Module 1
Module 1
Types of Hacking:
Some main types of hacking are mentioned below:
1. Web Application Hacking
Web application hacking type is the process of exploiting security vulnerabilities or
weaknesses in web-based applications. Web applications are typically written in languages
like HTML, CSS, and JavaScript, but they can also be written in other languages like PHP
and Ruby on Rails. Because of the nature of these languages and how web browsers interpret
them, it is possible to perform specific actions on a website without actually being authorized.
One example of this would be cross-site scripting (XSS), which involves injecting malicious
code into a website's HTML. If you can craft an XSS attack properly, you can hijack the
browser's session with the server without ever having access to their username or password.
2. Hacking Wireless Networks
Hacking wireless networks is a hacking type that involves accessing a computer network
without authorization, typically by exploiting weak points in the system's security.
An excellent example of this is the practice of wardriving, where an attacker drives around
with a laptop or other device capable of picking up wireless signals, looking for unprotected
or poorly protected networks.
3. System Hacking
System hacking is the sacrifice of computer software to access the targeted computer to steal
their sensitive data. The hacker takes advantage of the weaknesses in a computer system to
get the information and data and takes unfair advantage. System hacking aims to gain access,
escalate privileges, and hide files.
4. Web Server Hacking
Web content is generated as a software application on the server side in real-time. This allows
the hackers to attack the webserver to steal private information, data, passwords, and business
information by using DoS attacks, port scans, SYN floods, and Sniffing. Hackers hack web
servers to gain financial gain from theft, sabotage, blackmail, extortion, etc.
5. Network Hacking
Network hacking refers to the act of gaining unauthorized access to a computer network and
its infrastructure resources, such as devices, servers, software, and other services by using
DoS attacks, MitM attacks, IP spoofing and ARP spoofing.
Network hacking involves gathering information about a target network, identifying
vulnerabilities, and exploiting them to gain access. A variety of tools and techniques are used
to identify potential security threats in computer networks.
Hacker:
A hacker is a person who breaks into a computer system. The reasons for hacking can be
many: installing malware, stealing or destroying data, disrupting service, and more. Hacking
can also be done for ethical reasons, such as trying to find software vulnerabilities so they can
be fixed.
Types of Hackers:
Computers and the Internet have changed the work environment of the world beyond
imagination. Computers on taking over a major part of our lives, all our data has got
transferred from records and ledgers to computers. Though this kind of shift in working has
reduced the physical burden on workers it has also increased the chances of data theft. People
involved in stealing data or harming the systems are knowledgeable people with wrong
intentions known as Hackers. There are different types of hackers. Let’s take a look at how
many types of hackers are there and the types of hacker attacks and techniques.
1. White Hat / Ethical Hackers
2. Black Hat Hackers
3. Gray Hat Hackers
4. Script Kiddies
5. Green Hat Hackers
6. Blue Hat Hackers
7. Red Hat Hackers
8. State/Nation Sponsored Hackers
9. Hacktivist
10. Malicious insider or Whistleblower etc.
1. White Hat Hackers
White hat hackers are types of hackers who’re professionals with expertise in cybersecurity.
They are authorized or certified to hack the systems. These White Hat Hackers work for
governments or organizations by getting into the system. They hack the system from the
loopholes in the cybersecurity of the organization. This hacking is done to test the level of
cybersecurity in the organization. By doing so, they identify the weak points and fix them to
avoid attacks from external sources. White hat hackers work per the rules and regulations the
government sets. White hat hackers are also known as ethical hackers.
2. Black Hat Hackers
Black hat hackers are also knowledgeable computer experts but with the wrong intention.
They attack other systems to get access to systems where they do not have authorized entry.
On gaining entry they might steal the data or destroy the system. The hacking practices these
types of hackers’ use depend on the individual’s hacking capacity and knowledge. As the
intentions of the hacker make the hacker a criminal. The malicious action intent of the
individual cannot be gauged either can the extent of the breach while hacking.Ex: Lulzsec,
Lizard Squad, The Shadow Brokers.
Note: LulzSec was a black hat computer hacking group that claimed responsibility for
several high-profile attacks, including the compromise of user accounts from PlayStation
Network in 2011. The group also claimed responsibility for taking the CIA website offline.
