Hacking for kids An ethical approach to cyber attacks and defense

Bryson Payne

Book - 2020

""A hands-on introduction to hacking and cyber self-defense for beginners. Shares how malicious hackers steal passwords, hack into devices, and gather information via social media. Teaches how to secure accounts and devices, and set up a virtual hacking lab to safely practice hacking and defend real-world systems"-Provided by publisher"--

Saved in:
1 copy ordered
Contents unavailable.

INTRODUCTION Hacking is doing something new or unexpected with a tool that already exists. Think of "life hacks" like using dental floss to cleanly cut a slice of cake or reusing an empty breath mint container to store paper clips. For as long as humans have been on this planet, we've been coming up with new tools and new uses for the things we find around us. Computer hacking is similar. We do new and unexpected things with computer technology all the time. We can hack two programs that weren't meant to work together by writing a simple app that translates files from one program's format to the other's. We can hack a web browser or spreadsheet program to play a game. Or, if you're not careful, someone can hack your computer by emailing you a virus that gives them access to your files, your passwords, or even your webcam. Computer Hacking Basics In this book, you'll learn how to defend yourself and others from cyberattacks by performing hacks safely in a virtual lab that you'll create. By using the same tools and techniques that hackers use, you'll understand the kinds of online threats you need to defend against. Computer hacking is like a martial art--you'll learn not only how to punch and kick but also how to block punches and kicks. Hackers come in many forms, but because the word hacker has been misused so much, we'll refer to ourselves as ethical hackers in this book--to make it clear that we'll be using our hacking skills only for ethical, legal purposes. I'll use the term attacker when referring to someone who uses hacking techniques illegally or unethically. What Is Ethical Hacking? Ethics are the morals that guide our behavior. They determine whether our actions are right or wrong. Ethical hacking is using an attacker's tools and techniques to test a computer system for weaknesses, with the full permission of the system's owner. The goal of an ethical hacker is to find opportunities to improve the system's security. Removing and addressing weaknesses to make a system less vulnerable to attack is known as hardening the system. An ethical hacker is also called a white hat hacker, named after the good guys in old American TV westerns, who usually wore white hats (like the Lone Ranger). A black hat hacker is someone who uses cyberattacks unethically, whether for financial gain, vandalism, or other self-serving reasons. To make this clearer, let's look at an example. Examples of Ethical and Unethical Hacking Let's say you find a key on the sidewalk. Simply finding the key isn't unethical. In fact, if you walked up to the nearest home, knocked, and asked the homeowner if the key was theirs, that would be completely ethical. A white hat would ask if the homeowner had accidentally dropped the key. On the other hand, if you pick up the key and start trying it in doors up and down the street, you're acting like a black hat, because you don't have the owner's permission to use the key or enter their home. As you go through this book, you'll discover lots of "keys" out in the open, like the username and password to a security camera at a local grocery store. Simply finding the default username and password in an online manual isn't unethical. Telling the store manager that the security camera is accessible online isn't unethical. But if you use the username and password to view video from the camera, that's unethical, because you don't have authorization (or permission) from the store manager. Accessing someone else's computer or device without their permission is unethical and usually illegal, just as going into someone's house without permission is trespassing, even if they leave the door open or drop the key on the sidewalk. Keep in mind that people will use your actions to judge whether your behavior is ethical. Hack like a white hat hacker and use the skills you learn in this book for good, not evil. How This Book Is Organized Every chapter in this book shows you both how to attack and how to defend against attacks. And every chapter builds your skill level as an ethical hacker. The first two chapters contain hacks you can perform hands-on, right away, without any tools other than a computer and web browser. In Chapter 1, you'll begin by hacking a saved web browser password. Attackers are after your passwords because if they can steal your login information, they can steal personal data or money from your accounts. In Chapter 2, you'll learn how hackers use simple tools like search engines to gather information about a person or company they're protecting or attacking. You'll also learn how to protect yourself from internet predators who use social media to spy on potential victims. In Chapter 3, you'll find out how to safely hack into an old Windows laptop or computer to recover files you thought were lost. In Chapters 4 and 5, you'll build a safe, virtual hacking lab environment on your own computer. This will let you practice the advanced hacks you'll learn in later chapters without putting your computer--or yourself--in harm's way. In Chapter 6, you'll learn firsthand how attackers trick you into giving up your username and password as you build your own phishing email and spoofed website. In Chapter 7, you'll find out how hackers access internet-enabled devices in your home and even hack a (simulated) car! In Chapters 8 and 9, you'll see how attackers use virus-infected files to take over computers remotely across the internet. You'll create an actual virus and hack a Windows computer in your safe, virtual hacking lab. In Chapters 10 and 11, you'll see how black hat hackers can steal dozens of passwords from every user on a Windows computer, and you'll learn how to make your own passwords safer. In Chapter 12, you'll discover how to attack and defend web applications, which can reveal information about thousands or millions of users if maliciously hacked. In Chapters 13 and 14, you'll see how a black hat hacker can take control of your smartphone by creating a mobile app to steal your private information, including text messages and photos. Finally, in Chapter 15, we'll wrap up with 10 things you can do right now to protect yourself online, summarizing the most important tricks and tips from throughout the book. A few simple self-defense steps can prevent most online attacks from succeeding. Basics of Cyber Self-Defense As you explore the hacks in the chapters ahead, you'll learn more about the core behaviors white hat hackers use to protect computer systems. Good cyber self-defense starts with understanding the dangers from cyberpredators and online attackers. The next step is learning how to avoid being an easy target. With more practice, you'll be able to protect yourself and others from even highly sophisticated real-world attacks. You can go from potential cybervictim to cyberhero just by making a few key changes in the way you use your computer and other devices. Let's get started! Excerpted from Hacking for Kids: An Ethical Approach to Cyber Attacks and Defense by Bryson Payne All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher.