Overview of Ethical Hacking

Overview of Ethical Hacking
Techiio-author
Written by Sagar RabidasDecember 6, 2021
7 min read
Ethical-Hacking
0 VIEWS 0 LIKES 0 DISLIKES SHARE
0 LIKES 0 DISLIKES 0 VIEWS SHARE
Techiio-author
Sagar Rabidas

Software Developer

Today, we will discuss Ethical Hacking.

About Hacking:-

Hacking has been part of computing for nearly 5 a long time and it's far a totally wide field, which covers a wide variety of topics. The first acknowledged occasion of hacking had taken place in 1960 at MIT and at the identical time, the term "hacker" changed into originated.

Hacking is the act of finding the feasible entry points that exist in a pc device or a laptop community and eventually entering into them. Hacking is normally accomplished to benefit unauthorized get right of entry to to a laptop machine or a laptop network, either to harm the systems or to scouse borrow touchy facts available on the laptop.

Hacking is generally prison so long as it is being finished to discover weaknesses in a computer or community device for trying out functions. This type of hacking is what we name moral hacking.

A laptop expert who does the act of hacking is known as a "hacker". Hackers are folks who search for understanding, recognize how structures function, how they are designed, and then attempt to play with those structures.

blogpost

Types of Hacking:-

We can segregate hacking into different categories, based on what is being hacked. Here is a set of examples −

Website Hacking− Hacking a website means taking unauthorized control over a web server and its associated software such as databases and other interfaces.

Network Hacking− Hacking a network means gathering information about a network by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation.

Email Hacking− It includes getting unauthorized access to an email account and using it without taking the consent of its owner.

Ethical Hacking− Ethical hacking involves finding weaknesses in a computer or network system for testing purposes and finally getting them fixed.

Password Hacking− This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.

Computer Hacking− This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system.

Advantages of Hacking:-

Hacking is quite useful in the following scenarios −

  • To recover lost information, especially in case you lost your password.
  • To perform penetration testing to strengthen computer and network security.
  • To put adequate preventative measures in place to prevent security breaches.
  • To have a computer system that prevents malicious hackers from gaining access.

Disadvantages of Hacking:-

Hacking is quite dangerous if it is done with harmful intent. It can cause −

  • Massive security breach.
  • Unauthorized system access to private information.
  • Privacy violation.
  • Hampering system operation.
  • Denial of service attacks.
  • Malicious attack on the system.

Purpose of Hacking:-

There could be various positive and negative intentions behind performing hacking activities. Here is a list of some probable reasons why people indulge in hacking activities −

  • Just for fun
  • Show-off
  • Steal important information
  • Damaging the system
  • Hampering privacy
  • Money extortion
  • System security testing
  • To break policy compliance

Ethical Hacking - Hacker Types:-

  • White Hat Hackers:-

White hat hackers also are known as ethical hackers. They never purpose to damage a device, as an alternative, they are attempting to find out weaknesses in a laptop or a network system as a part of penetration trying out and vulnerability checks.

Ethical hacking isn't always unlawful and it is one of the disturbing jobs available in its enterprise. Numerous agencies lease moral hackers for penetration testing and vulnerability exams.

  • Black Hat Hackers:-

Black Hat hackers, also known as crackers, are those who hack to gain unauthorized access to a system and harm its operations or steal sensitive information.

Black Hat hacking is always illegal because of its bad intent which includes stealing corporate data, violating the privacy, damaging the system, blocking network communication, etc.

  • Grey Hat Hackers

Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.

They intend to bring the weakness to the attention of the owners and get appreciation or a little bounty from the owners.

Hacking
Ethical Hacking
0 VIEWS 0 LIKES 0 DISLIKES SHARE
0 LIKES 0 DISLIKES 0 VIEWS SHARE
Was this blog helpful?
techiio-price-plantechiio-price-plantechiio-price-plantechiio-price-plantechiio-price-plan
You must be Logged in to comment
Code Block
Techiio-author
Sagar Rabidas
Software Developer
Techiio-followerTechiio-followerTechiio-followerTechiio-followerTechiio-follower
+9 more
300 Blog Posts
14 Discussion Threads
Trending Technologies
15
Software91
DevOps48
Frontend Development24
Backend Development20
Server Administration17
Linux Administration28
Data Center24
Sentry24
Terraform23
Ansible83
Docker70
Penetration Testing16
Kubernetes21
NGINX20
JenkinsX17
Techiio-logo

Techiio is on the journey to build an ocean of technical knowledge, scouring the emerging stars in process and proffering them to the corporate world.

Follow us on:

Subscribe to get latest updates

You can unsubscribe anytime from getting updates from us
Developed and maintained by Wikiance
Developed and maintained by Wikiance