Follow Us

Simply Learn Ethical Hacking Part1

Ethical Hacking :

Hacking is sometimes legal as long because it is being done to search out weaknesses in a very Pc or network system for the testing purpose. this kind of hacking is what we have a tendency to decision moral Hacking.
A computer user UN agency will the act of hacking is named a "Hacker". Hackers ar those that get information, to grasp however systems operate, however they're designed, and so plan to play with these systems.

Types of Hacking:

We can segregate hacking into different categories, based on what is being hacked. Here is a set of examples: 
  1. Website Hacking: Hacking an internet site suggests that taking unauthorized management over an internet server and its associated software package love databases and different interfaces.
  2. Network Hacking:  It take the information by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation.
  3. Email Hacking: It includes getting unauthorized access to an Email account and using it without taking the consent of its owner.
  4. Ethical Hacking: Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed.
  5. Password Hacking: This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  6. Computer Hacking: This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system.
Ethical Hacking −Hacker Types EthicaHacking:

Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat.

  1. White Hat Hackers: White Hat hackers are also known as Ethical Hackers. They never intend to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.
  2. Black Hat Hackers: Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
  3. Grey Hat Hackers: Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.
  4. Miscellaneous Hackers: Apart from the above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it.

Miscellaneous Hackers Types:

  1. Red Hat Hackers: Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information.
  2. Blue Hat Hackers: A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events. 
  3. Elite Hackers: This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. 
  4. Script Kiddie: A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie. 
  5. Neophyte: A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.
  6. Hacktivist:  A  hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks.

Ethical Hacking Terminologies Ethical Hacking

Following is a list of important terms used in the field of hacking.
  1. Adware: Adware is software system designed to force pre-chosen ads to show on your system.
  2. Attack: associate attack is associate action that's done on a system to urge its access and extract sensitive information.
  3. Backdoor:  A back door, or door, could be a hidden entry to a computer or software system that bypasses security measures, love logins and arcanum protections.
  4. Bot: A larva could be a program that automates associate action in order that it are often done repeatedly at a way higher rate for a additional sustained amount than a person's operator might pair. to Illustrate, causation communications protocol, FTP or Telnet at a better rate or business script to make objects at a better rate.
  5. Botnet:  A botnet, additionally referred to as zombie army, could be a cluster of computers controlled while not their owners’ information. Botnets area unit wont to send spam or create denial of service attacks.
  6. Brute force attack: A brute force attack is an automatic and therefore the simplest reasonably technique to realize access to a system or web site. It tries the various combination of usernames and passwords, over and another time, till it gets in.
  7. Buffer Overflow: Buffer Overflow could be a flaw that happens once additional information is written to a block of memory, or buffer than the buffer is allotted to carry.
  8. Clone phishing: Clone phishing is that the modification of associate existing, legitimate email with a false link to trick the recipient into providing personal data.
  9. Cracker: A cracker is one World Health Organization modifies the software system to access the options that area unit thought of undesirable by the person cracking the software system, particularly copy protection options.
  10. Denial of service attack (DoS):  A denial of service (DoS) attack could be a malicious decide to create a server or a network resource unobtainable to users, sometimes by briefly interrupting or suspending the services of a bunch connected to the web.
  11. DDoS: Distributed denial of service attack.
  12. Exploit Kit: associate exploit kit is software designed to run on internet servers, with the aim of characteristic software system vulnerabilities in consumer machines human action with it and exploiting discovered vulnerabilities to transfer and execute malicious code on the consumer.
  13. Exploit: Exploit could be a piece of software system, a bit of knowledge, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the safety of a pc or network system.
  14. Firewall: A firewall could be a filter designed to stay unwanted intruders outside a system or network whereas permitting safe communication between systems and users on the within of the firewall.
  15. Keystroke work: Keystroke logging is that the method of chase the keys that area unit ironed on a pc (and that touchscreen points area unit used). it's merely the map of a computer/human interface. it's utilized by grey and black hat hackers to record login IDs and passwords. Keyloggers area unit sometimes secreted onto a tool employing a Trojan delivered by a phishing email.
  16. Logic bomb: a scourge secreted into a system that triggers a malicious action once sure conditions area unit met. the foremost common version is that the time bomb.
  17. Malware: Malware is associate umbrella term wont to seek advice from a range of varieties of hostile or intrusive software system, as well as pc viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and alternative malicious programs.
  18. Master Program: A master program could be a program a black hat hacker uses to remotely transmit commands to infected zombie drones, unremarkably to hold out Denial of Service attacks or spam attacks.
  19. Phishing: Phishing is associate e-mail fraud technique within which the culprit sends out legitimate-looking emails, in a shot to collect personal and monetary data from recipients.
  20. Phreaker:   Phreakers area unit thought of the initial pc hackers and that they area unit people who forced an entry the phonephone network illicitly, usually to form free long-distance phone calls or to faucet phone lines.
  21. Rootkit: Rootkit could be a skulking style of software system, usually malicious, designed to cover the existence of sure processes or programs from traditional strategies of detection and alter continuing privileged access to a pc.
  22. Shrink Wrap code: A Shrink Wrap code attack is associate act of exploiting holes in unpatched or poorly organized software system.
  23. Social engineering: Social engineering implies deceiving somebody with the aim of getting sensitive and private data, like mastercard details or usernames and passwords.
  24. Spam: A Spam is solely associate unsought email, additionally referred to as junk email, sent to an oversized range of recipients while not their consent.
  25. Spoofing:  Spoofing could be a technique wont to gain unauthorized access to computers, whereby the trespasser sends messages to a pc with associate scientific discipline address indicating that the message is coming back from a sure host.
  26. Spyware: Spyware is software system that aims to collect data a couple of person or organization while not their information which might send such data to a different entity while not the consumer's consent, or that asserts management over a pc while not the consumer's information.
  27. SQL Injection: SQL injection is associate SQL code injection technique, wont to attack data-driven applications, within which malicious SQL statements area unit inserted into associate entry field for execution (e.g. to dump the info contents to the attacker).
  28. Threat:  A threat could be a attainable danger which will exploit associate existing bug or vulnerability to compromise the safety of a pc or network system.
  29. Trojan:  A Trojan, or computer virus, could be a bug disguised to seem sort of a valid program, creating it tough to tell apart from programs that area unit purported to be there designed with associate intention to destroy files, alter data, steal passwords or alternative data.
  30. Virus: a scourge could be a bug or a bit of code that is capable of repeating itself and usually includes a prejudicious impact, love corrupting the system or destroying information. 
  31. Vulnerability: A vulnerability could be a weakness that permits a hacker to compromise the safety of a pc or network system.
  32. Worms: A worm could be a self-replicating virus that doesn't alter files however resides in active memory and duplicates itself.
  33. Cross-site Scripting: Cross-site scripting (XSS) could be a style of pc security vulnerability usually found in internet applications. XSS allows attackers to inject client-side script into websites viewed by alternative users.
  34. Zombie Drone: A Zombie Drone is outlined as a hi-jacked pc that's getting used anonymously as a soldier or 'drone' for malicious activity, to Illustrate, distributing unwanted spam e-mails

