Articles Ethical Hacking | Page 2

International Journal of Scientific and Research Publications, Volume 5, Issue 6, June 2015 ISSN 2250-3153 ----- It provides security to the system and network. ----- It helps to exposes the true risk causing to the system or network. VIII. ETHICAL HACKING PROCESS Ethical hacking needs advance planning strategic and tactical issues in the ethical hacking process should be determined , planning is important for testing. For example: - from a simple password cracking to all out penetration test on a web application. Approval of plan for ethical hacking is essential for the process of hacking. Sponsorship of the project is the most important step for ethical hacking process because one needs someone to protect the plan , otherwise testing can be unexpectedly called off. A well define plan includes the following information:- ----- System to be tested ----- Risks that are involved ----- When the tests are performed and your overall timeline -----how the tests are performed -----how much knowledge of the systems you have before you start testing -----what is done when a major threat is discovered. IX. EVENT&TIMELINE 1878 Teenage boys mischievously misdirect and disconnect telephone calls at Bell Telephone Company 1960 The term “hacker” is used by MIT train enthusiasts who hacked their train sets to change how they work. Later, these same enthusiasts emerge as the first computer hackers 1968 Dennis Ritchie and Keith Thompson develop the UNIX operating system, possibly the most elegant hack of all time 1969 The Advanced Research Projects Agency (ARPA) launches the first four nodes of ARPANET (the system that eventually morphs into the Internet) at UCLA, Santa Barbara, University of Utah, and Stanford 1970 Phreakers, another type of hacker, exploits the newly all-electronic telephone network to make free long distance calls 1971 Ray Tomlinson writes the first email program and uses it on ARPANET (now at 64 nodes) 1975 Bill Gates and Paul Allen form Microsoft 1976 Stephen Wozniak, Steve Jobs, and Ron Wayne form Apple Computer 1978 Randy Seuss and Ward Christiansen create first personal computer bulletin board system, still in operation today 1980 Usenet is created by networking UNIX machines via telephone 1981 Ian Murphy is the first hacker tried and convicted as a felon 1983 ARPANET splits into military and civilian sectors; the civilian sector later evolves into the present-day Internet The film War Games popularizes hacking Richard Stallman makes the first GNU announcement via Usenet 1984 William Gibson coins the term “cyberspace” in his novel Necromancer, the first hacking-related novel The most famous hacker group, Legion of Doom, is formed Steven Levy 2 publishes Hackers: Heroes of the Computer Revolution, which summarizes the hacker credo of “freedom of technology” ARPANET 1969 Phreaker John Draper in 1970s The film War Games released in 1983 Gibson’s Necromancer published 1984 . 1986 The US Congress passes the Computer Fraud and Abuse Act, the first hacking-related legislation A small accounting error alerts astronomer and computer manager Cliff Stoll to the presence of hackers using his computer system; a year-long investigation results in the arrests of five German hackers, and Stoll later recounts the events in his book, The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage 1988 Robert T. Morris, Jr. launches the first self-replicating worm on the government’s ARPANET to test its effect on UNIX systems; he is the first person to be convicted under the Computer Fraud Act of 1986 Stoll publishes his account of tracking a hacker across multiple computer systems and countries 1989 Herbert Zinn is the first juvenile convicted under the Computer Fraud Act 1990 The Electronic Frontier Foundation is formed, in part to defend the rights of those investigated for hacking The United States Secret Service and the Arizona Organized Crime and Racketeering Bureau implement Operation Sun Devil, a twelve city multi-state crackdown and the largest hacker raid to date Electronic Frontier Foundation founded 1990 1991 The federal ban barring business from the Internet is lifted Justin Petersen, arrested three months earlier for hacking, is released from prison to help the FBI track hacker Kevin Mitnick Linus Torvalds publicly releases Linux version 0.01 1992 Mark Abene (aka "Phiber Optik") and other members of the Masters of Deception, a gang of phreakers, are arrested from evidence obtained from wiretaps. Mark Abene of Masters of Deception arrested 1992 1995 Kevin Mitnick, probably the world’s most prolific and best known hacker, is arrested and charged with obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, Internet Service Providers, and educational institutions; and stealing, copying, and misappropriating proprietary computer software from Motorola, Fujitsu, Nokia, Sun, Novell, and NEC. Mitnick was also in possession of 20,000 credit card numbers. Christopher Pile is the first person jailed for writing and distributing a computer virus. Mitnick’s Wanted Poster 1997 AOHell, a freeware application that allows script kiddies to wreak havoc on AOL, is released 1998 Two hackers, Hao Jinglong and Hao Jingwen (twin brothers) are sentenced to death by a court in China for stealing ~$87,000 from a bank in China; Hau Jingwen’s sentence was upheld, while Hao Jinglong was acquitted in return for further testimony 1999 Napster begins to gain popularity; created by Shawn Fanning and Sean Parker (ages 19 and 20 at the time), Napster attracts 65 million registered users before being shut down in July of 2001. How To Completely Clean Your Hacked Word Press Installation Getting hacked sucks, plain and simple. It can affect your rankings, cause your readership to be exposed to virus and Trojan attacks, make you an unwilling promoter to subject material you may not actually endorse, and in many cases cause www.ijsrp.org