International Journal of Scientific and Research Publications, Volume 5, Issue 6, June 2015
ISSN 2250-3153
----- It provides security to the system and network.
----- It helps to exposes the true risk causing to the system or
network.
VIII. ETHICAL HACKING PROCESS
Ethical hacking needs advance planning strategic and
tactical issues in the ethical hacking process should be
determined , planning is important for testing.
For example: - from a simple password cracking to all out
penetration test on a web application. Approval of plan for
ethical hacking is essential for the process of hacking.
Sponsorship of the project is the most important step for
ethical hacking process because one needs someone to protect
the plan , otherwise testing can be unexpectedly called off.
A well define plan includes the following information:-
----- System to be tested
----- Risks that are involved
----- When the tests are performed and your overall timeline
-----how the tests are performed
-----how much knowledge of the systems you have before
you start testing
-----what is done when a major threat is discovered.
IX. EVENT&TIMELINE
1878 Teenage boys mischievously misdirect and disconnect
telephone calls at Bell Telephone Company
1960 The term “hacker” is used by MIT train enthusiasts
who hacked their train sets to change how they work. Later, these
same enthusiasts emerge as the first computer hackers
1968 Dennis Ritchie and Keith Thompson develop the
UNIX operating system, possibly the most elegant hack of all
time 1969 The Advanced Research Projects Agency (ARPA)
launches the first four nodes of ARPANET (the system that
eventually morphs into the Internet) at UCLA, Santa Barbara,
University of Utah, and Stanford
1970 Phreakers, another type of hacker, exploits the newly
all-electronic telephone network to make free long distance calls
1971 Ray Tomlinson writes the first email program and uses it
on ARPANET (now at 64 nodes)
1975 Bill Gates and Paul Allen form Microsoft
1976 Stephen Wozniak, Steve Jobs, and Ron Wayne form
Apple Computer
1978 Randy Seuss and Ward Christiansen create first
personal computer bulletin board system, still in operation today
1980 Usenet is created by networking UNIX machines via
telephone
1981 Ian Murphy is the first hacker tried and convicted as a
felon
1983 ARPANET splits into military and civilian sectors; the
civilian sector later evolves into the present-day Internet The film
War Games popularizes hacking Richard Stallman makes the
first GNU announcement via Usenet
1984 William Gibson coins the term “cyberspace” in his
novel Necromancer, the first hacking-related novel The most
famous hacker group, Legion of Doom, is formed Steven Levy
2
publishes Hackers: Heroes of the Computer Revolution, which
summarizes the hacker credo of “freedom of technology”
ARPANET 1969 Phreaker John Draper in 1970s The film
War Games released in 1983 Gibson’s Necromancer published
1984 .
1986 The US Congress passes the Computer Fraud and
Abuse Act, the
first hacking-related legislation A small accounting error alerts
astronomer and computer manager Cliff Stoll to the presence of
hackers using his computer system; a year-long investigation
results in the arrests of five German hackers, and Stoll later
recounts the events in his book, The Cuckoo’s Egg: Tracking a
Spy Through the Maze of Computer Espionage
1988 Robert T. Morris, Jr. launches the first self-replicating
worm on the government’s ARPANET to test its effect on UNIX
systems; he is the first person to be convicted under the
Computer Fraud Act of 1986 Stoll publishes his account of
tracking a hacker across multiple computer systems and countries
1989 Herbert Zinn is the first juvenile convicted under the
Computer Fraud Act 1990 The Electronic Frontier Foundation is
formed, in part to defend the rights of those investigated for
hacking The United States Secret Service and the Arizona
Organized Crime and Racketeering Bureau implement Operation
Sun Devil, a twelve city multi-state crackdown and the largest
hacker raid to date Electronic Frontier Foundation founded 1990
1991 The federal ban barring business from the Internet is lifted
Justin Petersen, arrested three months earlier for hacking, is
released from prison to help the FBI track hacker Kevin Mitnick
Linus Torvalds publicly releases Linux version 0.01
1992 Mark Abene (aka "Phiber Optik") and other members
of the Masters of Deception, a gang of phreakers, are arrested
from evidence obtained from wiretaps. Mark Abene of Masters
of Deception arrested 1992
1995 Kevin Mitnick, probably the world’s most prolific and
best known hacker, is arrested and charged with obtaining
unauthorized access to computers belonging to numerous
computer software and computer operating systems
manufacturers, cellular telephone manufacturers, Internet Service
Providers, and educational institutions; and stealing, copying,
and misappropriating proprietary computer software from
Motorola, Fujitsu, Nokia, Sun, Novell, and NEC. Mitnick was
also in possession of 20,000 credit card numbers. Christopher
Pile is the first person jailed for writing and distributing a
computer virus. Mitnick’s Wanted Poster
1997 AOHell, a freeware application that allows script
kiddies to wreak havoc on AOL, is released 1998 Two hackers,
Hao Jinglong and Hao Jingwen (twin brothers) are sentenced to
death by a court in China for stealing ~$87,000 from a bank in
China; Hau Jingwen’s sentence was upheld, while Hao Jinglong
was acquitted in return for further testimony 1999 Napster begins
to gain popularity; created by Shawn Fanning and Sean Parker
(ages 19 and 20 at the time), Napster attracts 65 million
registered users before being shut down in July of 2001.
How To Completely Clean Your Hacked Word Press
Installation
Getting hacked sucks, plain and simple. It can affect your
rankings, cause your readership to be exposed to virus and
Trojan attacks, make you an unwilling promoter to subject
material you may not actually endorse, and in many cases cause
www.ijsrp.org