top of page

Hacking: the gaining of              access to data/resources in a system/computer

Screen Shot 2022-04-06 at 6.18_edited.png

 unauthorized

skull_edited_edited_edited_edited_edited

Common Hacker Archetypes

Screen Shot 2022-04-09 at 2_edited_edite

Choose Your Class

Black Hat

robber_edited_edited.png

Motive: financial gain
Ethics: lawless


The archetype most associated with the term "hacker", they are malicious actors with the intent to steal financial data or other types of confidential information. 

Will usually sell this information illegally on dark web marketplaces, or use it to directly extort their victim.

Grey Hat

Screen Shot 2022-04-08 at 9_edited.png

Motive: fun, curiosity, reputation
Ethics: None


The middle area between black and white, 
grey hats are not typically concerned with
harming nor helping anyone.

For grey hats, hacking is just a problem
solving activity/game.
They are a common type of hacker found in online communities.

Blue Hat

Screen Shot 2022-04-09 at 5_edited.png

Motive:revenge
Ethics: eye for an eye


Blue hats often just employ pre-existing 
malware/scripts to launch attacks for
personal reasons.

They may direct their attack to someone
they dislike, or someone they believed has 
wronged them in some way.

For blue hats, hacking is merely a tool
for vengeance.

Script
Kiddie

Screen Shot 2022-04-08 at 10.07_edited.png

Motive:to troll and cause inconvenience
Ethics: juvenile


Amateurs in a technical sense, script kiddies usually just run pre-existing tools and scripts in order to launch basic attacks.

Regularly use Denial of Service attacks
(see below).

The term is also used as an insult by
veteran hackers to criticize hackers who 
don't write their own exploits, or have a shallow technical understanding of computers/networks.

State
Sponsored

soldier_edited.png

Motive: warfare, national interest
Ethics: patriotic


Recruited and deployed by a nation-state 
in order to use hacking for reasons 
of national interest.

They take part in espionage, with the goal
of obtaining secret information or 
confidential records of another nation.

Militaries and government organizations will recruit especially talented individuals for these roles, even from a young age. Wars are increasingly being fought on a cyber front.

White Hat

white hat_edited_edited.png

Motive: assist organizations against cyberthreats

Ethics: lawful

​

 

Opposite of the black hats, white hats

help implement security protocols and

identify vulnerabilities to help businesses

and other organizations.

​

Can be referred to as good/ethical hackers.

​

This role is becoming more in demand as 

cyberthreats against organizations increase.

​

​

Red Hat

batman_edited_edited.png

Motive:to serve vigilante justice
Ethics: utilitarian (whatever it takes)


Red hats actively hunt black hats, and 
essentially, hack the hacker.

Rather than reporting the black hat's 
identity to authorities, red hats believe
in "giving them a taste of their own medicine".

Often use ethically questionable methods, as they employ the same tactics as black hats.

 

Green Hat

Screen Shot 2022-04-08 at 10_edited.png

Motive:to learn
Ethics: undetermined


A newbie in the hacking world, green hats
hang out in hacker chat rooms, forums,
and other online communities to learn
more about hacking and how other hackers
work.

Will usually eventually mature into another category of hacker.

Hacktivist

anon_edited.png

Motive:to bring attention to a social cause
Ethics: situational


A hacker-activist, they use hacking to raise awareness. Usually do this by attacking
a government/organization site or server
in order to make a point. 
They may deface the site, or reveal confidential information to the public.

Sometimes collaborate with other individuals,
forming hacker groups, each with a unique philosophy or "modus operandi".
If their tactics are especially brutal, they can be labelled by others as cyber-terrorists  

Cyber
Terrorist

joker_edited.png

Motive: to create social disruption/fear
Ethics: radical


May be politically motivated, these agents use
hacking as a way to further their interests.
Often mixed in with hacktivists, though cyberterrorists usually have different objectives.

Rather than just bringing attention to a social cause, they wish to cause harm and intimidate.
These individuals don't care if their actions lead to the physical harm of other people.

