Ethical Hacking

Ethical Hacking involves an authorised attempt to gain unauthorized access to a computer system application or data. Also known as White hats.

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply, it is the unauthorized access to control 

over computer network security system for some illicit purpose. They can destroy, steal or eeven prevent authorised userd from accessing the system.


There are main three thpes of hacker: 

# White Hats: Also known as ethical hackers they are often employed or contracted by companies and government entities, working as security specialists

              looking for vulnerabilities.

# Black Hats: These hackers are normally responsible for creating malwares, which is frequently used to infilterate computerized network and systems.

# Grey Hats: As the name suggests, these individuals utilize aspect from black black and white hat hackers, but will ususally seek out vulnorabilities 

             in a system whithout an owners permission or knowledge.

# Steps of Ethical Hacking:

  Reconnaissance (Foot Printing)

  Scanning 

  Exploitation

  Maintaining access

  Clearing Tracks


# Footprinting: Reconaissance, Information Gathering, Enumeration, Discovery, First step of hacking.

# Scanning: Secondary step of hacking, process of finding, security related loop holes and weaknesses (vulnerabilities).

# Exploitation: Process of gaining unauthorized access.

# Maintaining Access: Process of creating backdoor and hidden entries and privileges escalator.

# Clearing tracks: Log cleaning process.

Comments

Popular posts from this blog

Ports