Ethical Hacking Tutorial PART - 1
Hacking as we all know have been a part of computer for more than fore decades and is a very large discipline,which consist and covers a wide range of topics.the first event of HACKING took place in 1960 at M.I.T and at the same time the term "HACKER" was originated. in this tutorial i will literally take you through the various concept of ETHICAL HACKING and explain how you can use them in real life environment.
This post/tutorial have been carefully prepared for those professionals aspiring to learn the basics of Ethical Hacking and make a career as an ethical hacker.
PREREQUISITES.
before i proceed with this tutorial,you should have a very good knowledge over all the fundamental concepts of a computer and how it operates in a network environment.
**TYPES OF HACKING **
There are so many types of hacking based on what is been hacked.below are set of examples.
network hacking - this is the process of gathering information bout a network by using tools like TELNET,NS LOOKUP, PING,NETSTAT and TRACERT,etc. with the intention to harm the network system and hamper its operation.
Ethical Hacking - Ethical hacking involves finding the weakness in a network or computer system for testing purpose and getting them fixed.
Password hacking - this is a process of recovering secret password from data that has been stored in by a computer system.
computer hacking - this is the situation whereby a hacker steals the ID and password of a computer to gain unauthorized access into the computer.
ADVANTAGES OF HACKING
! to recover lost information in case you lost your password.
!! to test the strength of the network/computer
!!! to have a computer system that prevent malicious hackers from having access to the computer/network
**DISADVANTAGES OF HACKING **
massive security breach.
privacy violation.
malicious attack on the system.
4.hampering system operation.
PURPOSE OF HACKING
just for fun.
steal important information.
money extortion.
4.show-off
5 . to break policy compliance.
hope i was clear in this sections i talk about?stay connected for the next part.
BR
JAVAPOINT.
I keep following this. I want to learn how to hack network/computers for bounty's. For now, i only did the more common things like digging up some passwords and retreiving acces to computers and databases on owners demand.