A highly dangerous and radical type of hacker.

Hover me

mouse_edited_edited.png

Player 1

Hover to see
descriptions

mouse_edited.png
Screen Shot 2022-04-09 at 2_edited.png

Vulnerabilities, Exploits, and Payloads
A
Deadly Combo

mouse_edited_edited.png

Hover me

Vulnerability

1. A vulnerability is...

A software bug (error in programming), that can be taken advantage of by a hacker.

Used to achieve unintended (often malicious) behaviours/results.

To a hacker, this is an
opening
for a
cyberattack

ezgif.com-gif-maker (1).gif

Ex: Not wearing a helmet, is a vulnerability in combat. 

Analyzing weaknesses...
 

A payload is... what the action the hacker wants to take, after exploiting the vulnerability

Cover yourself, he's aiming!
 

Exploit

2. An exploit is...

​

A written piece of code that takes advantage of the vulnerability in order to achieve the hacker's intended results. 

pixel-art-arrow_1957532_edited_edited_edited_edited_edited.png
ezgif.com-gif-maker (4).gif

Ex: The archer shooting his arrow at the knight without a helmet, would be  exploiting a vulnerability/opening.

This is the action the hacker takes when they see an opening. 

Watch Out!

Payload

~
~
~
I don't feel so good
Ex: like the poison coating an arrow, the payload is what is injected once the vulnerability is exploited
ezgif.com-gif-maker (2).gif
3. A payload is...

What action the hacker wants to take, after exploiting the vulnerability. 
      

Usually is some type of malicious code to be injected into a network/system.
You FOOL I told you to wear a helmet!
Screen Shot 2022-04-11 at 8.05_edited.png
knight_edited.png
archer_edited_edited.png
Screen Shot 2022-04-09 at 2_edited.png
toolbox_edited.png



Common Toolkit:

Required Skills

Screen Shot 2022-04-11 at 3.41_edited.png
Screen Shot 2022-04-11 at 3_edited.png
Screen Shot 2022-04-11 at 3.41_edited.png
mouse_edited_edited.png

Hover me

Basic - Fundamental

Computer

Screen Shot 2022-04-11 at 5.52_edited.jpg

cat computer.txt

Basic Computer Skills are required to become a hacker. These Include: being able to use the command prompt, navigating directories, understanding the common types of files/programs that exist, understanding administrator privileges, being aware of software updates in commonly used programs and operating systems. One that is often overlooked, but important is the ability to use internet search engines to research topics. Hackers must stay up-to-date as new tech developments release over time.

curious.user@hackattackclub:

ezgif.com-gif-maker.gif

Wireless

cat wireless.txt

To hack wireless tech, a hacker must have the preliminary knowledge to understand how these systems work. Wireless networks are common in our modern world, but they have security threats.
A skilled hacker may be able to sniff the network using a packet analyzer (sniffer) without being in the same location as the network. Wireless networks utilize radio waves, which a sniffer tools can analyze from a nearby location.

Screen Shot 2022-04-11 at 5.52.52 PM.png
Screen Shot 2022-04-14 at 8.28.14 PM.png

curious.user@hackattackclub:

ezgif.com-gif-maker.gif

Linux OS

Screen Shot 2022-04-11 at 5.52.52 PM.png

cat penguin.txt

Linux is essential for hackers as most web servers run on the Linux operating system. Thus, if the hacker can gain access to this server, they would be able to check for vulnerabilities to exploit.

Hackers also use Linux because of the many advantages the system offers: i) Linux is open-source, so the source code can be manipulated/tweaked to the hacker’s liking.
ii) Linux also offers granular control by allowing the hacker to easily program certain aspects of the operating system using scripting languages such as BASH or Python. 

curious.user@hackattackclub:

ezgif.com-gif-maker.gif

Networking

Screen Shot 2022-04-11 at 5.52.52 PM.png

cat networks.txt

All good hackers know Networking as it is the most fundamental skill necessary for hacking. The key is to understand the different types of networks (DHCP, NAT, Subnetting). This allows hackers to explore interconnected computers in a network and determine potential exploits. After all, most  computers are connected to networks to allow the transfer of data between multiple machines. The point where data is transferred is often the opportunity a hacker needs to break into a machine/system.

curious.user@hackattackclub:

ezgif.com-gif-maker.gif

Using Tools

Screen Shot 2022-04-11 at 5.52.52 PM.png

cat toolbox.txt

Many beginners cannot write their own exploits, so the usage of well known pre-made scripts & software is crucial at this stage.
Two common tools include NMAP and Metasploit.

