You are on page 1of 10

What is hacking? Types of Hacking Types Of Hackers Tools of Hackers What is ethical hacking?

Conclusion Reference

HACKING
Hacking is stealing data or information of someone or accompany without their permissions by using computer system and internet. Hackers is someone who breaks into computers and computer networks.

Types of Hacking
Vulnerability scanner A vulnerability scanner is a tool used to quickly check computers on a network for known. Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network. Spoofing attack (Phishing) A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program.

Types of Hacker
breaks security for non-malicious reasons, for instance testing their own security system also called as ethical hacker. These are individuals who perform penetration tests and vulnerability assessments within a contractual agreement.

Cont.
Black Hat is a hacker who violates computer security for little reason beyond maliciousness or for personal. break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. Grey Hat is a combination of a Black Hat and a White Hat Hacker. surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.

Tools of hacker..
Trojan horses used to set up a back door in a computer system such that the intruder can gain access later. A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. A key logger is a tool designed to record (log) every keystroke on an affected machine for later retrieval. For example users password or other private data.

What is ethical hacking?


An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Ethical hacking is also known as penetration testing, intrusion testing. One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems.

CONCLUSION.
The technology involved can really enhance the ability of the hacker if they can enter the private network or computer. There is really no defining attribute to the hacker it could be a kid to a very advanced computer programmer. With the creation of the Internet, computer hacking has become very easy and people can share information about networks, computers, and technology security. So hacking eventually helps people gain information at the same time causes lots of trouble too.

Reference.
http://searchsecurity.techtarget.com/definitio n/ethical-hacker http://www.whatiscomputer.org/what-iscomputer-hacking/ en.wikipedia.org/wiki/Hacker

You might also like