Skip to main content

Chapter 1: Introduction to Ethical Hacking

Hacking is an unauthorized access into a system of any kind. By the word any kind, I literally mean any, any kind, be it a digital system or one without even a single digital component. The suitable name for one who breaks into computer's hardware or software is "Cracker", but in general use hacker is the term that has got more attention.

 Ethical Hacking
Hacking made ethical is ethical hacking. The expert computer crackers are called on for deliberate hacking attempt by the authorities of an organization, in order to test their own security level to be aware of their own vulnerabilities. Thus, ethical hacking is hacking a system to know its vulnerabilities by gaining full authority from concerned organization for such an attempt.

In today's world of cyber-crime, almost every organization, business need security. The best way to be secured is to think in the way as that of attacker. Thus, ethical hacking is soaring in importance and hence the popularity.

 Types of Hackers
  • Black Hat
    • One who hacks to gain attacks into an unauthorized zone in order to access money, trusts, valuable data with motive of political, economic, religious etc benefits.  
  • White Hat
    • A non-malign hacker who hacks for vulnerability analysis by gaining authority from organization itself
  • Gray Hat
    • Those hackers who pretend to be white hats but are black hat
  • Suicide Hacker 
    • A hacker who does not have full prior knowledge of target, target environment and prevailing laws
  • Script Kiddie
    • One who  is new to hacking or just knows few underlying concepts and attacks the target using code or scripts of others
 This was a basic introduction of Ethical Hacking. There is a lot more to it in its technical details. In the next chapter, I will discuss about Footprints, an important aspect of hacking.

Disclaimer: By publishing this article and this series of complete ethical hacking, I , by no means encourage any of malicious hacking attempt and am myself against such attempts.







Comments

Popular posts from this blog

Brief Background Of Culture of Nepal

Today's Nepal is a unified Nepal. Present Nepal is the result of the unification of 46 smaller kingdoms. This unification was carried by the then His Majesty King Prithvi Narayan Shah. Nepal is lauded worldwide for its remarkable cultural practices. Today we will look how the present art and culture of Nepal came into existence and how its continuous development of took place in various instances of history. Three to four thousands year ago, the Neolithic matriarchal groups of Mongol, China and Bhote entered today's Kathmandu Valley. Since the Kathmandu valley was a lake then, these group settled themselves in the higher region of the hills surrounding the lake. Some of these places were Sankwo(today's Bajrayogini) and Puchwo(today's Phulchowki). The primary means of living were hunting and livestock. They also killed humans for meat. Only after learning the making of pots, these savage group started decreasing their nomadic behavior. Gradually they learn to start ...

Chapter 2: Footprints

Foot-printing is an art of gathering minute details of the target like IP, OS, Software installed, Security Systems, Location, Owners, Emails, Personal data etc. A hacker gathers all the details needed to break into the system. There are numerous ways to do this and also various tools and tricks available for this. Lets discuss some of them so that we can have some idea of what foot-printing is. Foot-printing can be categorized into two types on the basis of access mode. a) Active Mode b) Passive Mode                                 a) In Active Mode , the attacker makes actual contact with the target system. The active method includes process such as email tracking, website mirror, server confirmation. Email Track : Examine email path from where is email coming, the IP, the path it took. Tools like Email Tracker Pro (Lin...

Sublimate the Torpor: Turn it productive

Hello, everybody! How are you all? It's been two days that I have not updated my blog. Well, today I am going to write about my last two/three days. Past two days, literally, I have remained dull and inactive. These two days must be the most inactive days I experienced in past 6 months. I am having free time at home these days as I am on the night shift at my job currently. So, there is not pretty much to do at daytime. I recently appeared GRE and thus have no academics to study too. Now I am planning to take TOEFL test within a month which will complete all the tests that I need to appear in order to apply to colleges of USA. So, just ruminating on how to utilize my leisure time, I thought to build up myself for TOEFL. One aspect of mine I really need to improve is my English-speaking. So, I decided to watch some Hollywood movies which could help me develop my speaking, listening abilities as well as can help me improve my ascent. These few days, I watched few movies plus an epi...