NMAP (Network Mapper) is an open source tool used for network discovering & security auditing.
Metasploit is a well-known and powerful tool used to generate/run exploits. Metasploit can be used with a command prompt or with the Web UI to penetrate small networks. Its capabilities include checking for vulnerabilities, discovering networks, importing scan data and running individual exploits on hosts.

curious.user@hackattackclub:

ezgif.com-gif-maker.gif
Screen Shot 2022-04-11 at 5.52.52 PM.png

cat SQL.txt

Databases

Since organizations will typically store their data using some type of DataBase Management System (DBMS), many hacks are targeted towards databases.
A common type is SQL Injection (see below). 

To understand databases, a hacker should have a solid foundation in SQL (Structured Query Language). This is a common language used for managing data in relational databases. Commonly used Database Management Systems that run on SQL include (MySQL, SQL Server, MS Access).

curious.user@hackattackclub:

ezgif.com-gif-maker.gif
pixil-frame-0 (1).png

curious.user@hackattackclub:

ezgif.com-gif-maker.gif

Intermediate - Advanced

Screen Shot 2022-04-11 at 5.52.52 PM.png

cat crypto.txt

Encryption methods convert plain-text data into encoded messages using an algorithm (cipher)  & key (a password/input). This can conceal a system's flaws, since a hacker must revert the data back into a readable format to properly analyze it.
Thus, hackers will use various encryption-cracking tools such as...

i) Traffic Injectors: can insert a hacker's encrypted messages into a network, allowing them to obtain both encrypted & plaintext messages. Then, the hacker can figure out the meaning of the message(s) by comparing the two forms (via the tool). 

ii) Decrypting Tools: one tool will gather packets (units of network-carried data), which are then inputted into an analyzer tool (uses algorithm) to decrypt the packet.

iii) Brute Force Attack tools: gather data packets & attempt to crack the encryption code by using many keys stored within the data packets. The software in brute force attack tools will attempt to decrypt the packets key by key until the right one is found.

 

curious.user@hackattackclub:

ezgif.com-gif-maker.gif

Cryptography

Screen Shot 2022-04-11 at 5.52.52 PM.png

cat stick2script.txt

To graduate from "script kiddie" to a legit hacker, one must begin to develop their own exploits and possibly even payloads.

Scripting is when a code is injected by the hacker which allows them to execute malicious JavaScript in someone else’s browser. In this type of hacking, the victim is not directly targeted, but instead exploits a vulnerability in the website that the victim is visiting. By exploiting this vulnerability, the hacker is able deliver the malicious JavaScript to the victim in a form that would seem normal to the victim. These attacks can help the hacker gather data from account hijacking, changing of user settings, cookie theft and creating DoS attacks (see below for definition).

curious.user@hackattackclub:

ezgif.com-gif-maker.gif

Scripting/
Programming

Screen Shot 2022-04-11 at 5.52.52 PM.png

cat sherlock.txt

Digital forensics is when an individual such as a hacker or a digital investigator determines the who, what, where, how and when of what took place in the digital system. Every individual leaves behind digital footprints, and that is what hackers or digital investigators look for.
Digital forensic investigations are part of nearly every criminal investigations in the modern world as a vast majority of digital perpetrators leave behind a digital “signature”.

ezgif.com-gif-maker.gif

curious.user@hackattackclub:

