So let’s start with basics.
As you know,
in today’s world everyone use computers. Some individual’s for entertainment,
some for business. And with this growing popularity in the cyber world, there
had been many risks like data deletion, computer malware, computer hacking etc. Someone can
anytime perform these types of activities against you.
This post is to tell you about those things. These malicious activities are increasing day by day with increment in technology. Hacking is from one of those risks. So today, here in this post we will discuss about some basics of hacking and about hackers.
See Also: - how to change your ip address
This post is to tell you about those things. These malicious activities are increasing day by day with increment in technology. Hacking is from one of those risks. So today, here in this post we will discuss about some basics of hacking and about hackers.
See Also: - how to change your ip address
So get ready.
We can
assign two definitions to hackers on the basis of tradition and new hackers.
Traditional Hackers: - A person who loves to play and tweak
with computer and its programs, a person who enjoy writing new computer
programs. And use computer with their own program or code.
Today’s Hackers: - An individual who uses his/her
expertise to gain unauthorized access to anyone’s computer and perform harmful tasks
and activities like deleting data, uploading viruses and stealing the
information. This activity is called hacking. Hacking is done by using some
tools.
See Also: - how to create iso image from a dvd
See Also: - how to create iso image from a dvd
Types of Hackers
Black Hat
Hackers: - Those are
the guys who hack another’s computer in order to gain malicious unauthorized
access to any one’s computer using illegal tools and perform malicious activities
like destroying the data, uploading the malware and can also destroy computer.
White Hat
Hackers: - These are
called Ethical Hackers also. Those are hackers who hack into someone’s computer
with permission in order to test and then evaluate the security of computers.
There is very good scope of job in this IT Security field. To get job in this
field, you need a Certified Ethical Hacker (CEH) certificate.
Grey Hat
Hackers: - Those are
hackers who do both activities of white and black hat hackers. They do
malicious activities when they are alone and ethical hacking activities on
front of other’s. They also use same types of tools.
Freakers:
- Those types of
hackers are related to mobile phone hacking. They only use their skills only in
mobile technology.
Script
Kiddies: - These are
individuals who only interested in hacking. They don’t follow any rules while
hacking. They also don’t know their causes.
But in this
blog, we will learn about Ethical Hacking. So let’s explore some phases of
ethical hacking. These phases are actually the steps in hacking. So, below I
have listed all the steps of doing ethical hacking.
Phase 1
(Information Gathering): - First phase or step in Ethical hacking is
information gathering. In this step we will gather all the information about
the target like ip address, server, emails etc. We can get this information
online or by using some tools.
Phase 2
(Scanning): -It is second phase. In this, we will scan the vulnerabilities and
open ports of our target system using some tools. Vulnerability is a technical
security weakness in system which can lead to various malicious attacks. Some
types of vulnerabilities are Cross Site Scripting, DDos attack, SQL injection
etc.
Phase 3
(Attacking): - After all above steps, we will attack on targeted system based
on the information gathered and scanned vulnerability or ports. We will attack
by injecting the payloads or exploits using some specified software like
Metaspploit.
Phase 4
(Covering Tracks): - After attacking the targeted system we will install
backdoors and cover our all tracks. Backdoor is nothing it is only a software
or small coded program which will allow us to connect anytime with targeted
system when installed in computer.
See Also: -how to share android phone internet connection with pc
See Also: -how to share android phone internet connection with pc
And that’s
all.
We will tell
you more about ethical hacking in our next article.
0 comments:
Post a Comment