Lizard Squad was a black hat hacking group and is proud to proclaim itself as the “King of
DDoS attacks.” Over time, Lizard Squad has been held responsible for some of the most
potent hacking attacks and has become genuinely notorious for its actions.
Initially, the Lizard Squad came into public view around 2014. Lizard Squad hackers
launched their DDoS assault first on the League of Legends servers, then on the PlayStation
Network, and then on servers run by Blizzard. The attacks devastated networks for at least a
day and seemed to shut down all gaming activity.
Lizard Squadwas also responsible for Christmas attacks(2014), Tor sybil attack(2014),
Malaysia Airlines website attack(2015), Daybreak Games DDoS(2015) etc.
The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016.
They published several leaks containing hacking tools, including several zero-day exploits,
from the "Equation Group" who are widely suspected to be a branch of the National Security
Agency (NSA) of the United States. Specifically, these exploits and vulnerabilities targeted
enterprise firewalls, antivirus software, and Microsoft products. The Shadow Brokers
originally attributed the leaks to the Equation Group threat actor, who have been tied to the
NSA's Tailored Access Operations unit.
3. Gray Hat Hackers
The intention behind the hacking is considered while categorizing the hacker. The Gray hat
hacker falls between the black and white hat hackers. They are not certified, hackers. These
types of hackers work with either good or bad intentions. The hacking might be for their gain.
The intention behind hacking decides the type of hacker. If the intention is for personal gain,
the hacker is considered a gray hat hacker.Ex: The Jester.
Note:The Jester (also known by the leetspeak handle th3j3st3r) is a self-identified grey hat
hacktivist. He claims to be responsible for attacks on WikiLeaks and Islamist websites. He
claims to be acting out of American patriotism.
4. Script Kiddies
It is a known fact that half knowledge is always dangerous. The Script Kiddies are amateurs’
types of hackers in the field of hacking. They try to hack the system with scripts from other
fellow hackers. They try to hack the systems, networks, or websites. The intention behind the
hacking is just to get the attention of their peers. Script Kiddies are juveniles who do not have
complete knowledge of the hacking process.
5. Green Hat Hackers
Green hat hackers are types of hackers who learn the ropes of hacking. They are slightly
different from the Script Kiddies due to their intention. The intent is to strive and learn to
become full-fledged hackers. They are looking for opportunities to learn from experienced
hackers.
6. Blue Hat Hackers
Blue Hat Hackers are types of hackers who’re similar to Script Kiddies. The intent to learn is
missing. They use hacking as a weapon to gain popularity among their fellow beings. They
use hacking to settle scores with their adversaries. Blue Hat Hackers is dangerous due to the
intent behind the hacking rather than their knowledge.
7. Red Hat Hackers
Red Hat Hackers is synonymous with Eagle-Eyed Hackers. They are the types of hackers
who’re similar to white hackers. The red hat hackers intend to stop the attack of black hat
hackers. The difference between red hat hackers and white hat hackers is that the process of
hacking through intention remains the same. Red hat hackers are quite ruthless when dealing
with black hat hackers or counteracting malware. The red hat hackers continue to attack and
may end up having to replace the entire system setup.
8. State/Nation Sponsored Hackers
Government appoints hackers to gain information about other countries. These types of
hackers are known as State/Nation sponsored hackers. They use their knowledge to gain
confidential information from other countries to be well prepared for any upcoming danger to
their country. The sensitive information aids in being on top of every situation but also in
avoiding upcoming danger. They report only to their governments.Ex: Fancy Bear.
Note: Fancy Bear is a Russian cyber espionage group. Cybersecurity firm CrowdStrike has
said that Fancy Bear is associated with the Russian military intelligence agency GRU.
9. Hacktivist
These types of hackers intend to hack government websites. They pose themselves as
activists, so known as a hacktivist. Hacktivists can be an individual or a bunch of nameless
hackers whose intent is to gain access to government websites and networks. The data gained
from government files accessed are used for personal political or social gain. Ex:Anonymous.
