Basics of Ethical Hacking: Chapter 1(Theory)

Chapter 1

                Intro to Ethical Hacking


                               What is Ethical Hacking

·      An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.Ethical hacking is used to protect a system or a target.

 

What is bug bounty?

·      A bug bounty program is a deal offered by many websites and software developers by which individual can receive recognition and compensation for reporting bugs , especially those pertaining to exploits and vulnerabilities. These program allow the developers to discover and resolve bugs before the general public is aware of them, preventing incident of widespread abuse.

·      Bug bounty programs have been implemented by a large numbers of organizations including

·      Mozilla, Facebook, Yahoo, Google, Reddit, Microsoft etc

 

What is penetration testing?

·      A penetration test, colloquially known as a pen test, is an authorized simulated attack on a computer system , perform to evaluate the security of the system. The test is performed to identify both weakness (also referred to as vulnerabilities ) , including the potential for unauthorized parties to gain access to the system’s

features and data , as well as strengths , enabling a full risk assessment to be completed.

 

What is forensic analysis?

·      Computer forensic is the application of investigation and analysis techniques to gather and preserve evidence from a particular  computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

 

Who is a Hacker?

·      A hacker is a person who finds and exploits weakness in computer systems to gain access.

·      A hacker is a person who thinks outside the box.

·      A hacker is a person who discovers unknown features and properties in a computer or in a computer network.

·      A hacker is person who is highly creative and dedicated to knowledge.

·      All hackers are not criminals that are depending on their work.

 

Types of Hacker

There are three types of hacker

·      White hat hacker

·      Black hat hacker

·      Grey hat hacker

 

White hat hacker:

A hacker who gains access to system with permissions to fix the identified weakness. They may also perform penetration testing and vulnerability assessment.

 

Black hat hacker:

A hacker who gains unauthorised access to computer systems for personal gain. The intent is usually to steal corporate Data, violate privacy rights, transfer funds from bank accounts etc.

Grey hat hacker:

A hacker who perform both actions according to the situations of a white hat and a black hat hacker.

Who is a cracker?

·      A cracker is also called black hat hacker.

·      Cracker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties. The general view is that, while hackers build things, crackers break things.

·      A cracker is a computer user who attempts to break into copyrighted software or a network computer system.

What is hacking?

·      Hacking is the process used by an attacker to take control on a target without his will.

·      Mostly hacking is used for criminal activities.

·      There is no ethics in hacking.

What is ethical hacking?

·      An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owner for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.

·      Ethical hacker is used to protect a target or a system.

Terms used in hacking?

·      Script kiddies is a non-skilled person who gains access to computer system used already made tools.

·      Hacktivist_A hacker who use hacking to send social, religious and political, etc. messages. This is usually done by hijacking websites and leaving the massage on the hijacked website.

·      Phreacker_A hacker who identifies and exploits weakness in telephones instead of computers.

·      Exploit this is a clearly defined way to breach the security of a system.

·       

·      Botnet A botnet is a group of computers controlled without their owner’s knowledge and used to send spam or make denial of service attacks.

·      Rootkit A rootkit is a set of software programs used to gain administrator-level access to a system.

·      Spam Unwanted and unsolicited email and other electronic message that attempts to convince the receiver to either purchase a product or service, or use that prospect to defraud the recipient.

·      Hack value this term describes a target that may attract an above-average level of attention to an attacker. Presumably because this target is attractive, it has more value to an attacker because of what it may contain.

·      Zero day this describes a thread or vulnerability that is unknown to developers and has not been addressed. It is considered a serious problem in many cases.

·      Vulnerability weakness of a system.

·      Phishing is the attempts to obtain sensitive information such as usernames, password, and credit card details, often for malicious reasons, by sending an email that looks as if it is from a legitimate organization; usually it contains a fake website or link.

·      Pharming is yet another way hackers attempts to manipulate users on the internet. Pharming redirects users to false website without them even knowing it.

PPremium Course Link: www.instamojo.com/RITETECHNOLOGYINDIA


 

 

 


Comments

Popular Posts