Introduction. What is Hacking - Computer Hacking: The Essential Hacking Guide for Beginners (2015)

Computer Hacking: The Essential Hacking Guide for Beginners (2015)

Introduction. What is Hacking?

Hacking is the act of gaining unauthorized access to a computer system, and can include viewing or copying data, or even creating new data. Often hacking is understood to be a way of maliciously disrupting a computer system, copying information, or leaving behind a virus that destroys data.

There are many different reasons why hacking takes place, and these reasons range from wanting to disrupt a system due to ideology (so hacking as a means of protesting); wanting to gain profit for example in order to commit credit card fraud; or simply hacking for the sake of enjoyment and amusement.

There is some controversy about the definition of the word ‘hacker’ because those that try to prevent such breaches in security from taking place, or seek to recover lost files, can also be known as hackers. Thus, some people believe that the correct term for malicious system security breaches is in fact ‘cracking’ and that ‘hacking’ is the correct word to use for those who fight against such malicious exploitation of computer weaknesses.

However, in the popular imagination and in general conversation, the word ‘hacker’ is mainly understood to refer to the ‘bad’ method of breaking through computer security. The two processes share many common skills, as regardless of motivation (whether to steal or protect, break in to or save, computer data) the same understanding of computers is required.

Hacking is more than simply a pastime for those who are interested in technology, and more than simply an illegal activity used for personal gain and with malicious intent, although both of these motivations do make up much of hacking activity. In fact, hacking is its own subculture, and members of the community feel very strongly about their ideologies, techniques and social relationships in the computer underworld.

There are many hacking groups and conventions, such as SummerCon, DEF CON, HoHoCon, ShmooCon, BlackHat, Chaos Communication and Hacker Halted, and local hacking communities take their entries into hacking competitions very seriously. Unsurprisingly there are also numerous online groups and forums dedicated to the subject of hacking, and there is certainly a strong community spirit felt by those with similar hacking ideologies.

Furthermore, hackers are often passionate about literary depictions of the hacking community, and ardently read fictional Cyberpunk and factual hacker magazines.

This book will serve as an introduction to the world of hacking, and will provide insight into some of the key influences, ideologies, groups, concepts, and techniques of hacking.

The first chapter will consider the beginnings of hacking and the influence of the literary genre, Cyberpunk. The second chapter will look at the different types of hackers, and draw a distinction between ethical and unethical hacking. The third chapter will look at the issue of computer security, which is vital to an understanding of hacking.

The final chapter will provide an overview of the various different techniques for hacking, including automated and manual approaches as well as the importance of the cyber confidence trick known as social engineering.