yela lrkjd lshkafka fudloao@ wo mdvu
yelska .ek
fudloao fï yelska (o.O)
ir,j
fjk;a moaO;shlg fyda cd,hlg wkjirfhka we;=,;a ùu yelska f,i yÿkajhs’ kuq;a
iuyre fuh Cracking hkqfjka kï lrhs, m%Odk
jYfhka WHITE HATS hkqfjka kï lrkakka BLACK HAT jre CRACKERS jYfhka yeoskaúh hq;= hhs ;¾l lrhs’ ljqo
fï yel¾jre ir,j f;areï .kak fï ,smsh ilia lr,d ;sfhkjd’
WHITE HAT HACKERS
mß.Kl iy cd, wdrlaIl m%uqlhka
f,i yeosk fõ’
(Computer and Network Experts) fudjqka ydkslr fkdue;s fya;=ka ioyd
moao;shl we;=¿ jkakka fõ’
(breaks security for non-malicious
reasons)
BLACK HAT HACKERS
ydkslr fya;=ka ioyd
cd,hlg fyda mß.Kl mèo;shlg we;=¿ jkakka
(Breaks security for malicious reasons)
GRAY HAT HACKERS
by;
fomd¾Yjfhau tl;=jla f,i yeoskafõ’
wka;¾cd,h ;=,
ießirñka wfkla cd, ;=, we;=,a fõ’
fndfyda ÿrg iq¿
uqo,la ioyd moaO;s iy cd, j, wkdrlaIs; ia:dk w¨;a jeäh lrhs’
wOHmk wjê
Elite hacker
úIfha oejeka;fhda fuu
kñka yÿkajhs’ kj wkdrlaIs; ia:dk fidhkakka
kj we;=¿ jk l%u
fidhkakka fuu >kfha ,d ie,fla’
Script kiddie
lsisu yelsx ms,sn|
oekqula ke;s wjfndaohla ke;s wh fõ’ wks;a mqoa.,hka úiska ks¾udKh lrk ,o Application wdOdrfhka jev .kafkda fj;s’
Neophyte
iuyr fmdrj,a hhs is;
isákakka lsisÿ fohla fkdokakd wkh wduka;%Kh lrkafka fujeks kñks’ (Noob, Newbie)
Blue hat
moao;s j, wdrlaIdj
fidhd n,kakka fï kñka yeoskafõ’
Hacktivist
iudc, wd.ñl, foaYmd,k
wjYH;d ioyd we;=¿ jkakka’
fudkjo wjYH iqÿiqlï......
ld,h, wjfndaoh, lshùu, m%fhda.sl
w;a yod ne,Su’
Ndú;d jk l%u
Client Side Hacking
Server Side Hacking
Client Side Hacking
Social Engineering
yelska j, Nhdklu iy
m%n,u f,i i,lkak mq¿jka, ;u nqoaêh iy wfkla mqoa.,hdj /jàfï
olaI;djh u; fuh rod mejf;a’
Wod - uqKq
fmdf;a .eyeKq <ufhlaf.a fm%d*hs,a tllska ;udg Hack
lsÍug wjYH mqoa.,hd
iu. ñ;% ù Tyq .ek úia;r oek .ekSu ;=,ska ryia m%Yakh ioyd ms<s;=re
fidhd.ekSu’
Social Engineering Expert flfkl= idkafhka osk .dkla ;dudg wjYH
mqoa.,hd foi n,d isáñka Tyq wOkh lrhs,
Tyqf.a ðjk rgdj, leu;s
hqj;shka j¾., fldkav ú,dis;. jeks
foa, uf.a ;SrfKa yeáhg fïl ;rï wks;a tllaj;a
jeo.;a keye’ fldákau lsfjd;a fudldj yß f.dkdg wekaoùu .
Shoulder Surfing
fïl;a
álla f,ais iy wkjYH jevla, fldfydu;a wfma jf.a tjqkag f,ais fohla’
wfkldf.a uqr moh foi wei fldfkka fyda,
n,d isàu’ b;ska ,`.
mdGl fudfllaj;a bkakjd kï uqr moh we;=,a fkdlr isàu w.g .=Khs’
Guessing
hy¿fjla
kï, Social Engineering okakdjkdkaï fïl f,aishs, “ is;Su
“
ta ksid fl,a,f.a, wïuf.a
ku jf.a fudav uqr mo we;=,a lrkak tmd’
Keylogging
uq,slju fuh u.ska
wks;a mqoa.,hd úiska ghsma lrk ish¨u wl=re yel¾ jrhd fj; ,efí’.
