access into your phone or its communications. This can range from advanced
security breaches to simply listening in on unsecured internet connections. It can also involve
physical theft of your phone and forcibly hacking into it via methods like brute force. Phone
hacking can happen to all kinds of phones, including Androids and iPhones. Since anyone
can be vulnerable to phone hacking, we recommend that all users learn how to identify a
compromised device.
1
CATEGORIES OF HACKING.

Phishing
In this type of hacking, hackers’ intention to stole critical information of users like account
passwords, MasterCard detail, etc. For example, hackers can make a replicating first website
for users’ interaction and can steal critical information.

Virus
These are discharged by the hacker into the filters of the net website once they enter into it.
The purpose is to corrupt the information or resources on the net website.

UI redress
In this technique, the hacker creates a pretend interface and once the user clicks with the
intent of progressing to a particular website, they are directed to a special website along.

Cookie theft
Hackers access the net website exploitation malicious codes and steal cookies that contain
tips, login passwords, etc. Get access to your account then will do any factor besides your
account.

Distributed Denial-of-service (DDoS)
This hacking technique is aimed toward taking down a website so that a user cannot access it
or deliver their service. Get the server down and stop responding, which may cause a
condition error condition unendingly.

DNS spoofing
This essentially uses the cache knowledge of an internet website or domain that the user
might have forgotten concerning. It then directs the data to a distinct malicious website.

Social Engineering
Social engineering is an attempt to urge you to share personal info, sometimes by
impersonating a trustworthy supply.

Missing Security Patches
Security tools will become noncurrent as a result of the hacking landscape advance, and want
frequent updates to protect against new threats.

Malware-Injection Devices
Cyber-criminals will use hardware to sneak malware onto your pc. you will have detected
infected USB sticks which can offer hackers remote access to your device as presently as
they are blocked into your pc.
2

Cracking Password
Hackers will get your credentials through the style of mean, however, ordinarily, they’re
doing this through a follow known as key-logging.
HOW TO KEEP COMPUTERS AND MOBILE DEVICES SAFE FROM
HACKERS.
The world of technology includes devices, software programs, and applications. Individuals
and organizations use various methods and precautions to protect their digital assets from
being compromised.

Updates
To prevent hacking, it's important to update applications and devices as soon as the updates
are available. Updates not only enhance and improve the user's experience with the
application, but also, they constantly improve and rectify security weaknesses and loopholes
in it. If 3 doors of the car are locked but the 4th is not, your car's safety is measured by the
open 4th door!

Password Security
Keeping passwords secret is important, but ensuring they are not accessed or revealed is
better. Most secure platforms today demand complex passwords for login. This may include
capitals, numbers, and characters. Passwords are safest if they are not shared with anyone not even IT administrators and so-called organizational representatives - or written down. It's
also important to change them often.

Vetting Websites and Web Sources
It's amazing how careful we are when we use our credit and debit cards in public yet an even
more menacing threat exists right under our thumbs: downloading. There is an app for
everything these days, and everything is at the tip of our thumbs with the download button.
Failing to ensure that we access, sign up, download, and interact with reputable sites can open
ourselves up for trouble. Secure websites are denoted by a padlock icon, which is positioned
to the left of the URL address.
3

Wireless Network Access
It's also important to be security conscious of the networks we access in addition to securing
our devices. Secure wireless access connections always require a password. We all welcome
free services, but we must remember they could be the source of our future woes. Open
wireless connections are known to be very vulnerable, and communication over such
unsecured networks could expose every key you stroke.

Don’t access personal or financial data with public Wi-Fi.
This may seem like a no-brainer, but you’d be surprised how many people check their bank
accounts or make purchases with a credit card while using public Wi-Fi. It’s best to do those
things on a secure connection.

Turn off anything you don’t need.
Hackers can use certain features on your phone to get at your information, location or
connection. So, instead of keeping your GPS, wireless connection and geo-tracking on all the
time, just turn them on when you need them.

Choose your apps wisely.
Only download apps from trustworthy sources that have established a good reputation. Make
sure you update your software and apps regularly and get rid of old apps you don’t use.

Use a password, lock code or encryption.
Make sure your passwords are at least eight characters long, with a mix of upper and lower
case, and include numbers or other characters, and never use the auto-complete feature for
passwords. You can use the storage encryption feature on your phone to protect your private
data, and set your screen to timeout after five minutes or less.

Be sceptical about links and attachments.
If you’re not sure about the source, don’t use the link or open the attachment.

