Ethical Hacking | White Hat Hacker | White Hat Hacking | Blue Team | About CEH Certification
Ethical Hacking.....
Hello Guys,Let's start to learn Hacking.
You Guy's might be Wonderring about What is Hacking?
Ans. Hacking refers to Exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to a System's resources.
- It involves Modifying system or application features to achieve a goal outside of the creator's original purpose.
- Hacking can be used to steal and redistribute intellectual property, leading to business loss.
who is Hacker ?

Hackers Classes
1.Black Hats
Individuals with extraordinary computing skills; they resort to malicious or destructive activities and are also known as crackers.
2.White Hats
Individuals who use their professed hacking skills for defensive purposes and are also known as security analysts. They have permission from the system owner.
3.Gray Hats
Individuals who work bath offensively and defentively at various times
4.Suicide Hackers
Individuals who aim to bring down the critical infrastructure for a "cause" and are not worried about facing jail terms or any other kind of punishment.
5.Script Kiddies
An unskilled hacker who compromises system by running scripts, tools, and software that were developed by real hackers.
6.Cyber Terrorists
Individuals with wide range of skills who are motivated by religious or political beliefs to create fear through the large scale disruption of computer networks.
7.State-Sponsored Hackers
Individuals employed by the government to penetrate and gain top-secret information from and do damage to the information systems of other governments.
8.Hacktivist
Individuals who promote a political agenda by hacking, especially by using hacking to deface or disable website.
9.Hacker Teams
A consortium of skilled hackers having their own resources and funding. They work together in synergy for researching the state-of-the-art technologies.
10.Industrial Spies
Individuals who perform corporate espionage by illegally spying on competitor organizations and focus on stealing information such as blueprints and formulas.
11.Criminal Syndicates
Groups of individuals that are Involved in organized, planned, and prolonged criminal activities. They illegally embezzle money by performing sophisticated cyber attacks.
12.Insider
Any trusted person who has access to critical assets of an organization. They use privileged access to violate nules or intentionally cause harm to the organization's information system.
13.Organized Hackers
Miscreants or hardened criminals who use rented devices or botnets to perform various cyber attacks to pilfer money from victims.
What is Ethical Hacking ?
- Ethical hacking involves the use of hacking tools, tricks, and techniques to identify vulnerabilities and ensure system security.
- It focuses on simulating the techniques used by attackers to verify the existence of exploitable vulnerabilities in a system's security.
- Ethical hackers perform security assessments for an organization with the permission of concerned authorities.


Comments
Post a Comment
You share and coment