Ethical Hacking | An Introduction
Whenever term hacker comes before many people
consider it as a guy sitting inside a room or garage with a bottle or beer and
a Laptop or Desktop doing wonders on click of buttons. But the reality check is
hacking is not that easy as portrayed in movies and television and term hacker
doesn't mean a computer criminal.
So here first of all we'll clear all our misconceptions related to words hackers and hacking.
So here first of all we'll clear all our misconceptions related to words hackers and hacking.
From Where This Word Came:
The word hacking has history in late 1960's, the
time when computers were nothing but mighty pieces of machines and a computer
just meant a machine that can compute. Electrical and Electronics geeks used to
optimize circuits to make any system/circuit work faster, better and reliably.
The job they used to do on circuits was known as hack. With time computer geeks
also started finding way out to optimize their system to work better so in fact
hacking was nothing but always a kind of reverse engineering. With time in
professional world a word hacker got meaning, a person who is highly skilled in
hardware, software and networking components. Then movies started portraying
hackers do only dirty works and hence today the word hacker has a negative face
according to people. No matter how the word met to a dreadful end a hacker
always had all qualities that was first put forward in its definition may the
be criminal or ethical. Criminal hackers are also known as Crackers.
Types Of
Hackers:
White Hats: White hat hackers are good guys
who use their hacking skills for defensive purposes. Organizations and
industries pay them high salaries to protect their systems and networks from
intrusion.
Black Hats: Black hats are actually bad guys
in filed. Their main job is to breach security and make money. They make money
by using their hacking skills for offensive purposes.
Grey Hats: Gray hats are hackers who work
for offensive and defensive purposes depending on situations. They are hired by
people to intrude and protect systems.
Hactivist: A hacktivist is kinda hacker who
thinks hacking can bring out some social changes and hacks government and
organizations to show his discomfort over some trivial issues.
Suicide Hackers: Suicide hackers are those
who hack for some purpose and even don't bother to suffer long term jail due to
their activities. They can be bad as well as good.
Script Kiddie: A script kiddie is a person
who boasts breaking system using scripts and codes written by others though he
hardly knows what the code does.
Phreak: It is a person who tries to intrude
systems for fun or malicious personal activities. Mostly they are children of
age 12-15 who don't even know wrong consequences of hacking.
Types Of Hacking:
Local Hacking: This type of hacking is done
when a hacker has full access to the system to implant a virus, keylogger and
RATs
Remote Hacking: Remote hacking is done on a
remote system using Internet.
Social Engineering: Social Engineering is
kinda interacting skill that a hacker uses to manipulate people giving out
sensitive information. Its kinda trick done using good verbal, social skills
and understanding.
Terminologies Used Under Hacking:
Threat: A threat is an environment or
situation that could lead to a potential breach of security. Ethical hackers
look for and prioritize threats when performing a security analysis.
An Exploit: An exploit is a piece of
software that takes advantage of a bug, glitch, or vulnerability, leading to
unauthorized access, privilege escalation, or denial of service on a computer
system.
Vulnerability: A vulnerability is an
existence of a software flaw, logic design, or implementation error that can
lead to an unexpected and undesirable event executing bad or damaging
instructions to the system. In easy word vulnerability is weakness in system.
Payload: Payload is agent that helps in
taking advantage of vulnerability in remote hacking.
No comments:
Post a Comment