Tools Of Ethical Hacking:

They are so many types of tools
Nmap uses raw IP packets to determine:

  1. what hosts square measure on the market on the network,
  2. what services those hosts square measure giving,
  3. what in operation systems they're running on,what style of firewalls is in use and alternative such characteristics.
  4. Nmap runs on all major pc in operation systems cherish Windows, Mac ,and  Linux.


With Metasploit, we will perform the subsequent operations:
  1. Conduct basic penetration tests on tiny networks
  2. Run spot checks on the exploitability of vulnerabilities
  3. Discover the network or import scan information
  4. Browse exploit modules and run individual exploits on hosts 
Burp Suite:  Burp Suite could be a fashionable platform that's wide used for activity security testing of net applications.
Angry IP Scanner : It helps in straightforward recovery of varied sorts of passwords by using any of the subsequent methods
  1. Sniffing the network,
  2. Cracking encrypted passwords exploitation wordbook,
  3. Brute-Force and scientific discipline attacks,recording VoIP conversations,
  4. Cryptography disorganized  passwords,sick wireless network keys,
  5. Revealing positive identification boxes,uncovering cached passwords and analyzing routing protocols.
Ettercap: you'll be able to run Ettercap on all the popular in operation systems cherish Windows, Linux, and waterproof OS X. 
EtherPeek:  EtherPeek proactively sniffs traffic packets on a network. By default, EtherPeek supports protocols cherish AppleTalk, IP, IP Address Resolution Protocol (ARP), NetWare, TCP, UDP, NetBEUI, and NBT packets.
SuperScan:  SuperScan could be a powerful tool for network directors to scan protocol ports and resolve hostnames. it's a user friendly interface that you just will use to:
Perform ping scans and port scans exploitation any IP vary.
Scan any port vary from a intrinsical list or any given vary.View responses from connected hosts.
Modify the port list and port descriptions exploitation the in-built editor.
Merge port lists to create new ones.
hook up with any discovered open port.Assign a custom helper application to any port.
QualysGuard: QualysGuard includes a group of tools which will monitor, detect, and defend your world network. 
WebInspect: WebInspect could be a net application security assessment tool that helps establish renowned and unknown vulnerabilities among the online application layer. 
LC4: LC4 recovers Windows user account passwords to contour migration of users to a different authentication system or to access accounts whose passwords square measure lost. 
LANguard Network Security Scanner: LANguard Network Scanner monitors a network by scanning connected machines and providing info concerning every node. you'll be able to get info concerning every individual package.
Network Stumbler: Network Stumbler may be wont to verify if a network is well organized, its signal strength or coverage, and notice interference between one or additional wireless networks. It may also be wont to non-authorized connections.   
ToneLoc: ToneLoc stands for Tone locater. it had been a preferred war dialling computer virus written for MS-DOS within the early 90’s. War dialling could be a technique of employing a electronic equipment to mechanically scan a listing of phonephone numbers, typically dialling each variety during a native code.


Recent Posts