0% found this document useful (0 votes)
2K views

Introduction To Ethical Hacking

Ethical hacking involves scanning systems for vulnerabilities to find potential threats without malicious intent. There are different types of hackers - white hat hackers work with authorization to test security, while black hat hackers access systems illegally and destroy data as criminals. Ethical hackers, or white hats, are certified to work with organizations and ensure protection from cybercrimes.

Uploaded by

api-250367508
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views

Introduction To Ethical Hacking

Ethical hacking involves scanning systems for vulnerabilities to find potential threats without malicious intent. There are different types of hackers - white hat hackers work with authorization to test security, while black hat hackers access systems illegally and destroy data as criminals. Ethical hackers, or white hats, are certified to work with organizations and ensure protection from cybercrimes.

Uploaded by

api-250367508
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

INTRODUCTION TO ETHICAL HACKING

To crack passwords or to steal data? No, it is much more than that. Ethical hacking is to scan
vulnerabilities and to find potential threats on a computer or networks. An ethical hacker finds the weak
points or loopholes in a computer, web applications or network and reports them to the organization.
So, let’s explore more about Ethical Hacking step-by-step.

Types of Hackers

A Hacker is a person who is intensely interested in the mysterious workings of any computer operating
system. Hackers are most often programmers. They gather advanced knowledge of operating systems
and programming languages and discover loopholes within systems and the reasons for such loopholes.

There are generally 10-types of Hackers, they are:

White Hat Hackers:

White hat hackers are the one who is authorized or the certified hackers who work for the government
and organizations by performing penetration testing and identifying loopholes in their cybersecurity.
They also ensure the protection from the malicious cyber crimes. They work under the rules and
regulations provided by the government, that’s why they are called Ethical hackers or Cybersecurity
experts.

Black Hat Hackers:

They are often called Crackers. Black Hat Hackers can gain the unauthorized access of your system and
destroy your vital data. The method of attacking they use common hacking practices they have learned
earlier. They are considered to be as criminals and can be easily identified because of their malicious
actions.

Gray Hat Hackers:

Gray hat hackers fall somewhere in the category between white hat and black hat hackers. They are not
legally authorized hackers. They work with both good and bad intentions; they can use their skills for
personal gain. It all depends upon the hacker. If a gray hat hacker uses his skill for his personal gains,
he/she is considered as black hat hackers.

Script Kiddies:

They are the most dangerous people in terms of hackers. A Script kiddie is an unskilled person who
uses scripts or downloads tools available for hacking provided by other hackers. They attempt to
attack computer systems and networks and deface websites. Their main purpose is to impress their
friends and society. Generally, Script Kiddies are juveniles who are unskilled about hacking.
Green Hat Hackers:

They are also amateurs in the world of hacking but they are bit different from script kiddies. They care
about hacking and strive to become full-blown hackers. They are inspired by the hackers and ask them
few questions about. While hackers are answering their question they will listen to its novelty.

Blue Hat Hackers:

They are much like the script kiddies; are beginners in the field of hacking. If anyone makes angry a
script kiddie and he/she may take revenge, then they are considered as the blue hat hackers. Blue Hat
hackers payback to those who have challenged them or angry them. Like the Script Kiddies, Blue hat
hackers also have no desire to learn.

Red Hat Hackers:

They are also known as the eagle-eyed hackers. Like white hat hackers, red hat hackers also aims to
halt the black hat hackers. There is a major difference in the way they operate. They become ruthless
while dealing with malware actions of the black hat hackers. Red hat hacker will keep on attacking the
hacker aggressively that the hacker may know it as well have to replace the whole system.

State/Nation Sponsored Hackers:

State or Nation sponsored hackers are those who are appointed by the government to provide them
cybersecurity and to gain confidential information from other countries to stay at the top or to avoid
any kind of danger to the country. They are highly paid government workers.

Hacktivist:

These are also called the online versions of the activists. Hacktivist is a hacker or a group of anonymous
hackers who gain unauthorized access to government’s computer files and networks for further social
or political ends.

Malicious Insider or Whistleblower:

A malicious insider or a whistleblower could be an employee of a company or a government agency


with a grudge or a strategic employee who becomes aware of any illegal activities happening within the
organization and can blackmail the organization for his/her personal gain.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy