Skip to main content

What is Ethical Hacking? (guide for beginners)

WHAT IS HACKING?

In basic terms, hacking is the process of gaining unauthorised access to data that’s held on a computer, system or network. 

Hackers, or those who practice hacking, will access systems in a way that the creator or holder did not intend. Although the typical intension of hacking and hackers is a negative one, it can actually be a beneficial process.

WHAT IS ETHICAL HACKING?

Ethical hacking is the process where a professional hacker legally and deliberately tries to break into the computers and devices of an organisation. In doing so, ethical hackers can test the organisation’s defences, highlighting any vulnerabilities in their systems and networks. 

it’s a sometimes complex and detailed process, with many different elements to consider. An ethical hacker, sometimes known as a white-hat hacker, will look for weaknesses in a variety of different ways. They will also perform a variety of other tasks linked to general cyber security. This can include: 

Assessing vulnerabilities
Penetration testing 
Gathering intelligence about entry points
Scanning infrastructures to spot weaknesses
 Accessing systems/networks and exploiting vulnerabilities 
Hiding their access and evading detection Compiling reports and analysis for the attempts.

   That's all for today,bookmark this site to read more of my ethical hacking guide posts,thanks for reading.

Comments

Post a Comment

Popular posts from this blog

How to perform ddos attack using ping2death on Kali Linux

Hi guys,Today i will be teaching how to perform a ddos attack using Ping2death on Kali Linux Ping2death is a ddos tool created by SpiderAnon Greyhat( Click here to visit his github repo ) to send packet over a user.. Its has a custom amount of packet How to use: Open Kali and type git clonehttps://github.com/Spider863644/Ping2death cd Ping2death Now move it to C: drive by typing  mv DDos-tool C:\ Now go to File manager, go to c drive, u will see the file just double click it Usage: {IP address} -t |{Amount of packet to send} Example: 127.0.05 -t |20000 Hope you enjoyed the post

Tool to perform SS7 attack using Termux

Open termux terminal and type in the following commands:  pkg install python pkg install python2 pkg install lksctp-tools pkg install tsu pkg install wget wget https://raw.githubusercontent.com/MasterDevX/java/master/installjava && bash installjava git clone https://github.com/SigPloiter/SigPloit cd SigPloit pip2 install -r requirements.txt python2 sigploit.py        Thanks for reading,hope you enjoyed the post

How to build a diy smartphone projector

Did you know you can build a smartphone projector at home at a low budget cost? well,you can,infact its actually simple,I will show you in this post how you can do it. Here's a step by step guide to a DIY projector. Materials: .A shoebox .Magnifying glass .Phone holder .Scissors or precision knife .Tape .Smartphone .Pencil .Black paint (You can easily get any of this items in your household but if you don't have, you can purchase them at an affordable price from Amazon )  Step 1: Cut the Box The first thing you’re going to do is to separate the part that will hold the lens. This is to make it easier to add the lens to the projector. To do this, cut out one of the short sides of the box. Save 50% on select product(s) with promo code 5055FBR5 on Amazon.com Step 2: Darken the inside of the box Now you need to darken the inside of the box,this stops the light from reflecting back into the image thus ensuring better quality.To do this,use the black pa...