Note: Anonymous is a decentralized international activist and hacktivist collective and
movement primarily known for its various cyberattacks against several governments,
government institutions and government agencies, corporations and the Church of
Scientology.
Anonymous originated in 2003 on the imageboard 4chan representing the concept of many
online and offline community users simultaneously existing as an "anarchic", digitized
"global brain" or "hivemind". Anonymous members (known as anons) can sometimes be
distinguished in public by the wearing of Guy Fawkes masks in the style portrayed in the
graphic novel and film V for Vendetta. Some anons also opt to mask their voices through
voice changers or text-to-speech programs.
10. Malicious insider or Whistleblower
These types of hackers include individuals working in an organization who can expose
confidential information. The intent behind the exposure might be a personal grudge against
the organization, or the individual might have come across illegal activities within the
organization. The reason for exposure defines the intent behind the exposure. These
individuals are known as whistleblowers.Ex: Edward Snowden (whistleblower).
Note: Edward Joseph Snowden (born June 21, 1983) is an American and naturalized
Russian former computer intelligence consultant and whistleblower who leaked highly
classified information from the National Security Agency (NSA) in 2013, when he was an
employee and subcontractor. His disclosures revealed numerous global surveillance
programs, many run by the NSA and the Five Eyes intelligence alliance with the cooperation
of telecommunication companies and European governments and prompted a cultural
discussion about national security and individual privacy.
Note: WikiLeaks is a publisher and media organisation founded in 2006. It operates as a
non-profit and is funded by donations and media partnerships. It has published classified
documents and other media provided by anonymous sources. It was founded by Julian
Assange, an Australian editor, publisher, and activist.
“The Fifth Estate” is a 2013 biographical thriller film directed by Bill Condon about the
news-leaking website WikiLeaks.
Example 2: In July 2015, a hacktivist group calling themselves the “Impact Team” hacked the online cheating
website Ashley Madison. The result? The personal data of 32 million members was published publicly. They
released the members’ data to teach the members a lesson and make the owner shut down the site.
Ethical Hacking:
Ethical hacking is an authorized practice of detecting vulnerabilities in an application,
system, or organization's infrastructure and bypassing system security to identify potential
data breaches and threats in a network.
Hacking is the practice of accessing data stored privately by experts. When programmers did
some mistakes, those mistakes make the system vulnerable and these vulnerabilities are being
picked by hackers to hack the system. The hackers who don’t work on principles of ethical
hacking are known as unethical hackers. Hackers are well aware that their activities are
illegal and thus criminal activity which is why they are trying to close their tracks. In other
words, we can say that – an effort to attack a computer system or a private network inside a
computer is known as hacking.
Ethical Hacking is legal access to information that is unauthorized for the rest of the world.
This type of hacking is done to protect the system or websites from malicious hackers and
viruses. The hackers who work on principles of ethical hacking are known as ethical hackers.
While Hackers may be highly skilled at braking system programs, professional ethical
hackers can restore the security of a compromised system and catch the criminal with their
skills and abilities.
Differences Between Hacking and Ethical Hacking:
4. Such hackers try to access restricted Such hackers create firewalls and security
networks through illegal practices and protocols.
reduce the security of data.
5. They work for themselves for dirty They work with different government
money. agencies and big tech companies.
Cyber Terrorism:
Cyberterrorism is often defined as any premeditated, politically motivated attack against
information systems, programs and data that threatens violence or results in violence. The
definition is sometimes expanded to include any cyber-attack that intimidates or generates
fear in the target population.
Cyber terrorism involves the same techniques as traditional cyberattacks. Cyber terrorists can
use DDoS attacks, various forms of malware, social engineering strategies, phishing
campaigns and more to reach their targets.
The CRS(Congressional Research Service) categorizes different types of cyber terrorism and
cyber warfare by purpose instead of techniques that are used.
Cyber Terrorists:
Cyber terrorists are state-sponsored and non-state actors who use cyberattacks to achieve
their objectives. Actors such as transnational terrorist organizations, insurgents and jihadists
have used the internet for planning attacks, radicalization and recruitment, propaganda
distribution, a means of communication and for disruptive purposes.
