Learn hacking

Sourabh rahad

Home     About us     Contact us     Hacking



Table of concepts:-

1. What is ethical hacking ?

2.What's are the key concepts of ethical hacking ?

3.what does an ethical hacker do?

4.How are ethical hacker Are different than  malicious hackers ?

5.What skill and crertifications should  an ethical hacker obtain !

6.what problem does hacking identify?

7.what are some limitations of ethical hacking?







How to protect yourself from hackers

What is ethical hacking ? 


Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

Also known as “white hats,” ethical hackers are security experts that perform these assessments. The proactive work they do helps to improve an organization’s security posture. With prior approval from the organisation or owner of the IT asset, the mission of ethical hacking is opposite from malicious hacking. 


What's are the key concepts of ethical hacking ?


Hacking experts follow four key protocol concepts:

  1. Stay legal. Obtain proper approval before accessing and performing a security assessment.
  2. Define the scope. Determine the scope of the assessment so that the ethical hacker’s work remains legal and within the organization’s approved boundaries.
  3. Report vulnerabilities. Notify the organization of all vulnerabilities discovered during the assessment. Provide remediation advice for resolving these vulnerabilities.
  4. Respect data sensitivity. Depending on the data sensitivity, ethical hackers may have to agree to a non-disclosure agreement, in addition to other terms and conditions required by the assessed organizations



What does an ethical hacker do?

An ethical hacker mainly does scanning ports by looking for vulnerabilities.

Another main job of ethical hackers is to check patch settings and ensure that these installation cannot be misused. The  hackers can participate in social engineering concepts like diving-diving or scavenging in bins for charts or passwords that can be used to engender an attack. Ethical hacker avoid instruction detection and prevention systems. Additionally, an ethical hacker bypasses and hakcs wireless encryption as well as hijacks web application and web servers. Ethical hacker handle problems associated with the theft of laptops and fraud with employees


How are ethical hacker Are different than  malicious hackers ?

Ethical hackers use their knowledge to secure and improve the technology of organizations. They provide an essential service to these organizations by looking for vulnerabilities that can lead to a security breach.

An ethical hacker reports the identified vulnerabilities to the organization. Additionally, they provide remediation advice. In many cases, with the organization’s consent, the ethical hacker performs a re-test to ensure the vulnerabilities are fully resolved. 

Malicious hackers intend to gain unauthorized access to a resource (the more sensitive the better) for financial gain or personal recognition. Some malicious hackers deface websites or crash backend servers for fun, reputation damage, or to cause financial loss. The methods used and vulnerabilities found remain unreported. They aren’t concerned with improving the organizations security posture.


What skill and crertifications should  an ethical hacker obtain !


An ethical hacker should have a wide range of computer skills. They often specialize, becoming subject matter experts (SME) on a particular area within the ethical hacking domain.

All ethical hackers should have:

  • Expertise in scripting languages.
  • Proficiency in operating systems.
  • A thorough knowledge of networking.
  • A solid foundation in the principles of information security.

Some of the most well-known and acquired certifications include:

What problem does hacking indentify ?


While assessing the security of an organization’s IT asset(s), ethical hacking aims to mimic an attacker. In doing so, they look for attack vectors against the target. The initial goal is to perform reconnaissance, gaining as much information as possible.

Once the ethical hacker gathers enough information, they use it to look for vulnerabilities against the asset. They perform this assessment with a combination of automated and manual testing. Even sophisticated systems may have complex countermeasure technologies which may be vulnerable.

They don’t stop at uncovering vulnerabilities. Ethical hackers use exploits against the vulnerabilities to prove how a malicious attacker could exploit it.

Some of the most common vulnerabilities discovered by ethical hackers include:

  • Injection attacks
  • Broken authentication
  • Security misconfigurations
  • Use of components with known vulnerabilities
  • Sensitive data exposure

After the testing period, ethical hackers prepare a detailed report. This documentation includes steps to compromise the discovered vulnerabilities and steps to patch or mitigate them.



What are some limitations of ethical hacking?


