An Introduction to Hacking and Cyber Security - Complete Guide

Introduction to hacking guide shows you the tools used, what hackers look for and how to protect yourself from vulnerabilities and exploits.

By Tim Trott | Privacy & Security | July 10, 2013
1,042 words, estimated reading time 4 minutes.
Internet Security 101

This article is part of a series of articles. Please use the links below to navigate between the articles.

  1. An Introduction to Hacking and Cyber Security - Complete Guide
  2. An Introduction and Brief History of Cryptography and Codebreaking
  3. Online Privacy and Why it Matters in Today's Hyper-Connected World
  4. What Are Supercookies? The Web's Latest Tracking Device
  5. How to Spot Scam and Phishing Emails And Avoid Being Scammed
  6. How Internet Security and SSL Works to Secure the Internet
  7. What is Man in the Middle Hacking and Transport Layer Protection
  8. What is Social Engineering And How Is It Used To Hack Systems
  9. Cookie Security and Session Hijacking in Web Applications
  10. What is Cross Site Scripting? (XSS) How is it Used to Attack Websites
  11. What is Internal Implementation Disclosure?
  12. What is Parameter Tampering and How to Protect Against It
  13. What is SQL injection - With Examples & Prevention

This hacking and security tutorial series aims to provide application developers with the knowledge of how exploits in their code can be used against the application and how a simple validation error can cause a data breach.

A Brief History of Hacking

The term hacking dates back to the early 1950s when it was a positive label given to a group of students at MIT who came up with some ingenious campus pranks. The pranks started way back in 1926 when a group of students "parked" a car on the wall of the dormitory building. The term hacker was coined in the early 1950s when MIT computer gurus started to push computer systems beyond the defined limits. They would often find and exploit security holes in computer systems based purely on curiosity. The curiosity of what the system did, how the system could be used, how the system did what did, and why it did what it did.

In 1926, a group of MIT students decided it would be a good idea to hoist an actual car up the side of a building - the Class of 1893 Dormitory
In 1926, a group of MIT students decided it would be a good idea to hoist an actual car up the side of a building - the Class of 1893 Dormitory 

Over time, these exploits were used for more sinister purposes, and hacking became a bad thing. Personal, confidential and money were stolen from computer systems and hackers were labelled the enemy.

There are two main categories of hackers, white hat and black hat.

  • White hat hackers, so-called ethical hackers, attempt to breach security but don't perform any malicious acts. Instead, they report their findings so that their vulnerability may be fixed and a reward is given.
  • Black hat hackers hack systems maliciously, either to deface a website, steal data or cause damage, physically, financially or through loss of reputation.

Introduction to Hacking and Ethical Hacking

The tools and techniques presented here are not languages or platform-specific, it does not matter if you are writing a PHP application, ASP.Net Forms or MVC, nor if you use IIS, Apache, nginx or any other server technology. The practices are the same regardless.

There are several approaches hackers use to compromise a system. These are called attack vectors and the one chosen depends on the system being targeted and where the hacker feels the weakest link is. Some common attack vectors include -

We'll take a look at each of these in the upcoming Introduction to Hacking and Cyber Security course.

Tools Involved in Basic Ethical Hacking

It may surprise you to learn that all you need to hack a website is Google Chrome, Firefox or IE with developer tools and Fiddler , the free web debugging proxy. There are other tools which offer more automated, or brute force attempts, but the techniques are just as valid so I'll show you how Chromes developer tools combined with Fiddler can be used to identify risks and secure your website.

Google Chrome

Google Chrome is my web browser of choice. Not only is it the fastest and lightest browser on the market, but it also features several really useful developer options out of the box. Additionally, there is a large marketplace for third-party plugins which further extend this functionality. Firefox is also a good browser and offers just as good developer tools and plugins, however, I found over recent releases it was getting a bit bloated and slow. Although I use Google Chrome and Chrome Developer Tools in this article, the process is the same for using Firefox tools.

Pro Tip: Using Chromes "Incognito" mode is very handy as it automatically clears down all the cookies, cache and history information when the tab is closed. This means that when you open it up again, you are working with a fresh version of the site. All the history is gone.

Google Chrome Developer Tools

Developer Tools are accessed using the F12 key. This will open up a new window (or a docked panel). There is a lot of stuff that goes on in the developer tools, but for this tutorial, we are going to focus on Elements, Networks and Resources.

Chrome Developer Tools
Chrome Developer Tools

The Elements tab breaks down the DOM (Document Object Model) and allows you to drill down into the HTML markup. You can also access the elements quickly by right-clicking on the web page and selecting "Inspect Element" from the context menu. In the Elements tab, you can directly manipulate the DOM and add or remove elements, attributes or values.

The Network tab allows you to view the network activity for the page. It lists all the requests to the server, the files downloaded, timings for each request and status codes.

Finally, the resource tab shows things like images, CSS and fonts used, cookies for the page and anything that uses local storage. We can use this when we work with cookies later on.

For this tutorial, there is a Chrome plugin that we are going to use. It's called Cookie Inspector and available on the Chrome web store . There are other plugins available, however, I like this one because it integrates well with the developer tools. Cookie inspector will allow us to manipulate cookies set by a website and allow us to change the values before they are sent back to the website.

Fiddler

The other application we are going to be using is Fiddler. This application is a free HTTP debugging proxy, which means it captures HTTP traffic to and from your computer and a server. It allows you to inspect and analyse these captured requests and responses, look at the headers, any form data submitted and the body content. You can also compose your own HTTP requests and analyse the results from the server.

Fiddler Debugging Proxy
Fiddler Debugging Proxy

In the next part of this series we will take a look at cryptography, the process of securing communications.

Was this article helpful to you?
 

Related ArticlesThese articles may also be of interest to you

CommentsShare your thoughts in the comments below

If you enjoyed reading this article, or it helped you in some way, all I ask in return is you leave a comment below or share this page with your friends. Thank you.

There are no comments yet. Why not get the discussion started?

We respect your privacy, and will not make your email public. Learn how your comment data is processed.