Cyber Spies:
Cyber spies steal classified or proprietary information from governments or private
corporations to gain a strategic, security, financial or political advantage. They often take
directions from foreign government entities and target government networks, cleared defense
contractors and private companies.
Cyber Thieves:
Cyber thieves engage in illegal cyberattacks for monetary gain. An example is an
organization or individual who accesses a system to steal and sell credit card numbers.
Cyber Warriors:
Cyber warriors are agents or quasi-agents of nation-states who develop capabilities and
undertake cyberattacks to support a country’s strategic objectives. Entities may or may not be
acting on behalf of the government in terms of the target, timing of the attack and type(s) of
cyberattack — and they are often blamed by the host country when accusations result from
the attacked nation.
Cyber Activists:
Cyber activists perform cyberattacks for pleasure or philosophical, political or other
nonmonetary reasons. Examples include an individual who hacks a system for a personal
challenge or a “hacktivist” like a member of the cyber-group Anonymous.
Cyber Forensics:
Cyber forensics is a process of extracting data as proof for a crime (that involves electronic
devices) while following proper investigation rules to nab the culprit by presenting the
evidence to the court. Cyber forensics is also known as computer forensics. The main aim of
cyber forensics is to maintain the thread of evidence and documentation to find out who did
the crime digitally. Cyber forensics can do the following:
It can recover deleted files, chat logs, emails, etc
It can also get deleted SMS, Phone calls.
It can get recorded audio of phone conversations.
It can determine which user used which system and for how much time.
It can identify which user ran which program.
Why is cyber forensics important?
In today’s technology driven generation, the importance of cyber forensics is immense.
Technology combined with forensic forensics paves the way for quicker investigations and
accurate results. Below are the points depicting the importance of cyber forensics:
Cyber forensics helps in collecting important digital evidence to trace the criminal.
Electronic equipment stores massive amounts of data that a normal person fails to see.
For example: in a smart house, for every word we speak, actions performed by smart
devices, collect huge data which is crucial in cyber forensics.
It is also helpful for innocent people to prove their innocence via the evidence
collected online.
It is not only used to solve digital crimes but also used to solve real-world crimes like
theft cases, murder, etc.
Businesses are equally benefitted from cyber forensics in tracking system breaches
and finding the attackers.
Types of cyber forensics
There are multiple types of cyber forensics depending on the field in which digital
investigation is needed. The fields are:
Network forensics: This involves monitoring and analysing the network traffic to and
from the criminal’s network. The tools used here are network intrusion detection
systems and other automated tools.
Email forensics: In this type of forensics, the experts check the email of the criminal
and recover deleted email threads to extract out crucial information related to the case.
Malware forensics: This branch of forensics involves hacking related crimes. Here,
the forensics expert examines the malware, trojans to identify the hacker involved
behind this.
Memory forensics: This branch of forensics deals with collecting data from the
memory(like cache, RAM, etc.) in raw and then retrieve information from that data.
Mobile Phone forensics: This branch of forensics generally deals with mobile
phones. They examine and analyse data from the mobile phone.
Database forensics: This branch of forensics examines and analyses the data from
databases and their related metadata.
Disk forensics: This branch of forensics extracts data from storage media by
searching modified, active, or deleted files.
Regulation of Cyberspace:
In India, Information Technology Act, 2000 is the legislation which covers the domain of
cyber law.The main objective of the Act is to provide legal recognition for transactions
carried out by means ofelectronic data interchange and other means of
electroniccommunication, commonly referred to as ecommerce, which involve the use of
alternatives to paper-based methods of communication and storageof information to facilitate
electronic filing of documents with the Government agencies.
Electronic Signatures:
Any subscriber (i.e., a person in whose name the Digital Signature Certificate is issued)
mayauthenticate electronic record by affixing his Digital Signature. Electronic record means
data record ordata generated image or sound, stored, received or sent in an electronic form or
microfilm or computer-generated microfiche.
Electronic Governance:
Where any law provides submission of information in writing or in the typewritten or printed
form, itwill be sufficient compliance of law, if the same is sent in an electronic form. Further,
if any statuteprovides for affixation of signature in any document, the same can be done by
means of DigitalSignature.
