HACKER

HACKER
Er. Chhungpuia Renthlei
Senior Technical Officer
NIELIT Aizawl

Hacker chu Computer system emaw, network system emaw, website leh software hrang hrang security chiatna lai zawng chhuak a, mimal, sorkar leh organization system khawih ching pena file pawimawh tak tak ru chhuaktu te hi an ni. Hetiang pawikhawihna hi  hacking an vuah. 

I bank account leh Credit/Debit card an ru thei a, i pawisa an ruk sak vek thei che. I hmingin bank account an hawng thei bawk. Nangma hmingin online in thil an lei thei. Sorkar, oranization leh mimal data pawimawh an ru a, an hralh thin. File pawimawh an delete vek thei. Personal information pawimawh leh thlalak te an ru a, man to takin an khulhchhuah tir a, an khulh duhlo anih chuan midang hnena pek emaw, mualpho taka thehdarh ah an vau thin.

Hacker han tih hian misual vekah ilo ngai a ni mai thei, misual an ni vek lo a nia. A bikin white hat hackers ho phei hi chu sorkar, pawl leh mimal tan an tangkai em em a, cyber attacker lakah system venghimtu te an ni. Thil sual titu ber te chu black hat hackers kan tih ho hi an ni. Hacker hi chi hrang hrang an awm a, chung zingah chuan white hat hackers, black hat hackers leh gray hat hackers te hi a lar zual te an ni.

Hacker chi hrang hrang te:
1. White Hat Hackers:Thil tha tih nan chauhvin an thiamna an hmang. Ethical Hacker tiin an sawi bawk. Organization leh company te tan an thawk a, an system that lohna lai te an zirchianga, an siamtha thin. Criminal ten System tihchhiat an tum dan te an lo zir lawk vek a, hacker lakah an venghim thin.White hacker hnathawh lar tak chu penetration test hi a ni. Phalna nen thlap system chhiat lai an zawnga, an hack sak thin. Hetianga an hack theih chuan misual pawhin an hack thei dawn tihna a ni. White hacker te hi company lian tak tak google, facebook leh Windows te pawhin an system that lohna lai zawng chhuak a hack sak turin sum tam tak hlawhin an ruai thin. Duh tawka system an hack hnuah system that lohna lai te an siam that sak thin.

2. Black Hat Hackers: Heng ho hian pawisa duh vang leh thilsual tih nan hrim hrim a system hack thin tu te an ni. A then te chuan phuba lak nan te, sorkar tihbuai nan te leh politics lama in beih nan te an hack thin. A rukin system that lohna lai an zir chianga, hack theihna lai an hmuh ve leh an hack sak thin. Data pawimawh an ru a, system hnathawh tibuai thei malicious software an install a, organization leh company an chawk buai thin. Internet khawvel a misual (cybercriminals/ threat actors) kan tih te hi an ni.

Hacking technique chi hrang hrang an hmanga chung zingah chuan Distributed Denial-of-Service (DDoS) attacks te, Data breaches leh Malware te hi lar zual te an ni. DDoS attack ah hian Server tibuai khawpin request an thawn vak a, network traffic an ti jam a, server in hna athawk theilovin an siam a, network a buai vek thin. Data breaches ah hian System account password an tichhia a, a chhunga data pawimawh tak tak an ru a, hmun hrang hrangah hralh turin an thawndarh thin. System hnathawh tibuai thei malicious software an install bakah camera, microphone, wify e.t.c an control sak thin bawk.

3. Gray Hat Hackers:
 Heng ho hi white hat hackers leh black hat hackers inkarah an awm. An thiamna thil tha tih nan an hman mek laiin thilsual tih nana hmang pawh an awm tho bawk. Sorkar leh company ten an tih tir nilem lohvin system security that lohna lai an zawng a, pawisa hlawhin an report thin. A then te hacking avanga harsatna tawk an tanpui a, data an recover sak a, malware an thenfai sak thin.

4.Red hat hackers : Heng ho hian Cyber crime do let turin pawl leh mimal an pui thin. A bikin black hat hacker an bei let fo a, hacker data rukchhuah te mipui hmaah an tarlang thin. Cyber community tan an tangkai hle.

5. Green hat hackers :Heng ho hi chu hacking zirlai mek te an nia, an thiamna a la tlem a, zir belh zel turin an inbuatsaih mek. Hacker dang te angin an la thiam tak tak lo. Hacking that loh zia te an hria a, cyber community ah crimal bei lettu tangkai tak nih an tum thin.

6. Blue hat hackers :White hat hacker te nen an in ang hle. An thiamna a tha zawngin an hmanga Criminal laka inven nan Sorkar leh pawl system an thuam tha thin. Organization tam tak ten an system security that lohna lai zawng turin an chhawr a, system security that leh that loh finfiah nan pawisa hlawhin an hack tir thin.

7. Hacktivism: Heng ho hi a tlangpuiin politics thil avanga system hack tu te an ni. party hmalakna, khawtlang nun inthlak thlengah an ngaihdan ang lova thil kalpuitu te an chawkbuai thin. An tum ber chu phuba lak nan te, Politics inbeih nan te, Pawl,sorkar leh mimal hmalakna dodal nan te ani ber.Mimal leh group in an awm a, dik lo leh thalo ni a an hriat government agencies, multinational corporations leh organization system an beia, government-censored web pages leh system an hack sak a, chanchinbu mite hnenah a rukin document pawimawh tak tak an pe ru thin.Website lem an siam nasa hle bawk. Thenkhat tan chuan thil tha tak ti thinah ngaih theih mahse, dan kalha an chet avang leh data an rukchhuah thin avangin Data Protection Act 2018 hnuaiah chuan crimal a ngaih an ni.

