Professional Documents
Culture Documents
Ethical Hacker 1
Ethical Hacker 1
Ethical Hacker 1
1. White Hat Hacker : They perform hacking and security checks with authority.
2. Black Hat Hacker : They believe in breaking the security without any
permission or authority.
3. Grey Hat Hacker : Hacker Who is like a coin, two sided. They work for both
offensive and defensive work. Generally benefit oriented.
4. Script Kiddie : They copy code and use it for a virus or something else.
Script Kiddies will never hack for themselves
PHASES OF HACKING :
INTRODUCTION TO PORTS && PROTOCOLS.
• Ports : A port is logical access channel between two devices which help in their
communication. A port is used for to transfer the data.
• There are total 65535 ports.
• Protocols : It is a Simply a set of rules which defines a standard way for
exchanging information over a network.
• Most commonly control Protocol are :
1.TCP 2. IP 3. UDP
FOOTPRINTING
• Footprinting is first phase of Hacking. Using Footprinting attacker can collect
information like emails,contacts,domain name information.
• Types
(1) Internal Footprinting.
(2) External Footprinting.
1.Website 2.Google. 3.Whois.
• How to Use Whois.sc :
• Navigate to www.whois.sc & Provide the domain name.