1.intro To Ethical Hacking
1.intro To Ethical Hacking
1.intro To Ethical Hacking
Ethical Hacking
Theory
Ethical Hacking
Hacking
Hacking is the process of exploiting system vulnerabilities and
compromising security systems to gain unauthorized access to the system
resources. It involves modifying system or application features to achieve a goal
outside of the creator’s original purpose.
Ethical Hacking
Ethical Hacking is the process to identify vulnerabilities to assure system
security by use of hacking tools, tricks, and techniques. It focuses on simulating
methods used by attackers to verify the existence of exploitable vulnerabilities
in the system's security.
Hacker
Hackers are intelligent individuals who spend enormous amounts of time
exploring computing resources like networks, websites, mobile devices, etc.
Ethical Hacker
Ethical Hacker is an expert in computer internals and networking
concepts, who tries to find out potential vulnerabilities on the target systems
before a hacker could use, without actually doing any harm to the information
systems on behalf of the owners of the IT Assets.
Types of Hackers
Black Hat (Crackers): Individuals utilize computing skills for malicious
or destructive activities.
White Hat: Individuals utilizing hacking skills for the defensive purpose
Gray Hat: Individuals who work both offensively and defensively
Suicide Hackers: Hackers who aim to shut down the critical
infrastructure for a cause and are not worried about facing punishment.
Script Kiddies: An unskilled hacker who compromises the system by
running scripts, tools, and software developed by real hackers.
Cyber Terrorists: Individuals with hacking skills, motivated by religious
or political beliefs to create fear by large-scale disruption of computer networks.
Hacktivist: Hackers who promote a political agenda by hacking,
especially by defacing or disabling websites.
Government Sponsored: Individuals employed by the government to
penetrate and gain confidential information.
Why Ethical Hacking is Necessary
Ethical Hacker needs to think like malicious Hacker. Ethical hacking is
necessary to defend against malicious hackers attempts, by anticipating methods
they can use to break into a system.
● To fight against cyber crimes.
● To protect information from getting into wrong hands.
● To build a defensive mechanism that avoids hackers from penetrating.
● To test the organization’s infrastructure security.
Terminology
Vulnerability: In simple words, vulnerability is a loophole, Limitation, or
weakness that becomes a source for an attacker to enter into the system.
Exploit: It is a software tool designed to take advantage of a flaw
(vulnerability) in a system for malicious purposes.
Payload: A payload is an action, or set of operations has to be done on the
target, once the exploit successfully launched. It can be any control or Denial of
service, etc.
Hack value: Hack value is a notion among the hackers that something is worth
doing. Hackers may feel that breaking down robust network security might give
them great satisfaction and that it is something they accomplished that not
everyone could do.
Zero-day attack: In a 0-day attack, the attacker exploits the vulnerability
before the software developer releases the Patch For them.
Hacking Conferences:
● Defcon Conference ● Nullcon Conference
● Shmoocon Conference ● Malcon Conference
● Blackhat Conference ● Club hack Conference
Hacking Magazines:
● Phrack.org
● hackin9.org
● 2600.Com
● Magazine.hitb.com
● Pentest magazine
● Hack
● ers5.com
● Club hack Magazine chmag.in