Forensics

Screen Shot 2022-04-11 at 5.52.52 PM.png

cat gnireenignE.txt 

Reverse Engineering is used by hackers to incorporate new features into existing software, even when the source code is unknown. Reverse engineering requires a few tools such as:

i) Disassemblers: dissect binary codes into assembly codes and  help convert the language into a user-friendly format.

ii) Debuggers: set breakpoints & edit assembly code at run-time.

iii) Hex Editors: allow the hacker to view and edit the binary according to the software requirements, making it possible to manipulate the binary data that makes up the computer file.

iv) PE and Resource Viewers: allow the hacker to view and edit the resources in the EXE file. PE explorer helps the hacker translate applications which do not have source codes.

curious.user@hackattackclub:

ezgif.com-gif-maker.gif

Reverse
Engineering

Screen Shot 2022-04-11 at 5.52.52 PM.png

cat misc.txt

In the world of hacking, technical skills are not everything. A good hacker must be able to problem solve, think creatively, conduct research independently, and most importantly, be persistent.

While hackers spend time manipulating machines, it is just as equally important to understand how humans can be manipulated. Most would benefit from knowledge regarding Human Psychology in order to gain better understanding of how Social Engineering (see below for definition) works.

curious.user@hackattackclub:

ezgif.com-gif-maker.gif

Misc/
Intangibles

381-3814789_angler-fish-piranha-plant-pi

PH15H1NG 

Occurs when an attacker sends a fraudulent message,

often in the form of an e-mail.

​

Used to deceive an individual into revealing personal information (fake login screens/forms) or redirects to a page that installs malicious software.

​

​

EXPLOITS: Shortened URLs, Uses Urgency 
          Business Operations,






DEFENCE: Email Filters, User Training

Screen Shot 2022-04-10 at 3.30_edited.png

!

Screen Shot 2022-04-03 at 8.43.04 PM.png
Screen Shot 2022-04-03 at 8.59.10 PM.png

5OC1AL ENG1N33R1NG

Psychological manipulation of an individual in order to initiate an action or to reveal personal information. 

​

Often an element of several types of attacks

EXPLOITS: Human Psychology/Biases





DEFENCE: Education and Protocols

brain_edited.png
needle_edited.png
blood_edited.png

SQL INJECTION 

A code-injection technique - used to attack web applications

Inserts SQL code (Structured Query Language - a language used to design/manage data in various relational database management systems) from the client side to the server side.

​

Can potentially allow a hacker to:

  • read sensitive/confidential data (ex: user information)

  • modify database entries (ex: direct deposit information)

  • execute admin operations on the database (ex: shut it down)

EXPLOITS: Sites Using SQL-Based Database              Systems






DEFENCE: Parameterized Statements,
         Keeping Web App Software Updated,
         Using Least-Privilege Principles

 

folder_edited.png
usb_edited.png
usb_edited.png
usb_edited_edited.png
blood_edited.png

MALWARE INJECTING DEVICES

The use of hardware to infect malware onto a computer. 

Infected USB sticks can allow hackers access into your machine.

​

Sometimes malicious actors will leave these devices hanging around computers, hoping that human curiosity will finish the job.

EXPLOITS: Unprotected Computers, Human                Curiousity






DEFENCE: USB Anti-Virus, Awareness

shield_edited.png
hacker_edited.png
Screen Shot 2022-04-06 at 6.35_edited.png
computer_edited.png
skull_edited.png
computer_edited.png
skull_edited.png
computer_edited.png
skull_edited.png
skull_edited_edited_edited.jpg
Screen Shot 2022-04-06 at 7.20_edited.png
Screen Shot 2022-04-06 at 7.20_edited.png
Screen Shot 2022-04-06 at 7.20_edited.png
Screen Shot 2022-04-06 at 7.20_edited.png
Screen Shot 2022-04-06 at 7.20_edited.png
Screen Shot 2022-04-06 at 7.20_edited.png
Screen Shot 2022-04-06 at 7.20_edited.png
Screen Shot 2022-04-06 at 7.20_edited.png
Screen Shot 2022-04-06 at 7.20_edited.png
Screen Shot 2022-04-06 at 7.20_edited.png
Screen Shot 2022-04-06 at 7.20_edited.png
Screen Shot 2022-04-06 at 6.28_edited.pn
Screen Shot 2022-04-03 at 10.11_edited.png
Screen Shot 2022-04-03 at 10.11_edited.png
Screen Shot 2022-04-03 at 10.11_edited.png
Screen Shot 2022-04-06 at 6.28_edited.pn
Screen Shot 2022-04-06 at 6.28_edited.pn
Screen Shot 2022-04-06 at 7_edited.png