Trace or erase.
Make sure your data is secure if your mobile device is stolen or lost. You can set up your
device to lock itself after a pre-set number of failed log-in attempts.
4
PROS AND CONS OF HACKING.
PROS
With the rise of illegal hacking, more people are now susceptible to cyber terrorism. As we
all continue to rely on the internet, we also leave more of our information online, which may
be accessible to hackers with ill intentions. This is another tech issue that ethical hackers can
help with. If you think about it, it’s like a ‘good vs bad’ scenario. Both may have the same
skills, and work in the same field, but the intentions are poles apart.
1. Better Assurance in System Security
When your security system has vulnerabilities that you’re not aware of, that’s already a risk.
If there’s no routine check for system vulnerabilities, these weak points won’t be discovered
until an attack happens, and by then it’ll be too late.
In companies that have a dedicated staff for IT, this can only be avoided if you have a
cybersecurity expert, which most companies don’t have. Moreover, most hackers are very
passionate and persistent with what they do, and would often sit in front of their computers
for countless hours, and depending on their length of experience, they may already be at the
same level, if not higher than an IT expert in terms of skills.
When you hire an ethical hacker, you get a better security assurance not only because of their
skills, but also because they can mimic the behaviour and mindset of real hackers. This gives
your security system a better fighting chance against hackers because it’s just like using the
very same weapon that they’d use against you.
2. Your Security Network Becomes More Robust
A team of ethical hackers will also help you beef up your network’s security walls.
Depending on the potential risks and vulnerabilities they’ve identified, they may change or
improve not only the layers of the system that protects your network, but also employ
programs to enable your system to respond to potential attacks better.
So, if an attack happens, not only will your network be impenetrable, the system may also be
able to log the suspicious activity, mark it, and even create an alert.
3. Fewer Liability Risks
Data security, in any business, can make or break your success. If your organization keeps
records of sensitive information from clients, they must be protected at all costs. When your
network’s security is vulnerable or compromised, there’s a big chance that these records will
be leaked. Once this happens, you’ll be in deeper trouble because when your client sues your
company for a data leak, you’ll have little to no chance against it.
Confidential and critical information is often the number one target of malicious hackers.
And because ethical hackers are well aware of this, data protection is crucial to them. While
they do work on the overall security of your network, they also pay a lot of attention to data
security. And because they know the most common methods that hackers use to attempt to
5
extract confidential information, they also know better how to protect them against exactly
that.
4. Current and Updated Methods and Technology
Working with certified ethical hackers will also help you keep up with the fast-changing
developments in technology.
Since ethical hackers have the best understanding of how illegal hackers work, they’ll also be
able to supply you with more useful information that you can use against them. For example,
they can warn you about their new strategies and give you advice as to how you can protect
your business against them.
This also means that they’ll work based on the newest illegal hacking methods that they may
be aware of, so you can rest assured that your network’s security system will be constantly
updated.
CONS
1. Causes glitches and viruses
2. Can access private documents and information
3. Can lead to identity theft
4. Can send spam emails, download programs, and slow computer
6
STEPS OR PHASES OF HACKING.
1. Reconnaissance:
This is the first step of Hacking. It is also called as Foot printing and information gathering
Phase. This is the preparatory phase where we collect as much information as possible about
the target. We usually collect information about three groups,



Network
Host
People involved
There are two types of Foot printing:


Active: Directly interacting with the target to gather information about the target. E.g.,
Using Nmap tool to scan the target
Passive: Trying to collect the information about the target without directly accessing
the target. This involves collecting information from social media, public websites
etc.
2. Scanning:
Three types of scanning are involved:



Port scanning: This phase involves scanning the target for the information like open
ports, Live systems, various services running on the host.
Vulnerability Scanning: Checking the target for weaknesses or vulnerabilities which
can be exploited. Usually done with help of automated tools
Network Mapping: Finding the topology of network, routers, firewalls servers if any,
and host information and drawing a network diagram with the available information.
This map may serve as a valuable piece of information throughout the hacking
process.
3. Gaining Access:
This phase is where an attacker breaks into the system/network using various tools or
methods. After entering into a system, he has to increase his privilege to administrator level
so he can install an application he needs or modify data or hide data.
4. Maintaining Access:
Hacker may just hack the system to show it was vulnerable or he can be so mischievous that
he wants to maintain or persist the connection in the background without the knowledge of
the user. This can be done using Trojans, Rootkits or other malicious files. The aim is to
maintain the access to the target until he finishes the tasks he planned to accomplish in that
target.
7
5. Clearing Track:
No thief wants to get caught. An intelligent hacker always clears all evidence so that in the
later point of time, no one will find any traces leading to him. This involves
modifying/corrupting/deleting the values of Logs, modifying registry values and uninstalling
all applications he used and deleting all folders he created.
8
Download