WHAT IS ETHICAL HACKING?
Hello guys, Welcome to Black'n'White Boxes and today I am going to share information about a very popular topic "ETHICAL HACKING".
So the first thing I am going to clear to that is ethical hacking and hacking both are different terms. Hacking is a process in which we found the vulnerability in the system and using these vulnerabilities we gain unauthorized access to perform malicious activities like deleting any file or stealing data for commercial or personal gain they are also known as BlackHat Hackers while in ethical hacking we use same tools to check vulnerability and weak point so they can fix it and make safe form hackers. Basically, ethical hackers are known as WhiteHat Hackers and the process is called Ethical hacking. Hacking is illegal and many people sent to the prisoner for lots of years. But it became legal when it has done with permission.
So the first thing I am going to clear to that is ethical hacking and hacking both are different terms. Hacking is a process in which we found the vulnerability in the system and using these vulnerabilities we gain unauthorized access to perform malicious activities like deleting any file or stealing data for commercial or personal gain they are also known as BlackHat Hackers while in ethical hacking we use same tools to check vulnerability and weak point so they can fix it and make safe form hackers. Basically, ethical hackers are known as WhiteHat Hackers and the process is called Ethical hacking. Hacking is illegal and many people sent to the prisoner for lots of years. But it became legal when it has done with permission.
Types of Hackers
BlackHat hackers
They are also known as Crackers. People who break into someone's system and perform malicious activities like steal information or damage the system and much more for their own or commercial profit are BlackHat hackers. BlackHat hacking is always illegal.WhiteHat hackers
They are also known as Ethical Hackers. Peoples who use hacking tools to check vulnerability and weak point so they can fix it and make safe form hackers. They prevent information from any malicious activity like Delete files or Stealing sensitive information.GreyHat hackers
They blend of both BlackHat and WhiteHat hackers. They do hacking without any malicious purpose but for there own fun.Top 5 Hacking Attacks
1. MAN-IN-THE-MIDDLE (MITM) Attack

As its name suggests it is an attack in which the attacker makes independent connections with the victims and the attacker make-believe the victims that they communicate with each other over a private network but the fact is an overall conversation is control by the attacker.
2. DDoS (Distributed Denial-of-services) Attack
3. SQL injection
Basically, it is a code injection technique used to execute malicious SQL statements. It is a web-based attack by which you can take over database servers. If you want to execute SQL injection you have to need a web application that is using a database. Actually, when any web application using a database there maybe two functions execute. First, it may take input to the user and then store in the database or second it may fetch data from the database and then display on the web application. In both cases, the web application generates SQL queries and sent it to the database and then database response relevant results. But in SQL injection we manipulate that SQL and make it malicious and when it sends to the database, the database executes some undesirable function.




0 Comments