  • Limited scope. Ethical hackers cannot progress beyond a defined scope to make an attack successful. However, it’s not unreasonable to discuss out of scope attack potential with the organization.  
  • Resource constraints. Malicious hackers don’t have time constraints that ethical hackers often face. Computing power and budget are additional constraints of ethical hackers.
  • Restricted methods. Some organizations ask experts to avoid test cases that lead the servers to crash (e.g., Denial of Service (DoS) attacks). 


 
Different types of Hackers?

The term “hacker” is popularly associated with cybercriminals harboring malicious intentions, when in reality, it’s a lot more. A hacker can be anyone who utilizes their computer software and hardware knowledge to break down and bypass a computer, device, or network’s security measures. It’s popularly believed hacking is illegal on principle, which isn’t the case if a system owner willingly and knowingly grants access. In fact, many private entities and government agencies hire hackers to help maintain their system’s security.

There are two main factors that determine what type of hacker an individual is: their motives and legality of their actions. Hackers are divided into three types—white, black, and grey hat, a naming system that was derived from old western films, where the protagonists would always wear white hats and vice versa for villain characters.




1.  Black Hat  Hacker:

Black hat hackers are normally responsible for creating malware, which is frequently used to infiltrate computerized networks and systems. They’re usually motivated by personal or financial gain, but can also participate in espionage, protests, or merely enjoy the thrill. Black hat hackers can be anyone from amateurs to highly experienced and knowledgeable individuals looking to spread malware, steal private data, like login credentials, along with financial and personal information. Upon accessing their targets and depending on their motives, black hat hackers can either steal, manipulate, or destroy system data


2. White Hat Hacker :


Also known as “ethical hackers,” they’re often employed or contracted by companies and governmental entities, working as security specialists looking for vulnerabilities. While they employ the same methods as black hat hackers, they always have permission from the system’s owner, making their actions completely legal. White hat hackers implement strategies like penetration tests, monitor in-place security systems, along with vulnerability assessments. Ethical hacking, the term used to describe the nature of a white hat hackers’ actions, can even be learned through independent sources, training, conferences, and certifications.



3.Grey Hat Hacker : 

As the name suggests, these individuals utilize aspects from black and white hat hackers, but will usually seek out vulnerabilities in a system without an owner’s permission or knowledge. While they’ll report any issues they encounter to the owner, they’ll also request some sort of compensation or incentive. Should the owner not respond or reject their proposition, a grey hat hacker might exploit the newfound flaws. Grey hat hackers aren’t malicious by nature, but do seek to have their efforts rewarded. Since grey hat hackers don’t have permission to access the system by its owner, their actions are ultimately considered illegal, despite any alarming findings they might reveal.


4.Red Hat  Hacker:

The objective of a red hat hacker is to find lack hat hackers,interceptand destroy their schemes.


5.Blue hat hacker:

In one word, this is the amateur.Usually,theirt techniques are deployed out of ill motives such as revenge attacks.


6. Script Kiddie:

This refers to the newbies. They don’t cause excessive damage; they use downloaded hacking software or purchased scripts to bombard traffic sites or simply disrupt the regular activity of a website.

7 . Green Hat  Hacker:


This is the set of individuals who simply want to observe and learn about the world of hacking. It comprises those who join learning communities to watch videos and tutorials about hacking.


8.  Social Engineering Hackers:


These are hackers who use psychological manipulation to make people to divulge private contents or to perform certain actions. It is a more complex crime scheme.

9. Hactivits:


These are the types of hackers who break into systems and networks just to draw attention towards an alarming social causlitically motivated attackers who break into computer systems to stir up violence against non-combatant targets by subnational groups or clandestine agents.

 10. State/Nation Sponsored Hackers:



These are hackers who are employed by a country to attack the cybersphere of another nation or international agency as a result of warfare or to retrieve/steal information.

11. Malicious Insider/Whistle-blower Hacker:

These are the types of computer hackers who leak sensitive information from within an organization, especially data under the umbrella of government agencies.

12. Elite Hackers:

These are individuals who are considered the “cutting-edge geniuses”. They  are the real experts and the innovators in the field of hacking.


Quick links:



     



Contact for jobs : 



You can earn 5000 Rs. Daily 💵💵 .....it's depending on your working hours.



                                                






Comments