Ethical Hacking
Ethical Hacking
Ethical Hacking
Who is Hacker? :
A hacker is a person who breaks into a computer system or other
Electronic devices legally or illegally. The reasons for hacking can be many:
installing malware, stealing or destroying data, disrupting service, and more.
Hacking can also be done for ethical reasons, such as trying to find software
vulnerabilities so they can be fixed.
1
Types of Hackers:
2
A grey hat hacker is a Cyber-Security expert who finds ways to
hack into computer networks and systems, but without the malicious intent of a
black hat hacker.
3
Red hat hackers are hired by government agencies to spot
vulnerabilities in security systems, with a specific focus on finding and
disarming black hat hackers. They’re known to be particularly ruthless in their
hunt for black hat criminals, and typically use any means possible to take them
down. This often looks like using the same tactics as black hat hackers and
using them against them using the same malware, viruses and other strategies to
compromise their machines from the inside out.
4
A gaming hacker is someone who focuses their hacking efforts
on competitors in the gaming world. With the gaming industry booming, it’s no
surprise that its own specialized category of gaming hackers have emerged as a
result. Professional gamers might spend thousands of dollars on high-
performance hardware and gaming credits, and hackers typically carry out their
attacks in an attempt to steal competitor’s credit caches or cause distributed
denial-of-service attacks to take them out of the game.
1. Reconnaissance:
5
easily. Foot-printing provides important information such as the domain name,
TCP and UDP services, system names, and passwords. There are also other
ways to do foot-printing, including impersonating a website by mirroring it,
using search engines to find information about the organization, and even using
the information of current employees for impersonation.
2. Scanning:
In this phase, the hacker identifies a quick way to gain access to a
network and look for information. There are three methods of scanning: pre-
attack, port scanning/sniffing, and information extraction. Each of these phases
demonstrates a specific set of vulnerabilities that the hacker can utilize to
exploit the system's weaknesses. The pre-attack phase is where the hacker scans
the network for specific information based on the information gathered during
reconnaissance. The port scanner or sniffing phase is where scanning includes
the use of dial, port scanners, vulnerability scanners, and other data-gathering
equipment. The information extraction phase is where the attackers collect
information about ports, live machines and OS details to launch an attack.
3. Gaining access:
The hacker gains access to the system, applications, and network,
and escalates their user privileges to control the systems connected to it.
4. Maintaining Access:
Here, the hacker secures access to the organization’s Rootkits and
Trojans and uses it to launch additional attacks on the network.
5. Clearing tracks:
Once the hacker gains access, they cover their tracks to escape the
security personnel. They do this by clearing the cache and cookies, tampering
the log files, and closing all the open ports. This step is important because it
clears the system information making hacking a great deal harder to track.
6
Hacking a computer to view or steal protected information does
not resolve anything and only causes further issues, such as being fined or sent
to prison. Instead of doing anything illegal, learn an alternative operating
system (e.g., Linux), set up computer networks, read security news, and learn a
programming language.
If you've done this and still want to hack, try hacking your home
network. That way, you don't have to worry about getting in trouble. Hacking
your network helps you learn how to hack and teaches you how to defend
yourself from hackers, which is a valuable skill needed by businesses. Also, we
recommend taking a training course on ethical hacking to assist you in getting a
computer security-related job.
7
There are different kinds of ethical hacking practices since
almost every component of a system can be hacked and these ‘hacking’
performances require deep knowledge regarding that component. Below you
can find a list of different ethical hacking practices:
2. System hacking:
System hacking is defined as the compromise between
computer systems and software to access the target computer and steal or
misuse their sensitive information. The malware and the attacker identify and
exploit the vulnerability of the computer system to gain unauthorized access.
For example,
8
requires an Ethernet cable. Instead, data packets are airborne and available to
anyone with the ability to intercept and decode them. Several reports have
explained weaknesses in the Wired Equivalent Privacy (WEP) algorithm by
802.11x standard to encrypt wireless data.
5. Social engineering:
Benefits:
The primary benefit of Ethical Hacking is to prevent data from
being stolen and malicious attackers.
Discovering vulnerabilities from an attacker’s POV so that weak
points can be fixed.
Implementing secure network that prevent security breaches.
Defending national security by protecting data from terrorists.
Protect networks with real world assessments.
9
An ethical hacker should have in-depth knowledge about all the systems,
networks, program codes, security measures, etc. to perform hacking efficiently.
Some of these skills include:
10
Practice safe email and virus/malware protocols:
Conclusion:
Ethical Hacking is a challenging area of study as it requires mastery of
everything that makes up a system or network. In today’s world, cyber-security
has become a trending topic of increasing interest among many businesses.
With malicious hackers finding newer ways to breach the defences of networks
almost every day, the role of ethical hackers has become increasingly important
across all sectors.
11