Introduction to Ethical Hacking

Introduction to Ethical Hacking: Welcome to Ethical Hacking Tutorial of Computer Miracle.

What is Ethical Hacking?

First of all, let me tell you that Hacking is an illegal process and you can be prisoned or fined or both for the same. You may often search for “How to hack Facebook Account?”, “How to hack android?”, “how to hack wifi?”. But hacking is not limited to Facebook or Android or WiFi or social media accounts. Hacking is a huge field where every day you will hear a new concept.

Without any further discussion, let’s know What is Ethical Hacking?

Ethical Hacking is a process in which the hacker perform attacks on certain systems with the permission of owner or administrators to discover possible vulnerability so that they can be patched before someone else discover those vulnerabilities and attack them. Ethical Hacking is also known as White Hat Hacking, and the Hacker which performs Ethical Hacking is known as Ethical Hacker or White Hat hacker.

Ethical Hacking is legal if you perform an attack with the permission of the owner or administrator, otherwise, it is a legal offense.

Types of Hackers

White Hat Hacker

White Hat Hackers are also known as Ethical Hackers. White Hat Hackers perform any kind of attack on any system with permission of the owner or administrator. They are highly skilled geeks who use their knowledge and practice for good purpose.

Black Hat Hackers

Black Hat hackers do not take permission of the owner or administrator of the system. In fact, they attack the system without permission of the corresponding authority. They are bad (worst actually) people who use their skill and knowledge for bad purposes. They usually hack for threat, carding, website hacking, bank accounts etc. Black Hat Hackers are a threat for society.

Grey Hat Hackers

Grey Hat Hackers perform both types of hacking, White Hat, and Black Hat. They represent themselves in public as Ethical Hacker, but they perform Black Hat Hacking as well in order for a personal and monetary benefit. Grey Hat Hackers does not harm society in most of the cases. For example, a hacker attacking and defacing a website is Grey Hat hacker, because he hacks the website without permission to protect it. Strange! isn’t it?

Script Kiddies

Script Kiddies are people who do not know much about hacking but still manage to perform an attack. For Example, if a person got a tool for creating a phishing webpage from given URL and customization parameters, but they don’t know how it works.


Hacktivism is the act of hacking or attacking computerized systems for political or social or monetary purpose. The person involved in Hacktivism is known as Hacktivist.

So far we’ve discussed the basics of Ethical Hacking and types of Hackers. Now let me list the topics we are going to cover in this Ethical Hacking tutorial.

Ethical Hacking Tutorials

1. Footprinting and Reconnaissance

Footprinting (otherwise called reconnaissance) is the method used for gathering info about the target system and entities they belong to.

2. Scanning Networks

Network scanning is a technique to get information about active hosts on the network you are connected. Network Scanning can be done either for attacking the hosts or for network security assessment.

3. Enumeration

Enumeration is the process of making the complete list of hosts and other important information about them.

4. Sniffing

Sniffing is a process of monitoring a particular network, and capturing data packets passing through the Network. It is usually done via tools like Wireshark.

5. Social Engineering

Social Engineering is the art of psychological manipulation to trick users so that they give up confidential information themselves.

6. Denial-of-Service

Denial-of-Service (often called DoS) attack is a type of cyber-attack carried out with the intention to shut down a machine or network, or making it inaccessible to its intended users.

7. Session Hijacking

Session hijacking is a method of taking over a Web users’ session by stealing the session ID. It is done via the help of Sniffing and Social Engineering.

8. System Hacking

System Hacking is a technique to get control of a machine.

9. Malware Threats

Malware is the short form of “malicious software”. Malware is nothing but computer programs designed to enter and gradually damage computers without the user’s knowledge.

10. Hacking Web Servers

With some methods like SQL-Injection, we can get the access of the target or victim’s server.

11. Hacking Web Applications

Hacking Web Application is a technique to identify and use vulnerabilities in the web applications to get confidential information.

12. SQL Injection

SQL-Injection is a type of attack performed on the SQL database to get the confidential information stored in the database.

13. Hacking Wireless Networks

In this tutorial, we will discuss hacking wireless networks like Bluetooth and WiFi.

14. Hacking Mobile Platforms

We will discuss different vulnerabilities of mobile platforms and learn how to attack them.

15. IDS, Firewalls, and Honeypots

In this tutorial, we will discuss essential topics like Firewalls, Honeypots and many more.

16. Cloud Computing

We will discuss the concept of Cloud Computing, the pros and cons of Cloud Computing, and Security aspects of Cloud Computing.

17. Steganography

Stenography is a technique to hide data and programs behind other files like images, videos etc. It is similar to wearing a mask.

18. Cryptography

We will discuss the basics of Cryptography, types of Cryptography, and reverse engineering.

1 Comment

Leave a Reply

Your email address will not be published. Required fields are marked *