Ethical Hacking Intro

in #hacking6 years ago (edited)


Ethical Hacking

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.


Types of hacker

I. White Hat II. Black Hat III. Grey Hat IV. Hacktivist V. Phreaker


White Hat

White hat has the skills to break into computer systems and do damage. However, they use their skills to help organizations. For example a white hat might work for an organization to test for security weaknesses and vulnerabilities in the network


Black Hat

Black Hat also known as a cracker uses his skills to break into computer systems for unethical reasons. For example, steal user data like, username and password, credit card numbers, bank information.


Grey Hat

This type can be thought of as a white hat attacker who sometimes acts unethically. They could be employed as a legit network security administrator. But, during this person's duties, he may find an opportunity for gaining access to company data and stealing that data.


Phreaker

A phreaker is simply a hacker of telecommunications. An example of this is tricking the phone system into letting you make free long distance calls.


Types of Hacking

SQL Injection 

SQL Mapping 

Social Engineering 

Denial of Service 

Sniffing 

Phishing 

Key loggers


SQL Injection

SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It uses normal SQL commands to get into database with elevated privileges.


Sniffing

Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.


Social Engineering

Online criminals can use sophisticated technology to try to gain access to your computer, or they can use something simpler and more insidious: social engineering. Social engineering is a way for criminals to gain access to your computer. The purpose of social engineering is usually to secretly install spyware or other malicious software or to trick you into handing over your passwords or other sensitive financial or personal information. Some online criminals find it easier to exploit human nature than to exploit holes in your software.


Denial of Service

DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic(which can be e-mail or Transmission Control Protocol, TCP, packets).


Phishing

This is another type of keylogging, here you have to bring the user to a webpage created by you resembling the legitimate one and get him to enter his password, to get the same in your mail box..!! Use social engineering.



Sort:  

Congratulations @aimalk! You have completed some achievement on Steemit and have been rewarded with new badge(s) :

Award for the number of upvotes
Award for the number of upvotes received

Click on any badge to view your own Board of Honor on SteemitBoard.
For more information about SteemitBoard, click here

If you no longer want to receive notifications, reply to this comment with the word STOP

By upvoting this notification, you can help all Steemit users. Learn how here!

Coin Marketplace

STEEM 0.20
TRX 0.13
JST 0.030
BTC 65641.09
ETH 3479.54
USDT 1.00
SBD 2.50