Basics of Ethical Hacking

 Basics of Ethical Hacking: What is hacking, who is hacker, types of hackers, Five phases of ethical hacking, CIA traid All you need to know about Basics of Ethical Hacking Should all people interested in Ethical Hacking know about Basics of Ethical Hacking

All this is being told to you through educational purpose, do not misuse it.

important note

Basics of Ethical Hacking

We are telling you about basics of ethical hacking in easy language, on the Internet you get to see different definitions of everyone, but here we are telling you everything from our experience.

What is Hacking

In basics of ethical hacking, first of all you are being told about what is hacking, whenever the word of hacking is heard in India, something like illegal work comes to everyone's mind.

If we tell someone that we are hackers, they tell us to hack my Facebook account, hack my WhatsApp account, but hacking can only be understood by those who are from this field and learn everything well.

Basics of Ethical Hacking

Hacking is not a crime of any kind, it all depends on how you use your hacking skills, if you use your hacking skills with bad intention, then it is called a crime.

If you read cyber law, you will also know that we hack anyone's Android phone for our entertainment or for any reason, but this is also a cyber crime under Section 66.

If you hack a website using vulnerbilities, and they access the website's admin panel or compromise a security, it's hacking. As you read our Basics of Ethical Hacking article, you will get answers to all the questions.

Even if you access someone's system or make any changes to a system, website, or application, it's still called hacking.

But if we say from our experience, most people consider hacking only as social media hacking, but it is not that hacking is a very big field that has no end.

Who is Hacker

If you say in one line who the hacker is, then that line will be something like this, a hacker knows something that the normal user does not know, he knows where and how to use his skills.

In the article how to become an ethical hacker, you have been told everything, what skills are needed to be learned to become a hacker, if you also learn all those skills, then you are also called a hacker.

But we want to tell you one thing based on our experience that black hat hacking definitely costs a lot of money but it is of no use, so you should become a White Hat Hacker only if you want to make your carrer in this field.

Types of hackers

In basics of ethical hacking, now we talk about the types of hackers, there are mainly three types of hackers, White Hat hackers, Black Hat hackers, Grey Hat hackers, but apart from these, there are also some types of hackers.

Basics of Ethical Hacking

White hat Hacker

An ethical hacker is called a white hat hacker. This is the first type of hackers. White Hat Hacker does not do any illegal hacking. He uses his skills to help others.

As our country is becoming digital, the risk of hacking is also increasing. Because nowadays everything is happening online, if you want to make your carrer in this field then you have to become a White Hat Hacker.

In such a situation, many ethical hackers are needed in India. Like if you want to hack a website. Then the hacker first takes the written permission of the owner of the website, he takes permission before doing any kind of hacking.

If he commits any kind of hacking without permission, legal action can be taken against him, so he does not indulge in any kind of illegal hacking.

Black Hat Hackers

Black Hat hackers misuse their skills. Black Hat hackers do not mean that they harm someone by doing this, they also do hacking for their own fun.

He doesn't care about anything before he's hacking. It does not take any kind of permission to do any kind of hacking.

In today's time, everyone's attention goes to black hat hacking because everyone needs money in a shortcut way from black hat hacking and people do illegal work in the greed of this money, but we give you 9-10 years of experience.

If you do Black Hat hacking, then in the beginning you will feel very good because you will see money, but there will come a time when you will lose sleep and you will be stressed, so you should never go towards Black Hat Hacking.

Grey Hat Hacker

They do both types of hacking, but they do not do Black Hat hacking in front of anyone. To show this, he does White Hat Hacking, but he also does Black Hat Hacking for his own benefit or entertainment.

These hackers have both types of hacking skills. They use hacking to look good. We hope you like this article on Basics of Ethical Hacking in Hindi

Script Kiddies

Script Kiddies hacker is also known as noobs, but Script Kiddies are made a lot of fun, but the truth is that in today's time, whoever has achieved a good position, they are also the first Script Kiddies.

If you research about Script Kiddies hacker on Google or YouTube, you find that if you use tools then you are Script Kiddies Hacker but this is not the case.

If you see any experienced ethical hacker using all the tools, then there will be no one who does not use the tools made by others because the tools save us a lot of time.

If we start doing all the work manually we will have to spend a lot of time and no one has so much time like if we have to do subdomain enumeration, if we start finding subdomains manually we will be out for months.

But if we do this work with the help of tools, then our work is done in a few hours, so the question arises that let's tell you about what the script kiddies hacker is.

Here we are not saying anyone's knowledge wrong, we are telling from our experience that whatever tool you use, if you do not know how that tool works or you are not able to understand its coding then you are script kiddies hackers.

But if you are a script kiddies hacker then you should never be ashamed because everything starts here, you are a beginner, sometimes I will tell you about myself, then you will understand that you can go beyond me. 

