Professional Documents
Culture Documents
Ethical Hacking
Ethical Hacking
HACKING
WHAT IS HACKING?
• Hacking refers to the unauthorized or illicit access,
manipulation, or exploitation of computer systems,
networks, or software.
• Network Hacking
• Website Hacking
• Computer Hacking
• Password Hacking
• Email Hacking
Network Hacking: Network hacking means gathering information about a
network with the intent to harm the network system and hamper its
operations using the various tools like Telnet, NS lookup, Ping, Tracert, etc.
• Show-off
• Hampering privacy
• Money extortion
It is used to recover the lost of information, especially when you lost your password.
It is used to perform penetration testing to increase the security of the computer and
network.
Disadvantages of Hacking:
There are various disadvantages of hacking:
Hacking is illegal.
There are multiple phases involved in any elaborate hacking process. Let’s go
through them one by one.
Reconnaissance:
Before executing any hack, you need to gather some preliminary information
about the target system. This information could be about the people or
organizations associated with the target, details about the host system, or the target
network. The primary intention of this step is to engineer a hack based on the
exact technology and security measures implemented by the target system.
Scanning:
Most of the time, hacking is done through network access. Most of our devices,
whether in an organization or at home, are connected to a network. The common
form of this network is Wi-Fi or WLAN. In offices, ethernet connections are also
laid down to ensure maximum efficiency. As a hacker, you can take advantage of
this factor and focus on gaining unauthorized access to the network of the target
host. In this process, the network topology and vulnerable ports are revealed.
Gaining Access
The two aforementioned steps complete the information gathering phase. Now,
based on that information, you need to start your hack. This step involves
breaking into the target system by cracking the password or bypassing the
security measures
Maintaining access
After gaining access, you need to ensure that once you are done with your first
session, you are able to retain access to the target system. This is done through a
backdoor. A backdoor is an exploit or a hack that is left in the target system for
future access. If you don’t leave a backdoor, the target system may implement a
newer security patch or reset its security measures, and you may have to execute
or craft the hack once again.
Clearing tracks
After finishing up with the attack or hack, it is important to remove the traces of
your incursion. This step involves removing any backdoors, executables, or logs
that may lead to the attack being traced back to you or found out in the first
place.
HACKTIVISM:
Unlike White Hat hackers, “Grey Hat” hackers don’t ask for permission before
getting into your system.
But Grey Hats are also different from Black Hats because they don’t perform
hacking for any personal or third-party benefit.
These hackers do not have any malicious intention and hack systems for fun or
various other reasons, usually informing the owner about any threats they find.
Grey Hat and Black Hat hacking are both illegal as they both constitute an
unauthorized system breach, even though the intentions of both types of hackers
differ.
White Hat Hacker v/s Black Hat Hacker
Techniques Used
White Hat hackers duplicate the techniques and methods followed by malicious
hackers in order to find out the system discrepancies, replicating all the latter’s
steps to find out how a system attack occurred or may occur.
If they find a weak point in the system or network, they report it immediately
and fix the flaw.
Legality
Even though White Hat hacking follows the same techniques and methods as
Black Hat hacking, only one is legally acceptable.
Black Hat hackers break the law by penetrating systems without consent.
Ownership
White Hat hackers are employed by organizations to penetrate their systems
and detect security issues.
Black hat hackers neither own the system nor work for someone who owns it.
What is an ethical hacker?
• Also known as “white hats,” ethical hackers are security experts
that perform these security assessments.
A good hacker knows his or her responsibility and adheres to all of the ethical
guidelines.
• An ethical hacker must seek authorization from the organization that owns the
system.
• Determine the scope of their assessment and make known their plan to the
organization.
• Report any security breaches and vulnerabilities found in
the system or network.
• Erase all traces of the hack after checking the system for
any vulnerability.
Networking skills - This skill is important because threats mostly originate from
networks.
You should know about all of the devices present in the network, how they are
connected, and how to identify if they are compromised.
.
Understanding of databases –
• The ability to work with different hacking tools available in the market.
• Some of the most famous Ethical Indian hacker are ANKIT FADIA,
VIVEK RAMCHANDRAN, SUNNY WAGHELA, ETC.
Conclusion