Ethical Hacking 2019

                                                   Ethical Hacking 2019

Description Of Ethical Hacking: Hacking is a part of computing for almost five decades and it is a very comprehensive discipline, which includes many types of topics. The first known event of hacking occurred in MIT in 1960 and at the same time, the word "hacker" was born. In this tutorial, we will take you through different concepts of ethical hacking and explain how you can use them in the environment in real time.

The audience
This tutorial has been prepared for professionals who want to learn the basics of ethical hacking and build a career as a moral hacker.

Necessary conditions
Before proceeding with this tutorial, you have a good understanding of all the basic concepts of a computer and how it works in a network environment.
                                            Image result for anonymous images

Hacking is a part of computing for almost five decades and it is a very comprehensive discipline, which includes many types of topics. The first known event of hacking occurred in MIT in 1960 and at the same time, the word "hacker" was born.

Hacking is the process of finding potential entry points presently in a computer system or a computer network and finally entering them. Hacking is usually done to gain unauthorized access to computer systems or computer networks, either to harm the system or to steal the sensitive information available on the computer.

Hacking is usually legal unless being tested to find vulnerabilities in the computer or network system for the purpose. This type of hacking is called ethical hacking.

A computer expert who acts as a hacking, is called "hacker". Hackers are those who seek knowledge, to understand how the systems operate, how they are designed, and then try to play with these
systems.

Types of Hacking

We can differentiate hacking in different categories based on hacking. Here's a set of examples -

Website hacking - Hacking a website means taking unauthorized control over the web server and its related software such as databases and other interfaces.

Network hacking - Hacking a network means to gather information about the network using tools like Telnet, ns lookup, ping, tracer, netstate etc. to harm the network system and to interfere with its operation.

Email hacking - This includes unauthorized access to an email account and its use without the owner's consent.

Ethical hacking - Ethical hacking involves finding vulnerabilities in the computer or network system for testing purposes and finally fixing it.

Password Hacking - This is the process of retrieving secret passwords from data that is stored or sent by computer system.

Computer hacking - This is the process of stealing computer id and password by applying hacking methods and getting unauthorized access to computer systems.

Benefits of hacking

Hacking is quite useful in the following scenarios -


*To recover lost information, especially if you've lost your password.

*Inspection to strengthen computer and network security

*To prevent adequate preventive measures to prevent safety breaches

*A computer system that prevents malicious hackers from accessing.


Hacking Losses-

Hacking is quite dangerous if it is done with harmful intentions. The reason for this may be -

*Massive security breaches

*Unauthorized System Access on Private Information

*violation of privacy.

*Interrupted system operation

*denial of service attacks.

*Conflict on the system

The purpose of hacking-

There may be various positive and negative intentions behind doing hacking activities. Here's a list of some possible reasons why people are involved in hacking activities -

*just for fun

*show off

*Important information theft

*Harming the system

*Disrupting confidentiality

*raise fund

*System security test

To break policy compliance






1 comment:

Powered by Blogger.