Ethical Hacking
Ethical hacking is a process to gaining access of a computer or a organisation for the improving the security of the organisation or a device.
Ethical hacking is a authorised process to practice of detecting vulnerabilities in an application, system, or organisation's infrastructure and bypassing system security to identify potential data breaches and threats in that particular network.
Ethical hacking is also known as white hat hacking or Penetration Testing. Who does this work known as ethical hacker, White Hat Hacker or a Security Expert .
Ethical Hacker also uses the same tool, techniques and OS to gain the access to the system but with the all permission of authorised person and authority.
Related Posts :
What Is Hacking :
Needs of Ethical Hacking
- Testing password strength
- Ensuring security settings and privilege levels in the domain account and database administration by testing out exploits
- Penetration testing after every software update/upgrade or after adding a new security patch
- Ensuring that data communication channels cannot be intercepted
- Testing validity of authentication protocols
- Ensuring security features in applications, which protect organizational and user databases
- Defence against denial-of-service attacks
- Network security and testing of anti-intrusion features
Ethical Hacking : Types
We can define hacking into different categories, based on what is being hacked.- Network Hacking
- Website Hacking
- Computer Hacking
- Password Hacking
- Email Hacking
- Wireless Hacking
- Social Engineering
Network Hacking :
Network Hacking is all about hacking the networks in this type of hacking hacker gather the required information about the network to harm , stop the service of a network and steal valuable information from that network. Tools used in it like Telnet, NS lookup, Ping etc.
Website Hacking :
Computer Hacking :
Password Hacking :
Email Hacking :
Wireless Hacking :
Social Engineering :
Phases of Hacking
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Erasing Clues
Reconnaissance :
- Passive reconnaissance
Internet directory enquiries
Search in the newspaper for job ads in the IT department of Company X.
Searches on social networks
Retrieving information from the trash.
- Active Reconnaissance
Ping sweeps to determine the active public computers within a range of IP’s.Connecting to a service port in order to gather a banner and try to determine the software version.Using social engineering to obtain confidential information.Make a network mapping to determine the existence of a firewall or border router.
Ethical Hacker : Tasks
Let’s talk about the Certified Ethical Hacker’s responsibilities:- Meeting with your client to go through the security systems currently put in place
- Verifying the organization’s system, network topology, and vulnerable entry points
- Performing penetration testing on the system.
- Identifying and documenting security flaws and vulnerabilities
- Testing the level of security in the network
- Finding out the best security solutions
- Creating penetration test reports
- Performing penetration testing after the implementation of suggested or new security features
- Finding out alternatives to security features, which are not working
Advantages Of Hacking
- There are various advantages of hacking:It is used to recover the lost of information, especially when you lost your password.
- It is used to perform penetration testing to increase the security of the computer and network.
- It is used to test how good security is on your network.
Disadvantages Of Hacking
- There are various disadvantages of hacking:It can harm the privacy of someone.
- Hacking is illegal.
- Criminal can use hacking to their advantage.
- Hampering system operations.


