Hacking Introduction Lab


Q1. Write about all the phases of Ethical Hacking?

Q2. Top 10 hacker's list 

  1. Categories White hat or Black hat
  2. Works they done
  3. Charges on them if any
  4. Role of their information technology

Q3. Watch movie internet own boy Link->https://www.youtube.com/watch?v=gpvcc9C8SbM
and answer following w.r.t Aaron!

  1. Right doing
  2. Wrong doing
  3. Charges on him

Q4. Explain following with Example w.r.t Security

  1. Risk 
  2. Threat
  3. Vulnerability
  4. Penetration Testing
  5. Exploit.
  6. Hack Value
  7. '0'oh Day Attack
  8. Types of  Testings

Q5. Find and list most famous hacks in last five years.

Q6.  Who’s more dangerous to an organization, insiders or outsiders & Explain Why?

Q7. You just stepped on to the elevator with your CEO. They ask you, how secure are we? What do you say?


  1. 1st is RECONNAISSAN
    2nd is SCANING
    5th is CLEANING

  2. Answer 1
    Means gathering information as much as possible

    2. SCANING
    Asking him directly

    Doing work for him

    Maintaining a connection with him

    He never knows who you r

    Answer 2
    1. Gary McKinnon

    He started hacking just for curiosity for finding for ufo and for the best he Hacked nasa files and delete some of them and put the notice on their web that their security is a crap and hack 2000 Washington computers for 24 hours.

    2. LulzSec
    It is a black hat hacker group and hacked sony News International, CIA, FBI, Scotland Yard, and several noteworthy accounts and telling the people how less they know about security from hackers .
    3 .Adrian Lamo
    He hacked yahoo,google ,Microsoft and new York times and some
    Government documents .
    4. Mathew Bevan and Richard Pryce
    hacked us computers and try to trigger a major issue between us and north koria about atomic research.

    5. Jonathan James
    He is young 16 years old steal software from nasa had to pay 41000 $
    For his pocket also known as c0mrade and died in 2008.
    6. Kevin Poulsen
    Also known as Dark dante hack radio show to win a Porsche and
    Pressed guilty by FBI for many fords and after he became
    Senior Editor at Wired.
    7. Kevin Mitnick
    Hacked nokia ,motarola ,pentagon etc frauds and was the most wanted hacker of us and was put in jail for 5 years his hacked was shown in the films like Takedown and Freedom Downtown.

    8 . Anonymous
    The Vatican, the FBI, the CIA, PayPal, Sony, Mastercard, Visa, Chinese, Israeli, Tunisian, and Ugandan governments have been amongst their targets. Although, Anons have been arguing whether to engage in a serious activism or a mere entertainment, many of the group members have clarified their intent which is to attack internet censorship and control.
    9. Astra
    Astra, a Sanskrit word for weapon was the penname of a hacker who dealt in the weapon stealing and selling. A 58-year-old Greek Mathematician hacked into the systems of France’s Dassault Group, stole vulnerable weapons technology data and sold it to different countries for five long years. While the real identity of the ASTRA remains untraced, officials have said that he had been wanted since 2002. Astra sold the data to approximately 250 people from around the globe, which cost Dassault $360 millions of damage.
    10. Albert Gonzalez
    How safe is internet banking? When we browse through the profile of this mastermind, we are certain that one ought to use the World Wide Web with immense care. For two long years, Albert Gonzalez, stole from credit cards of the netizens. This was recorded to be the biggest credit card theft in the history of mankind. He resold approximately 170 million credit cards and ATM numbers. He did so by installing a sniffer and sniffing out the computer data from internal corporate networks. When arrested, Gonzalez was sentenced to 20 years in Federal prison.
    White hack
    Hacking done by the permission of the owner of the system or website .
    Work they do
    Providing safety , solving future problems ,etc.

    Black hack
    Hacking done without the permission of the system or web site owner.
    Work they do
    Stealing data ,personal information, and implanting bugs and virus