What is Ethical Hacking?

Hacking?

Hacking is the process of attempting to gain or successfully gaining, unauthorized access to computer resources. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.

Types of Hacking ?

• Website Hacking – Website hacking means taking control from the website owner to a person who hacks the website.

• Network Hacking – Network hacking is generally means gathering information about domain by using tools like Telnet, Netstat, etc. over the network.

• Ethical Hacking – Ethical hacking is where a person hacks to find weakness in a system and then usually patches them. • Email Hacking – Email hacking is illicit access to an email account or email correspondence.

• Password Hacking – Password hacking or password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.

• Online Banking Hacking – Online banking hacking is unauthorized accessing bank accounts without knowing the password or without permission of account holder.

• Computer Hacking – Computer hacking is when files on your computer are viewed, created, or edited without your authorization.

Type of Hackers ?

Hackers can be divided into three groups on the basis of why they are hacking system.

• White hat hacker –A white hat hacker breaks security for non-malicious reasons. Perhaps to test own security system or while working for a security company which makes security software. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC- Council also known as the International Council of Commerce Consultants is one of those organizations that have developed certifications, courseware, classes and online training covering the diverse arena of ethical hacking.

• Black hat hacker – A black hat hacker “violates computer security for little reason beyond maliciousness or for personal gain” (Moore,2005). Black hat hackers break into secure networks to destroy, modify or steal data or to make the network unusable for those who are authorized to use the network. Black hat hackers are also referred to as the “crackers” within the security industry and modern programmers.

• Grey hat hacker– A grey hat hacker lies between a black hat and a white hat hacker. A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect. Besides those hackers other different types of hackers are Elite hacker, Script kiddie, Neophyte, Blue hat and Hacktivist.

Tools used by Hackers :

• Trojan horses – Trojan horses are malicious programs or legitimate software is to be used set up a back door in a computer system.

• Virus – Virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents.

• Worm – Worm is a like virus and also a self-replicating program. The difference between a virus and a worm is that a worm does not attach itself to other code.

• Vulnerability scanner – This tool is used by hackers for quickly check computers on a network for known weakness. Hackers also use port scanners.

• Sniffer – Sniffer is an application that captures password and other data in transit either within the computer or over the network. • Root Kit – This tool is for hiding the fact that a computer’s security has been compromised.

visit us at : www.a2itsoft.com

4 thoughts on “What is Ethical Hacking?

  1. Genç ve güzel bir kadın, Chord adında kötü bir adam tarafından kaçırılır. Bu kadını kurtarmak içinse, elinden geleni ardına koymayacak bir adam vardır. Katillere karşı vicdansız ve masumlara karşı merhametli…Daha önce video çalışmaları ve kısa filmleriyle tanınan sinemacı Nacho Vigalondo’nun yönetmenliğini ve senaristliğini üstlendiği ve görselliği ile şaşırtan filmin başrollerini Sasha Grey ve Elijah Wood üstlenirken Neil Maskell, Iván González ve Brian Elder gibi isimler onlara eşlik ediyor. Reynaldo Colasurdo

Leave a Reply

Your email address will not be published. Required fields are marked *