Wod - RapZo Logger , Accuracy Logger , Keystork Dante
Cookies Stealing
hï wvúhlg we;=,a
ùfïoS ;u mß>klfha ;ekam;a jk l=lsia
fidr .ekSu ;=,ska
f,d.a jk hqi¾ fku iy ryia mo fidr.ksuq’
Remote Administration tools - aka
(RAT)
yel¾ jrekaf.a m%n,u
wúhls, yel¾ jrhdg wjYH mqoa.,hdf.a mß.Klh wjYH
mßos yeisßúh yelsh, fjk;a tajd nd.; l, yelsh.
Wod - Pro RAT , Dark_Comet , BS , Spy Net , Cyber gate
Password Stealing
Keylogging j,g idudk Wõj;a fuysoS kshñ; Apps j,
User Names and Password muKla yel¾ lrejdf.a Bfï,a .sKqug fyda
Tyqf.a wod< wvúhlg tjhs’ Ex –
Emissray , iStealer
Phishing Attacks
wod< fjí wvúh f,i
iEÿ õhdc wvúhlg mqoa.,hdj f.k hhs,
Wod - f*aia
nqla wvúh f,i ;kq õhdc tlg Tn f,d.a jQ úg Tfí o;a; yel¾ jrhdg ,efí’
Bot or Zombies
;j;a m%n, fohls, Password Stealing, Keylogging hkak f,i;a l%shd;aul fõ’ BOTNET tlla hkq fndfyda úkdY ldÍ fohls, Tfí
ish¨ o;a;o;# fidr .kakg oelsh yels fõ.
Wod - Zeus bot
Server Side Hacking
Exploiting
hkqfjka uq,slju
oelafjkafka, hï moao;shl fyda cd,hl we;s wkdrlaIs;
ia:dkhlska we;=,a ùfuka ;duf.a jdish idod .ekSuhs.
fjí wvúhl fujekaklska
l, yß foa,
1. SQL Injection
2. RFI, LFI
3. Uploading Shells
4. XSS Cross Site Scripting
5. CSRF
6. Gaining Root Access to websites
hosted on the same server and then intruding another site on the server
7. Using Scripts to gain information
known as Exploits
Dictionary Attacks
f,fyisfhkau fuhska
w;añfokak mq¿jka, kfï yeáhg jf.au lsisu ojil Dictionary tll we;=,;a fjkak mq¿jka kï uqrmohg we;=,a lrkak tmd, fudlo
fm%da.%ïia ;sfhkjd fï jf.a fmdä Wkaf.a uqr mo f,fyisfhkau fidhd .kak mq¨jka.
Brute-force Attacks
by; foag iudkhs. kuq;a
fndfyda ojila hk jevla, Tfí uqr moh os.= tlla kï wxl tl;=
lsÍu, iudk ,l=Kq, jryka
jeks foa iu. ;sfhkjd kï fndfyda ÿrg uu m%ydrh osh;a lrhs, ta;a
f.dvla f,dl= uqr mohla kï jevla fjkafka keye.
Reverting Attack
lsisu
wvúhla u.ska lshk Hacking lr,d fokjd lshk foaj,a úiajdia lrkak
tmd’ Thdf.a i,a,s kslï f.or bkak n,a,g fi,a,ï lrkak fokak Bg jvd
ys;g fydohs, lsisu fid*aÜfjhd tlla keye f*aia nqla,
fï,a, Th jf.a wks;a m%isoao foaj,a HACK lrkak
mq¿jka’ fï by; úia;r j,g wu;ru, yel¾jre oUdfkka wdj tjqk fkfuhs’ hq
áhqí j, jf.a ;sfhk yelska.a fm%da.%ïia nd.; lrkak tmd ljodj;a Programming language tlla bf.k .kafka ke;sj ;uka yel¾ flfkla lshd .kakj;a tmd
ljodj;a, Script kiddie flfkla kï lshd .;a;g lula keye’ fm%da.a¾ñka.a
okakd m,shg yel¾,d fjkafk;a keye’ lsh, wu;l lrkakka tmd’ wka
flfkl=g wkjYH mßos yela lrkak fm,fnkak tmd’ ;ud yel¾ flfkla lsh, fndaâ .y,
m%isoaosfha nd,aÿ fjkak kï tmd, fjí wvúhla yela lr,d Deface lrkjg jvd tu wvúfha whs;s lrej oekqj;a lsÍfuka Tng uqo,a, /lshd
,eîfï iïNdú;dj jeähs, oeka ,xldfõ Cyber Laws jeä, ta ksid fudlla yß f.dka; jevla (BLACK HAT) jevla lrkak hkfldg ;udf.a wdrlaIdj ;yjqre lrf.k bkak’ ´kEu
cd,hl wkdrlaIs; ;eka f.dvla ;sfhkjd,
ta ksid yela lrkak
neye lshkak tmd’ fydh,d bkak’
yß tfykï oeka okakjd fka HACKING iSka tl’ ch fõjd’
iudcjdofhka fl,jr fõjd'
0 comments:
Post a Comment