Lesson Companion: The Art of the Hack
How Hackers Break In โ and What We Can Learn From Them
๐ Use this guide to take notes, answer key questions, and reflect as you follow todayโs presentation and lab.
๐ฏ What I Will Learn Today
- The six stages of a real-world cyberattack
- How hackers think and what tools they use
- The difference between ethical and malicious hacking
- How to analyze websites for common security weaknesses
- Why itโs important to defend systems before they are attacked
๐ Notes by Topic
๐ง What Is Hacking?
Hacking originally meant:
๐ _______________________________________________________
Today, it often refers to:
๐ _______________________________________________________
Types of hackers:
Type | Description |
---|---|
White Hat | ________________________________________ |
Black Hat | ________________________________________ |
Gray Hat | ________________________________________ |
๐ The Hackerโs Mindset
Hackers donโt try to break whatโs strong โ they look for whatโs:
๐ _______________________________________________________
They rely on:
- Logic and observation
- Weak security or human mistakes
- Tools that are easy to find online
๐ The 6-Stage Attack Chain
Stage | What Happens |
---|---|
1. Reconnaissance | _________________________________ |
2. Scanning | _________________________________ |
3. Access | _________________________________ |
4. Payload | _________________________________ |
5. Escalation | _________________________________ |
6. Exfiltration | _________________________________ |
๐งฐ Hacker Toolkit
Tools often used by attackers:
- Port scanners (e.g. Nmap)
- Password crackers (e.g. Hydra)
- Keyloggers
- Malware generators
- Social engineering kits
๐ Write one tool you learned about and what it does:
๐ Real-World Examples
Case 1: A student hacked the school gradebook
๐ What was the weak point? _____________________________
Case 2: Ransomware attack on a hospital
๐ How did it start? ____________________________________
๐ What was the damage? _______________________________
๐ Practice: Spot the Flaws
What are some common flaws hackers look for?
โ Weak passwords
โ Public data online
โ Open ports
โ Users who click links without checking
๐ Add one more weakness you learned about:
๐งช Lab Activity: โFind the Weak Linkโ
Goal: Use browser tools to inspect a challenge website and simulate a hackerโs early steps.
During the lab, I will:
โ Open Developer Tools (Inspect Element)
โ View HTML and JavaScript
โ Look for hidden fields, weak code, or exposed credentials
โ Try modifying inputs or checking script logic
โ Analyze how a real hacker might exploit this
๐ฌ Lab Reflection
๐ What was the most interesting thing you found?
๐ What made the site vulnerable?
๐ How could a developer fix it?
๐ก๏ธ Cyber Ethics
What makes a hacker ethical?
- Always has _________________________
- Works to ___________________________
- Never uses skills to ________________
โ Cyber Rangers use knowledge to protect โ not to harm.
๐ก Final Reflection
- What did you learn about how real hackers work?
๐ _____________________________________________________ - How does knowing this help you be a better defender?
๐ _____________________________________________________ - What will you look out for in your own digital life?
๐ _____________________________________________________