Skip to main content

Ethical Hacking

 What is an Ethical Hacking?

Ethical Hacking sometimes known as as Penetration Testing is an act of intruding or penetrating into system or networks find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages.

An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, to minimize or eliminate any potential attacks.

Who is Hacker?

A Hacker is a person who discovers and exploits the weakness in computers and/or networks to gain access. Hackers are typically experienced computer programmers with knowledge of computer security.

Hackers are categorized according to the intent of their actions. Hackers are categorized as follows:

White Hat

A hacker who gains access to systems/networks with a view to fix the identified vulnerabilities. They may also perform penetration Testing and vulnerability assessments. They also identified as Ethical Hackers

Black Hat

A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. They also identified as Crackers

Grey hat

A hacker who is in between white and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.

Script kiddies

A non-skilled hacker who gains access to computer systems using already made tools available in internet.

Hacktivist

Hacktivists are the protesters of the internet. A hacker who uses hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.

Hacktivism includes defacing websites and uploading promotional material, so that the viewers would receive info based on hackers’ intention, not the developer of the website.

Phreaker

A hacker who finds and exploits weaknesses in telephones instead of computers.

Suicide Hacker

This hacker type gets its name from the notorious Suicide Bombers, people who cause a lot of damage before killing their own selves. Likewise, a suicide hacker would know that his identity would be revealed, or he would be caught but proceeds to carry out a hacking attempt nonetheless. This could either be for money, or for fame or even forceful, just like a suicide bomber.

Red Hat Hacker

Another good hacker type to break the stereotype, the red hat hacker acts brutally towards black hat hackers. Their sole objective is to destroy the effort of every bad hacker type and to bring their entire infrastructure down. A red hat hacker would be on the lookout for a black hat hack, intercept it and hack into the black hat hacker’s system. Not only would this halt the attack, but also push the black hat hacker out of business.

Blue Hat Hacker

Of the many hacker types, the blue hat hacker is the amateur. Like script kiddies, the blue hat deploys readily available techniques but specifically targets an entity out of a bad intention. Usually, these are revenge attacks made using amateur techniques like affecting a website with too much traffic using a script.

Green Hat Hacker

This type of hacker is the one who learns in the world of hacking. A green hat hacker is usually responsible for no real activity but is easily recognizable for his intent to learn and understand how it all works. Green Hat Hackers are often part of large learning communities online, where they watch videos and tutorials on how to make it big.


Comments

Popular posts from this blog

Python OOPs Concepts: Using Variables and Methods

  Types of Variables in OOPs Python   Instance Variable Static Variable Local Variable   Object Level Variables Class Level Variables Method Level Variables When to use: For Every Object if you want Separate copy, use Instance Variables For all object one copy is required, use static variables Inside method, Just used for temporary requirement Where to Declare Inside the constructor method (in general) Within the class directly, outside of methods (in general)   Within the method only. How to Declare Within the constructor: Instance variables can be declared within the constructor method using the self .   Using default values : Instance variables can be assigned default values during initialization.   Outside the class: use object name.   · ...

ORACLE Express Edition: Getting Started

1. Introduction to Oracle Database 21c Express Edition (XE) - Free, lightweight version of Oracle Database - Ideal for learning and small-scale applications - Limited to 12GB of user data and uses up to 2GB of RAM 2. Installation and Setup 2.1 Installing Oracle 21c XE 1. Download Oracle 21c XE from: https://www.oracle.com/database/technologies/xe-downloads.html 2. Run the installer:    - Windows: Double-click the .exe file    - Linux: Use `rpm` or `yum` command 3. Follow the installation wizard:  Accept the license agreement Choose an installation location (default is usually fine) Set a password for the SYS, SYSTEM, and PDBADMIN accounts (write this down!) Select the option to start the database service automatically (recommended)  4. Complete the installation: Wait for the installation process to finish Note down the database connection details provided at the end The default container database (CDB) name is XE The default pluggable database (PDB) nam...

Practical 1: Getting Started with MYSQL

 Getting Started with MySQL Introduction to MySQL Definition: MySQL is an open-source relational database management system (RDBMS) Uses: Web applications, data warehousing, e-commerce, logging applications Key features: Speed, reliability, scalability, and ease of use Installing MySQL Download MySQL Community Server from official website Follow installation wizard for your operating system Set root password during installation Verify installation: mysql --version MySQL Command-line Client Accessing MySQL: mysql -u root -p Basic commands: SHOW DATABASES ; CREATE DATABASE mydb ; USE mydb ; SHOW TABLES ; MySQL Workbench Introduction: Visual tool for database design and management Key features: SQL development Data modeling Server administration Example: Creating a new connection New Connection > Enter details (hostname, username, password) PHPMyAdmin Web-based MySQL administration tool Often comes pre-installed with web hosting packag...