[go: up one dir, main page]

0% found this document useful (0 votes)
14 views3 pages

Lecture 7

The document discusses the distinction between hackers and crackers, highlighting that hackers seek to identify and fix security vulnerabilities, while crackers exploit these weaknesses for malicious purposes. It also covers software and password cracking, explaining methods used to bypass protections or recover passwords, including dictionary, hybrid, and brute force attacks. Additionally, it notes that many users choose weak passwords, making them susceptible to cracking attempts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views3 pages

Lecture 7

The document discusses the distinction between hackers and crackers, highlighting that hackers seek to identify and fix security vulnerabilities, while crackers exploit these weaknesses for malicious purposes. It also covers software and password cracking, explaining methods used to bypass protections or recover passwords, including dictionary, hybrid, and brute force attacks. Additionally, it notes that many users choose weak passwords, making them susceptible to cracking attempts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

IT Application and Tools in Business

Finals (Software and Password Cracking)

Hacker - is somebody interested in the hidden, obscure parts of a computer


or operating system. Hacker’s purpose is not to compromise data but to
discover security breaches and the reasons why such holes exist on the
target machine.

Hackers are most often computer enthusiasts or programmers looking


for advanced knowledge on programming languages or operating systems.
Hackers are usually sharing their discoveries on forums or social networks
but never damaging data or sharing information on the machine now easily
to become the crackers’ victim.

Types of Hackers

1. Black Hats - who hack into computer systems with malicious intent
usually for personal gain.

2. White Hats - are those that hack into systems in order to expose their
weaknesses so that they can be protected from future hackers or
alternatively to show off their ability to gain unauthorized access.

Cracker - is usually that “bad boy” trying to break the line of systems’
security with the purpose of spreading malicious codes (like viruses, spyware,
adware, etc.), destroy vital data and deny legitimate users generating DDOS
attacks to websites and other similar actions.

Difference between Hackers and Crackers

A Hacker can write code in one or more languages, such as C, C++,


assembly, Java. They understand what certain codes do and how it works.
Some hackers don’t use a system illegally, but expose holes within systems.
Their aim is to fix flaws within systems and to improve its security.
Sometimes, hackers may be security professionals, who are hired by
companies to audit network security or test software. They use the "same
software tools that crackers use" and seek to improve the security of his own
network by proactively attacking it as a cracker would.

Meanwhile, a Cracker breaks into systems illegally for personal gain,


vandalism, or bragging rights. Most crackers are not very knowledgeable or
skilful with little programming ability. They therefore rely on automated
programs that are downloaded from disreputable websites.

***Note: In summary, hacking and cracking can be used both illegally and
legally to gain access to a computer network. Other than the ethical
difference between the two, the major factor that separates hackers and
crackers is an understanding of computer systems and the ability to create
software. ***

Software Cracking - is the modification of software to remove or disable


features which are considered undesirable by the person cracking the
software, usually related to protection methods.

Examples of Software Cracking

1. Copy Protection
2. Trial/Demo Version
3. Serial Number (CD Key/ Hardware Key/Date Checks)
4. Date Checks

Password Cracking - is the process of recovering passwords from data that


have been stored in or transmitted by a computer system.

***Note: The purpose of password cracking might be to help a user recover a


forgotten password to gain unauthorized access to a system, or as a
preventive measure by System Administrators to check for easily crackable
passwords. ***

Types of Password Cracking

1. Dictionary - This is a file of words which is run against user accounts, and
if the password is a simple word, it can be found pretty quickly. Many users
often choose weak passwords. Therefore, there are cracking programs, which
collect personal information about the user being attacked, and generates a
number of password variations suggested by the information gathered.

2. Hybrid - A hybrid attack works in a similar way to a dictionary attack,


however it adds simple numbers or symbols to the attempts at gaining the
password.

3. Brute Force - This is the most time-consuming, but comprehensive way to


crack a password. As every possible combination of characters and
passwords are tried until the password is broken.

Most commonly used Passwords that are easily cracked

1. Single Words
2. Family Names
3. Birthdays

You might also like