Similarly, the filing of any form, application or any other documents with the Government
Authoritiesand issue or grant of any licence, permit, sanction or approval and any receipt
acknowledging payment can be done by the Government offices by means of electronic
form.Retention of documents, records, or information as provided in any law, can be done by
maintainingelectronic records. Any rule, regulation, order, by-law or notification can be
published in the OfficialGazette or Electronic Gazette.
However, no Ministry or Department of Central Government or the state Government or
anyAuthorityestablished under any law can be insisted upon acceptance of a document only
in the form of electronicrecord.
Regulation of Certifying Authorities:
The Central Government may appoint a Controller of Certifying Authority who shall exercise
supervision over the activities of Certifying Authorities.
Digital Signature Certificate:
Any person may make an application to the Certifying Authority for issue of Digital
Signature Certificate. The Certifying Authority while issuing such certificate shall certify that
it has complied with the provisions of the Act.
Penalties and Adjudication:
If any person without the permission of the owner, accesses the owner’s computer, computer
system or computer net-work or downloads copies or any extract or introduces any computer
virus or damages computer, computer system or computer network data etc. he/she shall be
liable to pay damage by way of compensation not exceeding Rupees One Crore to the person
so effected.
The Appellate Tribunal:
The section 48 of IT Act provides ‘that The Telecom Disputes Settlement and Appellate
Tribunal established under section 14 of the Telecom Regulatory Authority of India Act, 1997
shall, on and from the commencement of Part XIV of Chapter VI of the Finance Act, 2017,
be the Appellate Tribunal for the purposes of this Act and the said Appellate Tribunal shall
exercise the jurisdiction, powers and authority conferred on it by or under this Act. However,
the Central Government shall specify, by notification, the matters and places in relation to
which the Appellate Tribunal, may exercise jurisdiction’.
Under the act, the Central Government has the power to establish the Cyber Regulations
Appellate Tribunal having power to entertain the cases of any person aggrieved by the Order
made by the Controller of Certifying Authority or the Adjudicating Officer.
Offences:
Tampering with computer source documents or hacking with computer system entails
punishment with imprisonment up to three years or with fine up to Rs. 2 lakhs or with both.
Publishing of information, which is obscene, in electronic form, shall be punishable with
imprisonment up to five years or with fine up to Rs. 10 lakh and for second conviction with
imprisonment up to ten years and with fine up to Rs. 2 lakhs.
The Information Technology Act, 2000 was amended in 2015 wherein the Supreme Court in
the case of Shreya Singhal v. Union of India had struck Section 66A of Information
Technology Act, 2000 as it violates the freedom of speech and expression provided under
Article 19(1)(a) of the Constitution of India.
Communication Technology:
Communication is the exchange of information through different mediums.
It is an activity that started even before the civilization of human beings; however, over a
period of time, as technology advanced, accordingly different modes of communications also
developed including telecommunication and wireless communication.In today’s world,
information and communication technology play an important role in almost every activity
that we perform.
Types of Communication
1. Telecommunication
2. Wireless Communication
Telecommunication
Telecommunication is a technique of transmission of information from one location to
another by electromagnetic means.
Different types of information can be transferred through a telecommunication system, such
as voice, text, pictures, etc.
Modern Telecommunication System
The modern form of telecommunication involves computer technology and it is capable of
transferring wide range of data including audio, video, textual, many other computer files.
Major components of modern telecommunication are:
Internet:
The Internet is the foremost important tool and the prominent resource that is being used by
almost every person across the globe. It connects millions of computers, webpages, websites,
and servers. Using the internet we can send emails, photos, videos, and messages to our loved
ones. Or in other words, the Internet is a widespread interconnected network of computers
and electronic devices(that support Internet). It creates a communication medium to share and
get information online. If your device is connected to the Internet then only you will be able
to access all the applications, websites, social media apps, and many more services. The
Internet nowadays is considered the fastest medium for sending and receiving information.
History of the Internet
The Internet came in the year 1960 with the creation of the first working model called
ARPANET (Advanced Research Projects Agency). It allowed multiple computers to work on
a single network which was their biggest achievement at that time. ARPANET uses packet
switching to communicate multiple computer systems under a single network. In October
1969, using ARPANET first message was transferred from one computer to another. After
that technology continues to grow.
