Ethical Hacking Tutorial PART - 1

in #hacking7 years ago

Hacking as we all know have been a part of computer for more than fore decades and is a very large discipline,which consist and covers a wide range of topics.the first event of HACKING took place in 1960 at M.I.T and at the same time the term "HACKER" was originated. in this tutorial i will literally take you through the various concept of ETHICAL HACKING and explain how you can use them in real life environment.
learn-ethical-hacking-from-scratchPCWolf.png

This post/tutorial have been carefully prepared for those professionals aspiring to learn the basics of Ethical Hacking and make a career as an ethical hacker.

PREREQUISITES.

before i proceed with this tutorial,you should have a very good knowledge over all the fundamental concepts of a computer and how it operates in a network environment.

**TYPES OF HACKING **

There are so many types of hacking based on what is been hacked.below are set of examples.

  1. network hacking - this is the process of gathering information bout a network by using tools like TELNET,NS LOOKUP, PING,NETSTAT and TRACERT,etc. with the intention to harm the network system and hamper its operation.

  2. Ethical Hacking - Ethical hacking involves finding the weakness in a network or computer system for testing purpose and getting them fixed.

  3. Password hacking - this is a process of recovering secret password from data that has been stored in by a computer system.

  4. computer hacking - this is the situation whereby a hacker steals the ID and password of a computer to gain unauthorized access into the computer.

ADVANTAGES OF HACKING

! to recover lost information in case you lost your password.

!! to test the strength of the network/computer

!!! to have a computer system that prevent malicious hackers from having access to the computer/network

**DISADVANTAGES OF HACKING **

  1. massive security breach.

  2. privacy violation.

  3. malicious attack on the system.

4.hampering system operation.

PURPOSE OF HACKING

  1. just for fun.

  2. steal important information.

  3. money extortion.

4.show-off

5 . to break policy compliance.

hope i was clear in this sections i talk about?stay connected for the next part.

BR
JAVAPOINT.

DQmNuF3L71zzxAyJB7Lk37yBqjBRo2uafTAudFDLzsoRV5L.gif

Sort:  

I keep following this. I want to learn how to hack network/computers for bounty's. For now, i only did the more common things like digging up some passwords and retreiving acces to computers and databases on owners demand.

Coin Marketplace

STEEM 0.16
TRX 0.15
JST 0.027
BTC 60003.48
ETH 2309.22
USDT 1.00
SBD 2.49