Skip to main content

Chapter 1: Introduction to Ethical Hacking

Hacking is an unauthorized access into a system of any kind. By the word any kind, I literally mean any, any kind, be it a digital system or one without even a single digital component. The suitable name for one who breaks into computer's hardware or software is "Cracker", but in general use hacker is the term that has got more attention.

 Ethical Hacking
Hacking made ethical is ethical hacking. The expert computer crackers are called on for deliberate hacking attempt by the authorities of an organization, in order to test their own security level to be aware of their own vulnerabilities. Thus, ethical hacking is hacking a system to know its vulnerabilities by gaining full authority from concerned organization for such an attempt.

In today's world of cyber-crime, almost every organization, business need security. The best way to be secured is to think in the way as that of attacker. Thus, ethical hacking is soaring in importance and hence the popularity.

 Types of Hackers
  • Black Hat
    • One who hacks to gain attacks into an unauthorized zone in order to access money, trusts, valuable data with motive of political, economic, religious etc benefits.  
  • White Hat
    • A non-malign hacker who hacks for vulnerability analysis by gaining authority from organization itself
  • Gray Hat
    • Those hackers who pretend to be white hats but are black hat
  • Suicide Hacker 
    • A hacker who does not have full prior knowledge of target, target environment and prevailing laws
  • Script Kiddie
    • One who  is new to hacking or just knows few underlying concepts and attacks the target using code or scripts of others
 This was a basic introduction of Ethical Hacking. There is a lot more to it in its technical details. In the next chapter, I will discuss about Footprints, an important aspect of hacking.

Disclaimer: By publishing this article and this series of complete ethical hacking, I , by no means encourage any of malicious hacking attempt and am myself against such attempts.







Comments

Popular posts from this blog

Brief Background Of Culture of Nepal

Today's Nepal is a unified Nepal. Present Nepal is the result of the unification of 46 smaller kingdoms. This unification was carried by the then His Majesty King Prithvi Narayan Shah. Nepal is lauded worldwide for its remarkable cultural practices. Today we will look how the present art and culture of Nepal came into existence and how its continuous development of took place in various instances of history. Three to four thousands year ago, the Neolithic matriarchal groups of Mongol, China and Bhote entered today's Kathmandu Valley. Since the Kathmandu valley was a lake then, these group settled themselves in the higher region of the hills surrounding the lake. Some of these places were Sankwo(today's Bajrayogini) and Puchwo(today's Phulchowki). The primary means of living were hunting and livestock. They also killed humans for meat. Only after learning the making of pots, these savage group started decreasing their nomadic behavior. Gradually they learn to start

The Commencement

Hello to everyone reading this. On my first ever blog, I just want to tell that I am a guy who loves reading good stuff regardless of any theme and respect all those who have indulged themselves in this art, what I consider noble, of writing either as a profession or for a hobby. Since I like reading and being an avid reader I felt I should also start writing. Whenever I thought of writing I always wanted to share my writing experience too. What else is the better way in today's context than sharing on the web? I can easily reach considerably more people through the web than through any other medium. Hence after searching the internet on writing and sharing, I came to know about blogger. The best part is that it's free! HAHA! Basically, these are the guiding factors why I have started this blog and hope I can write some good texts and share my experience with as many as I can.  Myself being an Engineer professionally I assume that my texts may contain some technical pe

Chapter 2: Footprints

Foot-printing is an art of gathering minute details of the target like IP, OS, Software installed, Security Systems, Location, Owners, Emails, Personal data etc. A hacker gathers all the details needed to break into the system. There are numerous ways to do this and also various tools and tricks available for this. Lets discuss some of them so that we can have some idea of what foot-printing is. Foot-printing can be categorized into two types on the basis of access mode. a) Active Mode b) Passive Mode                                 a) In Active Mode , the attacker makes actual contact with the target system. The active method includes process such as email tracking, website mirror, server confirmation. Email Track : Examine email path from where is email coming, the IP, the path it took. Tools like Email Tracker Pro (Link at bottom) provide such details. these details are used to trace the fake mail's source IP's, location and path. For this tracking, the email he