Internet Governance:
Internet governance refers to the rules, policies, standards and practices that coordinate and
shape global cyberspace.
The Internet is a vast network of independently-managed networks, woven together by
globally standardized data communication protocols (primarily, Internet Protocol, TCP, UDP,
DNS and BGP). The common adoption and use of these protocols unified the world of
information and communications like never before. Millions of digital devices and massive
amounts of data, software applications, and electronic services became compatible and
interoperable. The Internet created a new environment, a complex and dynamic “cyberspace.”
While Internet connectivity generated innovative new services, capabilities and
unprecedented forms of sharing and cooperation, it also created new forms of crime, abuse,
surveillance and social conflict. Internet governance is the process whereby cyberspace
participants resolve conflicts over these problems and develop a workable order.
Policy Topics in Internet Governance:
The term “Internet governance” first started to be used in connection with the governance of
Internet identifiers such as domain names and IP addresses, which led to the formation of
ICANN(Internet Corporation for Assigned Names and Numbers).Since then, the economic,
political, social and military implications of Internet governance have expanded to embrace a
number of other areas of policy:
1. Cybersecurity: Cybersecurity is the practice of protecting systems, networks, and
programs from digital attacks. These cyberattacks are usually aimed at accessing, changing,
or destroying sensitive information; extorting money from users; or interrupting normal
business processes.
2. Digital Trade: Digital trade refers to commerce enabled by electronic means – by
telecommunications and/or ICT services – and covers trade in both goods and services.
3. Freedom of Expression Online: Freedom of expression is the right to express and receive
opinions, ideas and information. Expression and exchanges of views increasingly take place
online, including through social media platforms, websites and search engines.
4. Privacy & Surveillance: At the most basic level, surveillance is a way of accessing data.
Surveillance, implies an agent who accesses (whether through discovery tools, rules or
physical/logistical settings) personal data. Privacy, in contrast, involves a subject who
restricts access to personal data through the same means.
5. Internet Of Things: The Internet of things describes physical objects with sensors,
processing ability, software, and other technologies that connect and exchange data with other
devices and systems over the Internet or other communications networks.
6. IG Institutions:Internet Governance Institute (IGI) is an initiative established for
strengthening Internet Governance at the grass-root level through research, capacity building,
awareness, debates and policy intervention across the Asia Pacific. IGI believes in
collaboration and operates through the participation of IG related institutions.
The main objective of IGI is to contribute to strengthening grass root level stakeholders
through research, capacity building, awareness, debates, and policy intervention.
Major objectives of IGI are as follows:
Research and development on Internet Governance issues
Conduct short and long academic and non-academic online and offline course on
Internet Governance
Conduct lectures, symposia, international meetings, conferences, and workshops on
Internet Governance
Exchange of researchers and students working in the area of Internet Governance
Do advocacy and promotional activities on Internet Governance related issues and
others
Design, develop, distribution and sales of digital and nondigital content on Internet
Governance issues
7. Internet Identifiers: Internet identifiers means an electronic mail address, instant message
address or identifier, or any other designation or moniker used for self-identification during
internet communication or posting, including all designations used for the purpose of routing
or self-identification in internet communications or postings.
8. Geopolitics of IG: Geopolitics is the study of the effects of Earth's geography on politics
and international relations. Geopolitical examples may include trade agreements, war treaties,
border or territorial acknowledgements, climate agreements, and more. Two recent examples
are NAFTA and the Kyoto protocol.
Note:
1. NAFTA - The North American Free Trade Agreement (NAFTA), which was enacted
in 1994 and created a free trade zone for Mexico, Canada, and the United States, is
the most important feature in the U.S.-Mexico bilateral commercial relationship.
2. Kyoto Protocol: The Kyoto Protocol was an international treaty which extended the
1992 United Nations Framework Convention on Climate Change that commits state
parties to reduce greenhouse gas emissions, based on the scientific consensus that
global warming is occurring and that human-made CO₂ emissions are driving it.
Note: For more information visit this site - https://www.internetgovernance.org/what-is-
internet-governance/.