Analysis of increasing hacking and cracking techniques

Authors: Bilal Ahmad Kamal
Affiliation: Evergreen Public High school / University of Sargodha


Keywords: cracking, hacking, techniques
ABSTRACT. In this work, the explanation is about how the computer’s containing valuable information is being unsecured and the techniques to make it secure. This technique contains information on the tools and skills a hacker uses to infiltrate computer systems and networks. This work proposes the study of hacking; as the cost of hacking attacks continues to rise, many of the businesses have been forced to increase spending on network security. However, hackers have also developed new skills and techniques that allow them to break more complex systems. Hacking involves compromising the security of networks, breaking the security of application software’s or creating malicious program such as viruses, threats, logic bombs, worms, etc[1]. This work describes the various techniques of hacking and cracking, also how they work. I proposed that the term "hacking and cracking" historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks


Hacking: The Basics,Zachary WilsonApril 4, 2001Updated by Martin Poulin, GSEC, GCWN, GCIH, CISSPJune 27, 2006
The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, Special Issue: The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSE’13], San Francisco State University, CA, U.S.A., March 2013 Doi: 10.7321/jscse.v3.n3.74 e-ISSN: 2251-7545
Analysis of Increasing Malwares and Cyber Crimes Using Economic Approach
2010 International Journal of Computer Applications (0975 – 8887) Volume 1 – No. 10,Ethical Hacking Procedure Certified Ethical Hacking Ethical Hacking : Future
All Types Of Hacking Techniques,
Stevens, W. Richard. TCP/IP Illustrated Volume I: The Protocols. Boston, Mass. : Addison-Wesley, 2004
Wright G.R., Stevens, W. R. TCP/IP Illustrated Volume II: The Implementation. Boston, Mass. : Addison-Wesley, 1995
Comer, Douglas E. Internetworking with TCP/IP Volume I: Principles, Protocols and Architecture. Upper Saddle River, New Jersey. : Prentice Hall, 1995
Practical Hacking Techniques and Countermeasures by Mark D. Spivey, CISSP
Is Ethical Hacking Ethical?,Danish Jamil et al. / International Journal of Engineering Science and Technology (IJEST)
Teaching ethical hacking in information security curriculum: A case study,Global Engineering Education Conference (EDUCON), 2013 IEEE,13-15 March 2013