What is Black Hat Hacking? Terms You Should Know


This is an introduction to some of the basic terms you will need to follow this course.

First, you have three main categories of  people: white hat hackers, grey hat hackers, and black hat hackers.

White hats are people whose activities are within the law. Everything we will be doing falls into the white hat hackers. There are pen testers and people like you and me and so on.

Grey hat hackers are hackers who’s activity border between legal and illegal. It’s a bit of a shady area there.

Black hat hackers are the most known category. Unfortunately every time every time people use the term hacking, it is associated with black hats. There are people who conduct all kind of illegal activities or perform hacking without any regard for the law. They extract information from certain service, like credit cards. They usually extract some sort of financial gain.

Footprinting is information gathering. You are conducting reconnaissance work like figuring out the IP of the server. You are figuring out which are open and then you can conclude which services are running there. Yet, that doesn’t only apply to the digital world. The act of footprinting can also be when you go to the company itself. You have a look around and try to gather information on sight. You can go behind the building and jump into the trash containers and get some information from there. Some people have will go into the parking lot and see who the employees are and go from there. This is just general information gathering on your target. It doesn’t need to stay in the digital world.

DoS and DDoS are denial of service. In general,  you perform more requests than a server can handle. As a result, the server drops connections. For example, Apache web server can handle, by default, up to 10,000 connections. If you can make 10,000 requests, anyone else making requests will not be able to access the website. Their connection will be dropped because Apache has too many users. All the other connections will be dropped by default. The site will be inaccessible even though you haven’t broken any codes or firewalls. When you’re DoSing something it’s just you. All the requests are coming from your own computer. That is not always the most efficient of ways.

In fact, it generally only can work if there is a flaw in the ways in which requests are processed. That is why you have DDoS attacks. When you have many computers, many  connections and they are all making requests to a certain server, this is difficult to fight off. You have to have a clever configuration of your firewall as well. Usually you would need a physical one to prevent DDos attacks. By physical I mean a router firewall. This is not difficult to do the attack itself as it is difficult to make the preparations. First, you need to go about which you will enslave and use to perform this sort of attack. This is the hard part. The DDoS part is pretty easy compared to that.

To infect other computers, you will need two things: RATS and FUDs.

RATS, remote administration tools, are the first thing you will need. You will need to make them FUD, fully undetectable. They cannot be  labeled as something malicious by antivirus programs. Most of the time, you don’t have to make your own undetectable applications. There are many companies that pay good money to make their programs undetectable. RATS are just ways to infect other computers and convert them into your slaves. This is good because it anonymizes you to a large extent. It is difficult to track someone down who is doing this. The users have no idea someone is controlling their device. Nothing visual is  happening on their desktop.  All the processes are running in the background and your processor is executing them. The only want to see them is to start up a task manager and then see the running processes. Perhaps you can spot it there, but it would be difficult to see iif someone has implemented a root kit.

Root Kit is a tool which you install operating system and it is able to hide running processes from the system itself. When you start a task manager the root kit would hide the processes from the task manager. How it works is the task manager requests information from the system. The kernel, and then the kernel from the system responds where the key functionalities are. The kernel of the system responds but root kit would redirect the requests from task manager to itself. Finally, it would show no processes running.

Fishing attacks are when you apply some bait, someone bites it and then you pull on it. A good example is when you get an email with  link in it. When you click the link, the webpage looks normal, but it collects your information.  These days, the DNS servers get changed on your routers. when that happens, all the you’re going to get a domain from some private DNS server who’s MS is altered and to make redirections to interpret Facebook.com to an IP address that doesn’t belong to Facebook. Facebook looks exactly the same, there is no way to tell becausethe domain name is the same. It asks for login credentials and once you do that, they’re gone. It’s not hard, but no one pays any attention to it.

In the upper left, you may want to check to see if the upper left is https instead of http. If these kind of attacks are conducted  there would be no legit way of it out other than checking the certificates. I know it sounds a bit complex, but I will explain this in great details. I will give you several demonstrations and by the end of this course you will understand and know how to do this with great ease.

Get the full course for 87% off here