Skip to main content

ETHICAL HACKING

 ETHICAL HACKING

Ethical Hacking is a structured hacking performed to expose vulnerabilities in a system, using a tools and techniques with organizations knowledge. 

The act of hacking is defined as the process of finding a set of vulnerabilities in a target system and systematically exploiting them. Ethical hacking as a discipline discerns itself from hacking by adding a vital element to the process.

The process becomes a legal activity and since the hacker takes permission prior to hacking into system, it is legally made sure that he has no malicious intent. This is normally performed by making the ethical hacker sign contracts that legally bind him to work towards the improvement of the security of the company.

ETHICAL HACKER:

An Ethical hacker is a computer security specialist, who hacks into a system with the consent or permission of the owner to disclose vulnerabilities in the security of the system in order to improve it. 

Types of Hackers:

  1. White hat hackers
  2. Black hat hackers
  3. Gray hat hackers
  4. Script kiddies
  5. Green hat hackers
  6. Blue hat hackers
  7. Red hat hackers

Some of the roles of Ethical hacker:

  • Protect the privacy of the organization.
  • Reporting any sort of discrepancy in the system to the corresponding division.
  • Update Hardware and Software vendors regarding any sort of vulnerabilities found in their product.

Programming languages to be known for Ethical hacking:
  • HTML
  • JavaScript
  • SQL
  • PHP/Ruby
  • Bash
Types of Ethical hacking:
  • Web Application Hacking
  • Social engineering
  • System hacking
  • Hacking wireless networks
  • Web server Hacking.
Some of the Ethical Hacking tools:
  • NMAP
  • Netsparker
  • Burpsuite
  • Metasploit
Some of the famous Ethical Hackers in the world:
  • Kevin Mitnick
  • Tsutomu Shimomura
  • Richard Stallman
  • Çharlie Miller
  • Sherri Sparks
  • Mac Maiffret.


Tech facts:
  • India leads the world in ethical hackers ; 23% live there and US with 20%.
  • A Hacker needs only one loophole to hack any system.

                                                                                                                                     --RD






Comments

  1. thank you and subscribe for more blogs

    ReplyDelete
  2. Nice article, its very informative content..thanks for sharing...Waiting for the next update.

    Swift Online Course
    learn swift online

    ReplyDelete
  3. I read this blog, a Nice article...Thanks for sharing and waiting for the next...
    Why Is Software Testing Important?
    Types of Software Testing

    ReplyDelete
  4. This comment has been removed by the author.

    ReplyDelete
  5. If you are Looking for Ethical Hacking Course in Chandigarh . Infosif is the Best Ethical Hacking Courses Institute in Mohali and India.Infosif provides them with the finest in terms of a pleasant as well as a serious workplace, as well as a serious package of benefits and advantages that are among the best in Mohali and India.
    For more updates visit our website
    Address: Infosif Solutions SCO 37 ,Sector 118, TDI City,SAS Nagar, Punjab 160055
    Phone: 70091 51405, 81469 07164, 98141 04107
    Email: job@infosif.com

    ReplyDelete

Post a Comment

Popular posts from this blog

Linux OS introduction

 LINUX OPERATING SYSTEM Linux Introduction:   L INUX is an operating system or a kernel distributed under an open-source license. It is one of popular version of UNIX operating system. Linux was designed considering UNIX compatibility Its functionality list is quite similar to that of UNIX. Components of Linux System: Linux OS has primarily three components; 1. Kernel: It is the core part of Linux. It is responsible for all major activities of this operating system. It consists of various modules and it interacts directly with the underlying hardware. 2. System Library: These libraries implement most of the functionality of the operating system and do not requires kernel module's code access rights. 3. System utility: These programmes are responsible to do specialized, individual level tasks. Basis Features: Some of the features of Linux OS are: Portable Open source Multi-user Multiprogramming Hierarchical file system Security... etc., courtesy: Pinterest Benefits of Using L...

5G TECHNOLOGY

  5G TECHNOLOGY Source : Google 5G is the 5th generation mobile network. It is a new global wireless standard after 1G, 2G, 3G and 4G networks. 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects and devices. 5G wireless technology is meant to deliver higher multi Gbps peak data speeds, ultra low latency, more reliability, massive network capacity, increased availability, and a more uniform users.  Higher performance and improved efficiency empower new user experiences and connects new industries. 5G is based on OFDM, a method of modulating a digital signal across several different channels to reduce interference.                                                                     Source : Google 5G usage: Enhanced mobile bro...