8. Script Kiddies: Heng ho hian technical knowledge thuk tak an hre lemlo a, hacking tools hrang hrang awmsa hmangin system an khawihbuai thin. An rilru a an chak ang zawng tihhlawhtlin nan leh midang laka intihtheih nan hacking hi an ti thin bawk. Kum 2000 daih tawh khan virus chikhat “I LOVE YOU” worm an tih mai chu email hmangin an thehdarh chiam a, password tam tak an ru a, file tam tak an delete bawk.

Engtinnge hacker ten an hack thin?
System leh network hack tur hian hmanraw tha neih  leh computer programming thiam tak nih ngai a, hna hautak leh khirh tak a ni. Phase hrang hrang a awm.

1. Footprinting: Hei hi hacking hna hmasa ber a ni. An hack tur system leh network information atam thei ang ber an lakhawma, Dan naranin Network, host leh a hmangtu te data an lakhawm thin. Chi hnih a awm. An system hack tur te direct in an khawih a, Information an la chhuak a, hei hi Active footprinting an vuah. Tin, direct a system khawih lovin social media, public websites leh hmun dang atangin information an lakhawm thung bawk. Hei hi Passive footprinting an vuah

2.Scanning: An hack tur target chhiatna lai an zawng a, data pawimawh user accounts, credentials, IP addresses, etc. te an zawng chhuak a. Scanning hi chi thum a awm a. Port scanning: Network host a open ports, live systems service leh services hrang hrang an lakhawm a.Vulnerability scanning: An hack tur security that lohna lai leh tihchhiat awlsamna lai an zawng chhuak a, heng atang te hian hmanraw hrang hrang Netsparker, OpenVAS, Nmap e.t.c hmangin system tihchhiat an tum a. Network scanning: An hack tur target firewall, routers, networks leh network hmanraw hrang hrang an lakhawm thin

3. Gaining Access: Duhthusam information an lakkhawm hnuah hack dan tur ruahmanna(blueprint) leh network map an siam a. Hacking hrang hrang Phishing attacks, Brute force attack, Spoofing attack, Man in the middle attack, Dos attack, Session hijacking leh Buffer overflow attacks hmangin system chu an hack ta a.Network, programs, system leh access permissions zawng zawng an ruchhuak thin bawk.

4. Maintaining Access: An duh ang an neih hnuah an duh hun huna system khawih chhiat nan an dah tha a. An duh ang thlapa network khawih chhe turin an target system chu an hack char char thin.

5. Clearing Tracks: He phase ah hian security team ten an chhui chhuah theih loh nan an sulhnu an tireh vek a. Cache file, cookies leh log files an delete vek a, registries an thlak a, hack nana an folder leh software an install te an paih leh vek a, Open ports zawng zawng an khar vek bawk.

Hacker hremna:
India sorkar dan hmanga hacking kaihhnawih hremna hrang hrang te han tarlang ila. Tin, a hnuaia Jail tan chhung leh pawisa chawitur zat tarlan te hi an pawi khawih nasat dan a zira tih danglam theih a ni.

IT Act (2000):
Hacking (Section 65): Kum3 thleng jail tan leh ₹200,000 thleng chawi
Cyber theft (Section 66): Kum 3 thleng jail tan leh ₹200,000 thleng chawi
Identity theft (Section 66C): Kum 3 thleng jail tan leh ₹200,000 thleng chawi
Sending malicious code (Section 67): Kum 3 thleng jail tan leh ₹200,000 thleng chawi
Cyber terrorism (Section 66F): Kum 7 thleng jail tan leh ₹1 million thleng chawi

Bharatiya Nyaya Sanhita (BNS) / Indian Penal Code (IPC)
Criminal trespass (Section 441): Kum 3 thleng jail tan leh pawisa chawi 
Housebreaking (Section 445): Kum 7 thleng jail tan leh pawisa chawi 
Theft (Section 378): Kum 3 thleng jail tan leh pawisa chawi 
Criminal intimidation (Section 506):Kum 7 thleng jail tan leh pawisa chawi 

Bharatiya Nagarik Suraksha Sanhita (BNSS) / Indian Criminal Procedure Code (CrPC)
Hacking and cybercrime investigation and punishment (Section 156): Kum 3 thleng jail tan leh pawisa chawi 

Bharatiya Sakshya Adhiniyam (BSA) / Indian Evidence Act (IEA)
Electronic evidence and digital signatures (Section 65A): Kum 2 thleng jail tan leh pawisa chawi 

Disaster Management Act (2005)
Cyber attacks on critical infrastructure (Section 51): Kum 10 thleng jail tan leh ₹1 million thleng chawi

Unlawful Activities Prevention Act (UAPA)
Cyber terrorism and hacking (Section 16): Kum 7 thleng jail tan leh ₹1 million thleng chawi

Hacker laka invenhim dan:
Strong Password hman tur a ni. Account login nan Multi-Factor Authentication (MFA) hman tur. A awmzia chu account kan login dawnin direct a lut nghal mai lovin, keimahni kan ni ngei tih verify nan Mobile phone ah SMS text codes, authenticator apps leh hardware security keys a rawn lang ang. Criminal ten kan password an lo hria anih pawhin MFA hian min venghim thei. Software siamtu te hian security hi an update ve reng thin a, heivang hian software update fo a tha. 
 


Post a Comment

0 Comments