Hacktivist Hacker

Hacktivists are those who mostly hack websites. Such as Denial of Service (DOS) Attack, Website Defacement and Web Hacking. He uses his skills to spread social and political messages.

For example, suppose they have defacemented a website, so they work to promote some kind of political message through the deface page, just as a large amount of website defacement is done on Independence Day.

Suicide Hackers

As the name suggests, suicide hackers are those who have no fear of any kind, such as if they are jailed or punished in any way, they do not care.

Suicide hackers can also be said to be very dangerous because they do not care about the consequences of hacking, some hackers commit suicide after hacking. Suicide hackers can be related to suicide bombers

State-sponsored hackers

State-sponsored hackers are those who mostly do hacking related to the government, such as if you leak secret information about the government or harm the government's systems in some way, you are called state-sponsored hackers.

In basics of ethical hacking, after this you will be told about the five stages of hacking, but here we want to tell you one thing. Apart from these types of hackers, there are many types of hackers such as Blue Hat Hacker, Green Hat Hacker, Red Hat Hacker and Cyber terrorists.

But it is not possible to tell about everyone in one article, but we have tried our best to tell about as many types of hackers as possible here.

Five Phases of Ethical Hacking

Let's talk about the five phases of ethical hacking, this is a very important concept, so do not leave it, when you have any kind, you have to follow these five stages of ethical hacking.

Recognition

The first phase of the five phases of ethical hacking is reconnaissance, we can also call it footprinting or information gathering, before carrying out any kind of hacking attack, the target information is collected.

If you collect information about your target properly, then it increases the chances of your hacking attack succeeding, so first of all you should collect information.

For example, suppose your target is a website, then you should collect as much information as you can about the website owner, about the website's database, about the website's vulnerblities, etc.

Scanning

The next phase after reconnaissance is scanning. There are also three stages of scanning, pre-attack phase, port scanner and extract information. It depends on what the hacker's goal is.

For example, if the target is some kind of device or computer, things like port scanning and extracting information are done, such as knowing about open ports, knowing whether the system is alive, knowing about running services, locating the operating system, etc.

If the hacker collects some kind of specific information in a network using information collected by reconnaissance, it is called a pre-attack phase. We hope you like this article on Basics of Ethical Hacking in Hindi

Gaining Access

The name of gaining access suggests that hackers access their target, all hackers want to access the target, in simple language, getting access is a phase where everyone wants to reach.

But it is necessary to follow the first two steps to gain access, a hacker cannot directly reach his goal, depending on what the goal of the hacker is.

If there is a target system here, then the system has to be accessed, if the target is any kind of website then it has to take Cpanel or Admin access to the website, even if the target is some kind of application, it has to get admin access.

Maintaining Access

As the name suggests, once you have reached the target, it is also necessary to maintain it as sometimes the targeted device loses access due to a connection breakdown.

Therefore, hackers inject some kind of malicious code or file into their target after access so that access can be created again after access, so trojans and backdoors are used a lot for this.

Clearing tracks

Clearing tracks is the most important and final step of ethical hacking in five stages because a hacker never wants anyone to know about the hacking attacks he has committed.

As the name suggests, in this all the activities done by the hacker are hidden or removed, no hacker ever wants to be caught, understand it by example.

For example, suppose your target is some kind of system and it has windows and you have access to that system, then some kind of file has come out of your system and if you have turned it off then the owner of the system may be suspicious.

But if you know about Clear Tracks, then after accessing the system here, after doing your work, you go to the recent activity and delete your activities, then this thing is called Clearing Tracks. In basics of ethical hacking, it is very important to know about these five phases.

What is CIA Triad in Ethical Hacking?

A very important concept in basics of ethical hacking is that of cia traid. The CIA traid is divided into three parts: Confidentiality, Integrity, and Availability. Here all three have different meanings.

Confidentiality includes the organization's efforts to ensure that data is kept secret or private. To accomplish this, access to information must be controlled to prevent unauthorized access to data – whether intentional or accidental.

A key component of maintaining integrity is to ensure that without proper authorization people are prevented from accessing assets important to your business. We hope you liked this article on basics of ethical hacking.

Integrity here means that whatever data we are sending to someone should reach your destination completely and there should be no change in the data we have sent.

Availability here means that whenever we need our data, it is always available, you can connect it to raid technology in a hard disk. This means that systems, networks and applications should work as they should and when they should.

The Conclusion

We hope that you have come to know about basics of ethical hacking here in this article we have tried our best to tell you as many things as possible about basics of ethical hacking.

We have told you about what is hacking to CIA traid in basics of ethical hacking, everything mentioned here should be known to a beginner, so all this is told to you in the article of Basics of Ethical Hacking.

If you still have any question related to Basics of Ethical Hacking, then you can ask in the comment box, if you like our Basics of Ethical Hacking article, then definitely share this.

thank youFacebook

SPYRO (Mr SAMYAK)

Ethical Hacker

Previous Post Next Post

Contact Form