1. What is Hacking 
2. Types of Hacker
3. What is Ethical Hacking
4. why we need Ethical Hackers 
5. Phases of Hacking 


What is Hacking ?
Hacking is the process of exploiting system vulnerabilities and compromising security systems to gain unauthorized access to the system resources. 

Types of Hackers 

1.White Hat Hacker: White Hat Hacker will work for defensively purpose . They perform hacking and security checks with authority and  They are known as Ethical Hacker or Penetration Tester 

2. Black Hat Hacker: Hacker who works offensively purpose .They believe in breaking the  security without any permission or authority .They are known as Malicious Hackers or Crackers

3. Grey Hat Hacker : Hacker who is like a coin ,two sided They work for both defensively and  offensively


What is Ethical Hacking ? 

 

Ethical Hacking is the process to identify vulnerabilities to assure system security by use of hacking tools, tricks, and techniques. It focuses on simulating methods used by attackers to verify the existence of exploitable vulnerabilities in the system's security.

Why we need Ethical Hacker ?

 

● To fight against cyber crimes. 
● To protect information from getting into wrong hands. 
● To build a defensive mechanism that avoids hackers from penetrating. 
● To test the organization’s infrastructure security.


Phases of Hacking:

 




1.Reconnaissance Phase : In this phase ,Attacker find information about Target .It can be done actively or passively .It brings us closer to the target by giving some sensitive information 

2. Scanning Phase: In this phase ,Attacker find much more information about Target. Attacker can perform port scanning or various assessments in order to get sensitive information about target  

3. Gaining Access Phase:  In this phase ,Attacker actually performs Hacking using the previous phases and attacker takes advantage and perform exploit to gain access

4. Maintaining Access phase : In this Phase ,Attacker installs backdoors or Trojans in order to maintain access into the target system

5. Covering Tracks: In this phase, Attacker deletes the logs and session details in order to not be get caught 


    Next blog will be setting up lab for hacking and please like follow and share my page