Technology
Science
Knowledge Sharing
The Basics Of Ethical Hacking !
Hello people !! Welcome you all to back my blogs . I have come with some interesting topic today . I am gonna give you guys a general idea of what is " Ethical Hacking " . Hacking is gaining un-authorized success to digital devices , computers , smart phones and even mass networks .
What is Ethical Hacking ?
It involves an authorized attempt to get unauthorized to a computer system , application or data . It involves duplicating strategies and actions of malicious attackers. The company that owns the system or network allows cyber security experts to perform such activities in order to test the system's defenses . Thus, unlike malicious hacking , this process is planned , approved and more importantly legal . Ethical Hackers are also known as “White Hats ” .
Key concepts of Ethical Hacking :
- Staying legal by gaining prior approvals before accessing and performing a security assessment .
- Notifying the vulnerabilities found during the assessments and provide remediation advice for resolving these vulnerabilities .
- Defining the scope of the work , keeping the ethical hacker's work legal remaining within the approved boundaries.
- Based on the data sensitivity , the white hats must agree to a non - disclosure agreement .
Types of hackers :
- Black hat hackers
- White hat hackers
- Grey hat hackers
- Script kiddie
- Green hat
- Red hat
- Blue hat
- Suicide hackers
- Hacktivist
- Cyber terrorist
New Terminologies :
- Attack : It is an action that is done on a system to get its access and extract sensitive data.
- Exploit : A method to intrude or penetrate in a system
- Vulnerability : Weakness in a system [ hardware or software]
- Payload : Malicious code inside the exploit is called payload .
- Malware : It is malicious [intent ended to do harm] software which when enters the target host , gives an attacker full or limited control over the target .
- Backdoor : a back door or a trap door , is a hidden entry to a computing device or software that bypass security measures , such as logins and password protections .
- Hack value : the notion among hackers that something is worth doing . it is the reputation of the hackers .
- Zero day : When a hacker finds a new vulnerability in a system and no one others know about it , that vulnerability or exploit is called zero day attack .
Limitations of Ethical Hacking :
- One of the most drawback of ethical hacking is they cannot take actions quickly if it's beyond their permission levels . But it is not unreasonable to get a view out of the scope .
- Illegal hackers do not have time constraints which ethical hackers often face .
- They have to restrict their methods and ideas if the experts ask them avoid tests cases that may end wrong .
These are some of the basics of ethical hacking . If needed i will do part 2 of it . Thanks for reading !💙