Hacking kese sikhe
What is Hacking?
Gaining access to a system that you are not supposed to have access is considered as hacking. For example: login into an email account that is not supposed to have access, gaining access to a remote computer that you are not supposed to have access, reading information that you are not supposed to able to read is considered as hacking. There are a large number of ways to hack a system.
In 1960, the first known event of hacking had taken place at MIT and at the same time, the term Hacker was organized.
What is Ethical hacking?
Ethical hacking is also known as White hat Hacking or Penetration Testing. Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system or data. Ethical hacking is used to improve the security of the systems and networks by fixing the vulnerability found while testing.
Ethical hackers improve the security posture of
an organization. Ethical hackers use the same
tools, tricks, and techniques that malicious
hackers used, but with the permission of the
authorized person. The purpose of ethical
hacking is to improve the security and to
defend the systems from attacks by malicious
users.
Tipes of hacking
We can define hacking into different categories, based on what is being hacked. These are as follows:
•Network Hacking
•Website Hacking
•Computer Hacking
•Password Hacking
•Email Hacking
•Network Hacking: Network hacking means gathering information about a network with the intent to harm the network system and hamper its operations using the various tools like Telnet, NS lookup, Ping, Tracert, etc.
•Website Hacking: Website hacking means
taking unauthorized access over a web server, database and make a change in the information.
•Computer Hacking: Computer hacking means unauthorized access to the Computer and steals the information from PC like Computer ID and password by applying hacking methods.
•Password Hacking: Password hacking is the process of recovering secret passwords from data that has been already stored in the computer system.
•Email Hacking: Email hacking means unauthorized access on an Email account and using it without the owner's permission
Types of Hackers
•Black Hat Hacker
•White Hat Hacker
•Grey Hat Hacker
Black Hat Hacker
Black-hat Hackers are also known as an
Unethical Hacker or a Security Cracker. These
people hack the system illegally to steal money
or to achieve their own illegal goals. They find
banks or other companies with weak security
and steal money or credit card information.
They can also modify or destroy the data as
well. Black hat hacking is illegal.
White Hat Hacker
White hat Hackers are also known as Ethical Hackers or a Penetration Tester. White hat hackers are the good guys of the hacker world.
These people use the same technique used by the black hat hackers. They also hack the system, but they can only hack the system that they have permission to hack in order to test the security of the system. They focus on security and protecting IT system. White hat hacking is legal.
Gray Hat Hacker
Gray hat Hackers are Hybrid between Black hat Hackers and White hat hackers. They can hack any system even if they don't have permission to test the security of the system but they will never steal money or damage the system.
In most cases, they tell the administrator of that system. But they are also illegal because they test the security of the system that they do not have permission to test. Grey hat hacking is sometimes acted legally and sometimes not.
Advantages of Hacking
It is used to recover the lost of information, especially when you lost your password.
It is used to perform penetration testing to increase the security of the computer and network.
It is used to test how good security is on your network.
Disadvantages of Hacking
⚫It can harm the privacy of someone.
•Hacking is illegal.
•Criminal can use hacking to their advantage.
•Hampering system operations.
Environmental Setup
To perform ethical hacking, we have to download the Kali Linux Operating System and we can download Kali Linux OS inside the Virtual box. Here are the basic steps to download the virtual box and Kali Linux.
Comments