Skip to main content

Ethical Hacking

 What is an Ethical Hacking?

Ethical Hacking sometimes known as as Penetration Testing is an act of intruding or penetrating into system or networks find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages.

An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, to minimize or eliminate any potential attacks.

Who is Hacker?

A Hacker is a person who discovers and exploits the weakness in computers and/or networks to gain access. Hackers are typically experienced computer programmers with knowledge of computer security.

Hackers are categorized according to the intent of their actions. Hackers are categorized as follows:

White Hat

A hacker who gains access to systems/networks with a view to fix the identified vulnerabilities. They may also perform penetration Testing and vulnerability assessments. They also identified as Ethical Hackers

Black Hat

A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. They also identified as Crackers

Grey hat

A hacker who is in between white and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.

Script kiddies

A non-skilled hacker who gains access to computer systems using already made tools available in internet.

Hacktivist

Hacktivists are the protesters of the internet. A hacker who uses hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.

Hacktivism includes defacing websites and uploading promotional material, so that the viewers would receive info based on hackers’ intention, not the developer of the website.

Phreaker

A hacker who finds and exploits weaknesses in telephones instead of computers.

Suicide Hacker

This hacker type gets its name from the notorious Suicide Bombers, people who cause a lot of damage before killing their own selves. Likewise, a suicide hacker would know that his identity would be revealed, or he would be caught but proceeds to carry out a hacking attempt nonetheless. This could either be for money, or for fame or even forceful, just like a suicide bomber.

Red Hat Hacker

Another good hacker type to break the stereotype, the red hat hacker acts brutally towards black hat hackers. Their sole objective is to destroy the effort of every bad hacker type and to bring their entire infrastructure down. A red hat hacker would be on the lookout for a black hat hack, intercept it and hack into the black hat hacker’s system. Not only would this halt the attack, but also push the black hat hacker out of business.

Blue Hat Hacker

Of the many hacker types, the blue hat hacker is the amateur. Like script kiddies, the blue hat deploys readily available techniques but specifically targets an entity out of a bad intention. Usually, these are revenge attacks made using amateur techniques like affecting a website with too much traffic using a script.

Green Hat Hacker

This type of hacker is the one who learns in the world of hacking. A green hat hacker is usually responsible for no real activity but is easily recognizable for his intent to learn and understand how it all works. Green Hat Hackers are often part of large learning communities online, where they watch videos and tutorials on how to make it big.


Comments

Popular posts from this blog

Python OOPs Concepts: Using Variables and Methods

  Types of Variables in OOPs Python   Instance Variable Static Variable Local Variable   Object Level Variables Class Level Variables Method Level Variables When to use: For Every Object if you want Separate copy, use Instance Variables For all object one copy is required, use static variables Inside method, Just used for temporary requirement Where to Declare Inside the constructor method (in general) Within the class directly, outside of methods (in general)   Within the method only. How to Declare Within the constructor: Instance variables can be declared within the constructor method using the self .   Using default values : Instance variables can be assigned default values during initialization.   Outside the class: use object name.   · ...

Polymorphism: Method Overloading vs Method Overriding

  Method Overloading In object-oriented programming languages, method overloading enables a class to have several methods with the same name but different parameters. However, in Python, method overloading is not directly supported as opposed to languages such as Java or C++. This is because Python allows developers to define default arguments for their methods and pass arguments of any type to a method. This flexibility allows a single method to handle various types of arguments, eliminating the need for overloading.   However, there is a way to simulate method overloading in Python by using default argument values or variable length arguments and conditional statements. Here's an example: Program using default arguments:       Program using variable length arguments:   Multiple methods with Same Name: When we define multiple methods with same name, Python will consider the last defined method only. Python will not support method overload...

Is Li-Fi Better than Wi-Fi?

Li-Fi  ( light fidelity )  is a bidirectional wireless system that transmit data to the devices like mobiles, laptop, etc., via infrared light or LED. The device has a receiver to pick up light signals and a transmitter to send light signal back to the lamp using infrared light or LED. It was first unveiled in 2011 and, unlike Wi-Fi, which uses radio frequency, Li-Fi technology only needs a light source with a chip to transmit an internet signal through light waves. Light fidelity (LiFi) is a faster, more secure and efficient wireless connection that uses light waves to transmit data Li-Fi technology still has a long way to go before worldwide adoption but every year, we are getting nearer to enjoying it for ourselves. The future surely looks bright with LiFi. How LiFi Works? LiFi makes use of visible light through overhead lighting for the transmission of data. This is possible through the use of a Visible Light Communications (VLC) system for data transmission. A VLC system ...