Introduction to Ethical Hacking: Welcome to Ethical Hacking Tutorial of Computer Miracle.
Table of Contents:
What is Ethical Hacking?
First of all, let me tell you that Hacking is an illegal process and you can be prisoned or fined or both for the same. You may often search for “How to hack Facebook Account?”, “How to hack android?”, “how to hack wifi?”. But hacking is not limited to Facebook or Android or WiFi or social media accounts. Hacking is a huge field where every day you will hear a new concept.
Without any further discussion, let’s know What is Ethical Hacking?
Ethical Hacking is a process in which the hacker perform attacks on certain systems with the permission of owner or administrators to discover possible vulnerability so that they can be patched before someone else discover those vulnerabilities and attack them. Ethical Hacking is also known as White Hat Hacking, and the Hacker which performs Ethical Hacking is known as Ethical Hacker or White Hat hacker.
Ethical Hacking is legal if you perform an attack with the permission of the owner or administrator, otherwise, it is a legal offense.
Types of Hackers
White Hat Hacker
White Hat Hackers are also known as Ethical Hackers. White Hat Hackers perform any kind of attack on any system with permission of the owner or administrator. They are highly skilled geeks who use their knowledge and practice for good purpose.
Black Hat Hackers
Black Hat hackers do not take permission of the owner or administrator of the system. In fact, they attack the system without permission of the corresponding authority. They are bad (worst actually) people who use their skill and knowledge for bad purposes. They usually hack for threat, carding, website hacking, bank accounts etc. Black Hat Hackers are a threat for society.
Grey Hat Hackers
Grey Hat Hackers perform both types of hacking, White Hat, and Black Hat. They represent themselves in public as Ethical Hacker, but they perform Black Hat Hacking as well in order for a personal and monetary benefit. Grey Hat Hackers does not harm society in most of the cases. For example, a hacker attacking and defacing a website is Grey Hat hacker, because he hacks the website without permission to protect it. Strange! isn’t it?
Script Kiddies are people who do not know much about hacking but still manage to perform an attack. For Example, if a person got a tool for creating a phishing webpage from given URL and customization parameters, but they don’t know how it works.
Hacktivism is the act of hacking or attacking computerized systems for political or social or monetary purpose. The person involved in Hacktivism is known as Hacktivist.
So far we’ve discussed the basics of Ethical Hacking and types of Hackers. Now let me list the topics we are going to cover in this Ethical Hacking tutorial.
Ethical Hacking Tutorials
1. Footprinting and Reconnaissance
Footprinting (otherwise called reconnaissance) is the method used for gathering info about the target system and entities they belong to.
2. Scanning Networks
Network scanning is a technique to get information about active hosts on the network you are connected. Network Scanning can be done either for attacking the hosts or for network security assessment.
Enumeration is the process of making the complete list of hosts and other important information about them.
Sniffing is a process of monitoring a particular network, and capturing data packets passing through the Network. It is usually done via tools like Wireshark.
5. Social Engineering
Social Engineering is the art of psychological manipulation to trick users so that they give up confidential information themselves.
Denial-of-Service (often called DoS) attack is a type of cyber-attack carried out with the intention to shut down a machine or network, or making it inaccessible to its intended users.
7. Session Hijacking
Session hijacking is a method of taking over a Web users’ session by stealing the session ID. It is done via the help of Sniffing and Social Engineering.
8. System Hacking
System Hacking is a technique to get control of a machine.
9. Malware Threats
Malware is the short form of “malicious software”. Malware is nothing but computer programs designed to enter and gradually damage computers without the user’s knowledge.
10. Hacking Web Servers
With some methods like SQL-Injection, we can get the access of the target or victim’s server.
11. Hacking Web Applications
Hacking Web Application is a technique to identify and use vulnerabilities in the web applications to get confidential information.
12. SQL Injection
SQL-Injection is a type of attack performed on the SQL database to get the confidential information stored in the database.
13. Hacking Wireless Networks
In this tutorial, we will discuss hacking wireless networks like Bluetooth and WiFi.
14. Hacking Mobile Platforms
We will discuss different vulnerabilities of mobile platforms and learn how to attack them.
15. IDS, Firewalls, and Honeypots
In this tutorial, we will discuss essential topics like Firewalls, Honeypots and many more.
16. Cloud Computing
We will discuss the concept of Cloud Computing, the pros and cons of Cloud Computing, and Security aspects of Cloud Computing.
Stenography is a technique to hide data and programs behind other files like images, videos etc. It is similar to wearing a mask.
We will discuss the basics of Cryptography, types of Cryptography, and reverse engineering.