D3N1AL 0F SERV1CE (DOS)
/DISTRIBUTED D3NIAL 0F SERVICE (DDOS)

The bombardment of a server with large amounts traffic.

Effectively giving the server more requests than can be handled, causing it to crash.

​

Used to take down websites

(often businesses/government/organizations). 

​

DDOS operates in the same fashion but employs the use of a

botnet: "a network/group of computers, infected by malware and under the control of a single owner (attacker)"

​

EXPLOITS: Poorly Managed Servers















DEFENCE: DOS Protection Softwares, Firewall

castle_edited_edited_edited.png
Screen Shot 2022-04-10 at 5_edited.png
lockandkey_edited.png

KEYL0GGING

Keylogging is when malicious software called spyware is used to record your keystrokes, keeping track of the usernames and passwords a user enters. 

​

​

EXPLOITS: Same as phishing and social                    engineering





DEFENCE: Malware Scanner that detects                   KeyLoggers

cam_edited.png
BRUTE_edited_edited_edited_edited_edited

BRUTE FORCE

Attacker submits many passwords in the attempt to guess one correctly. Uses Trial and Error.

​

Often done using an algorithm. When the attacker refers to a commonly used password database, it is called a dictionary attack.

​

EXPLOITS: Common/Easy-to guess passcodes


******************



DEFENCE: Unique, strong passphrases

spider_edited_edited.png
blood_edited_edited_edited.png
Screen Shot 2022-04-04 at 12.42_edited.p
virus_edited.png
virus_edited.png
virus_edited.png
Screen Shot 2022-04-04 at 12.42_edited.p

MALWARE - VIRUSES & WORMS 

Viruses are the most well-known type of malware.

​

A malicious code that spreads from device to device.

Intended to damage a host computer or steal its data.

Must be triggered by the victim/host

​

Worms are similar but require no initiation from the host.

​

EXPLOITS: Same as phishing and social                    engineering





DEFENCE: Anti-virus software, cyber-vigilance

mask_edited.png
Capture_edited.png

Hello Friend

BAIT AND SWITCH

The use of advertisements to redirect users to malicious sites.

Upon visiting the site the attacker can attempt to install malware.

​

Uses eye-catching/interesting advertisements to entice the user. 

​

EXPLOITS: Trusted Platforms (ad spaces)






DEFENCE: AD-Blockers, inspecting links

Screen Shot 2022-04-10 at 6.03_edited.png
Screen Shot 2022-04-06 at 6_edited_edite
Screen Shot 2022-04-06 at 6_edited_edite
Screen Shot 2022-04-06 at 6.18_edited.png
Screen Shot 2022-04-06 at 6_edited_edite
Screen Shot 2022-04-06 at 6_edited_edite

FAKE WEBSITES

The use of cloned websites designed to look very similar to sites that host well-known softwareWhen the user attempts to download the software, they are actually downloading malware.

​

Uses deceptive website layouts and URLs to trick the user. Has also been used in tandem with BAIT AND SWITCH.

​

EXPLOITS: The user's trust in a particular              product






DEFENCE: Vigilance, anti-virus software

guy_edited_edited.png
ezgif.com-gif-maker (6).gif
are-you-a-one-or-a-zero-mr-robot-typography-4k-9e_edited.jpg

READY TO CONTINUE YOUR JOURNEY?

Watch Out!

ezgif.com-gif-maker (6).gif
mouse_edited_edited.png

Click me

bottom of page