Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Introduction to hacking

 So let’s start with basics.


As you know, in today’s world everyone use computers. Some individual’s for entertainment, some for business. And with this growing popularity in the cyber world, there had been many risks like data deletion, Computer malware, computer Hacking etc. Someone can anytime perform these types of activities against you. 
This post is to tell you about those things. These malicious activities are increasing day by day with increment in technology. Hacking is from one of those risks. So today, here in this post we will discuss about some basics of hacking and about Hackers

See Also: - how to change your ip address


So get ready.

We can assign two definitions to hackers on the basis of tradition and new hackers.

Traditional Hackers: - A person who loves to play and tweak with computer and its programs, a person who enjoy writing new computer programs. And use computer with their own program or code.

Today’s Hackers: - An individual who uses his/her expertise to gain unauthorized access to anyone’s computer and perform harmful tasks and activities like deleting data, uploading viruses and stealing the information. This activity is called hacking. Hacking is done by using some tools.

See  Also: - how to create iso image from a dvd

Types of Hackers

Black Hat Hackers: - Those are the guys who hack another’s computer in order to gain malicious unauthorized access to any one’s computer using illegal tools and perform malicious activities like destroying the data, uploading the malware and can also destroy computer.

White Hat Hackers: - These are called Ethical Hackers also. Those are hackers who hack into someone’s computer with permission in order to test and then evaluate the security of computers. There is very good scope of job in this IT Security field. To get job in this field, you need a Certified Ethical Hacker (CEH) certificate.

Grey Hat Hackers: - Those are hackers who do both activities of white and black hat hackers. They do malicious activities when they are alone and Ethical Hacking activities on front of other’s. They also use same types of tools.

Freakers: - Those types of hackers are related to mobile phone hacking. They only use their skills only in mobile technology.

Script Kiddies: - These are individuals who only interested in hacking. They don’t follow any rules while hacking. They also don’t know their causes.


But in this blog, we will learn about Ethical Hacking. So let’s explore some phases of ethical hacking. These phases are actually the steps in hacking. So, below I have listed all the steps of doing ethical hacking.

Phase 1 (Information Gathering): - First phase or step in Ethical hacking is information gathering. In this step we will gather all the information about the target like ip address, server, emails etc. We can get this information online or by using some tools.

Phase 2 (Scanning): -It is second phase. In this, we will scan the vulnerabilities and open ports of our target system using some tools. Vulnerability is a technical security weakness in system which can lead to various malicious attacks. Some types of vulnerabilities are Cross Site Scripting, DDos attack, SQL injection etc.

Phase 3 (Attacking): - After all above steps, we will attack on targeted system based on the information gathered and scanned vulnerability or ports. We will attack by injecting the payloads or exploits using some specified software like Metaspploit.

Phase 4 (Covering Tracks): - After attacking the targeted system we will install backdoors and cover our all tracks. Backdoor is nothing it is only a software or small coded program which will allow us to connect anytime with targeted system when installed in computer.

See Also: -how to share android phone internet connection with pc

And that’s all.
We will tell you more about ethical hacking in our next article.  



This post first appeared on Cool Hacking Tricks, please read the originial post: here

Share the post

Introduction to hacking

×

Subscribe to Cool Hacking Tricks

Get updates delivered right to your inbox!

Thank you for your subscription

×