// Hacker Facts// 7 Secrets About Hackers - First Part

in hacker •  6 years ago 

Capture d’écran 2019-05-20 à 00.34.45.png

Source

1. A hacker is not always a computer genius

When we try to define "real" hackers, we will generally talk about certified IT security professionals whose job is to find and secure system vulnerabilities. These people are called "ethical hackers". Some ethical hackers are recognized in communities for their achievements, so not all of them necessarily have a diploma or certification.

These ethical hackers constitute only a small percentage of hackers in the world. Indeed, a hacker in its original sense is a person who is passionate about understanding the intimate workings of a computer system. The field, therefore, goes beyond IT security to include programming or electronics.

Only, if there is a distorted (but fashionable) definition of the term "hacker", it is the one conveyed by the media that corresponds to the "cracker". This definition is so popular that it is often used voluntarily.

It is not ethical hackers who hack into Internet users, and that is precisely why we should use the right definitions: crackers are not ethical hackers. Of course, the methods and tools are the same, but the goals are totally different.

The expansion of RAD (Rapid Application Development) methods has greatly contributed to the very rapid creation of powerful malware. Now any Internet user with a manual and an integrated development environment (such as Visual Studio) can program powerful software without special knowledge.

It goes even further, the ready-made programs themselves are widely distributed and usable by the general public.

Typical piracy occurs by a person in the target's entourage, who usually acts for revenge or personal gain. The pirate in question will not have much knowledge of the tools used and the risks involved in their illegal use.

DQmdpsoEfLe5nRg4Q1oKWHNjLdMnAucCYfRou1yF5Yiwrzs.png

2. The one who hacks you usually knows you well

This is the direct transition after the first point. We only very rarely hack into an account for pleasure, knowing, in particular, the consequences that can follow. Chances are that someone in your immediate or distant circle is responsible for hacking into your account.

We are all tiny on the Internet, and we are often only "normal users", i.e. users of no importance to large cyber terrorist organizations. These organizations have no legitimate reason to hack into you, they are not attacking individuals but rather governments and businesses.

If you had the skills to hack into a Facebook account, would you hack into a stranger's account? Or would you find it more interesting to hacking into someone you know?

Be careful, there are still many ways to be hacked "by chance", with little or no connection to the cracker. These include hacking into a website on which you were registered, or massive hacking into a category of users. The category of users that could be, for example, customers of a mobile operator targeted by a phishing campaign. Random e-mails are sent to stolen e-mail addresses or found on the web requesting fictitious "updates" of account information.

Important point: the person who hacked you of their own free will if they know you, is usually a beginner and makes mistakes, so it is also easy to recognize them. So keep downloaded programs and viruses in quarantine. Also, do not delete the history of visited sites or the last emails. They can be used to track the cracker.

DQmdpsoEfLe5nRg4Q1oKWHNjLdMnAucCYfRou1yF5Yiwrzs.png

3. You can find a pirate

We have just stated that the person responsible for hacking into one of your accounts is usually someone you know. You can easily be sure if this person is not very comfortable with hacking. Indeed, it is possible to decompile a malicious program like any other program.

In the case of keyloggers, the email address and password of the hacker can often be found in the source code of his program. This is possible because the hacker must provide this information to run his program and therefore to receive the stolen information in his mailbox. Logins such as FTP passwords or other services can also be retrieved.

So always keep a history of the sites visited and programs downloaded, especially those that are suspicious. Because the day you become a victim of hacking, you could always at least try to track down the hacker who's mad at you.

To decompile a program, the method is relatively simple, just download a program called a "decompile" or "deobfuscator" like .NET Reflector.

.NET Reflector allows you to retrieve the source codes of the dotnet (.NET) family of programs, i.e. Visual Basic .NET and C# among others.

Keyloggers and other malware are often programmed with a dotnet language, so there is a good chance that the technique will work.

The 4 other secrets are for tomorrow!

Stay Informed, Stay Safe

DQmdpsoEfLe5nRg4Q1oKWHNjLdMnAucCYfRou1yF5Yiwrzs.png

DQmNuF3L71zzxAyJB7Lk37yBqjBRo2uafTAudFDLzsoRV5L.gif

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Hacking is not just a computer work:,-) some do it well with there mind. To be honest, I know people withdraw cold cash from the bank by transferring PayPal credit then they apply for dispute on PayPal. Since PayPal security before has a lot of loopholes, they used that to cash out money then money back.

Another, PayPal owner apply to become a seller then sell something online at very high price. Using there friends credit card to max it out online. It's instant then bank transfer takes three days. Once it transferred, the culprit will withdraw all the cash then ask his friends to apply for dispute in the bank.

I remember before, creating PayPal account is as easy as creating Facebook account. You can also use others people identity at ease.

Posted using Partiko Android

Nice story ^^

There are indeed a lot of ways to make money illegally