Breaking News
recent

What Is ETHICAL HACKING


ETHICAL HACKING TRICKS

CYBER ETHICS
Cyber ethics is a code of behavior for using the Internet. Since we are going to view it as the hacker‟s prospective,
 we will first dissect what the word  “hacker” stands for?


Hacker:
A person, who delights in having an intimate understanding of the internal workings of a system,
 computers and computer networks in particular.It is used to refer to someone skilled in the use of
computer systems, especially if  that skill was obtained in an exploratory way. The term is often  misused
in a pejorative context, where "cracker"  would be the correct term. And due to that the term evolved to be a
pplied to individuals, with or  without skill, who  break into security systems. Several subgroups of the computer
are underground with different attitudes and aims  use different  terms to demarcate themselves from each other,
 or try to exclude some specific group with which they  do not agree. In hackers culture there are  many different categories,
 such as white hat (“ethical hacking”), grey  hat, black hat and script kiddies. Usually the term cracker refers to
black hat hackers, or more generally hackers  with unlawful intentions

1. White Hat
A white hat is the hero or good guy, especially in computing slang, where it refers to an ethical hacker or Penetration tester who focuses on securing and protecting IT systems. White Hat Hackers, also known as Ethical Hackers, are Computer Security experts, who are specialized in penetration testing, and  other testing methodologies, to ensure that a company's information systems are secure.
Such people are employed by companies where these professionals are sometimes called sneakers, tiger teams or red teams.

2. Grey Hat
A grey hat, in the hacking community, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not.
They are a hybrid between white and black hat hackers. They usually do not hack for personal gain or have malicious intentions, but may
or may not occasionally commit  crimes during the course of their technological 5 exploits.

3. Black Hat 

A black hat is the villain or bad guy. It refers to a hacker that breaks into networks or computers, or creates computer viruses.
 Black Hat Hackers (also called "crackers") who are specialized in unauthorized penetration of information systems.
They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause.
Such penetration often involves modification and/or destruction of data, and is done without authorization and hence they
should not be confused with ethical hackers.

4. Phreaker 

 Phreaking is a slang term coined to describe the activity of a subculture of people who study, experiment withor explore telecommunication syste like equipment and systems connected to public telephone networks. As telephone networks have become computerized, Phreaking has become closely linked with computer hacking. This is sometimes called the H/P culture (with H standing for Hacking and standing for Phreaking). The term "phreak" is a mixture of the words "phone" and "freak", and may also refer to the use of various audio frequencies to manipulate a phone system. "Phreak", "phreaker", or "phone phreak" are names used for and by individuals who participate in phreaking.

 

No comments:

@problemhunt.com. Powered by Blogger.