WHAT IS ETHICAL HACKING?
Hello guys, Welcome to Black'n'White Boxes and today I am going to share information about a very popular topic "ETHICAL HACKING".
So the first thing I am going to clear to that is ethical hacking and hacking both are different terms. Hacking is a process in which we found the vulnerability in the system and using these vulnerabilities we gain unauthorized access to perform malicious activities like deleting any file or stealing data for commercial or personal gain they are also known as BlackHat Hackers while in ethical hacking we use same tools to check vulnerability and weak point so they can fix it and make safe form hackers. Basically, ethical hackers are known as WhiteHat Hackers and the process is called Ethical hacking. Hacking is illegal and many people sent to the prisoner for lots of years. But it became legal when it has done with permission.
So the first thing I am going to clear to that is ethical hacking and hacking both are different terms. Hacking is a process in which we found the vulnerability in the system and using these vulnerabilities we gain unauthorized access to perform malicious activities like deleting any file or stealing data for commercial or personal gain they are also known as BlackHat Hackers while in ethical hacking we use same tools to check vulnerability and weak point so they can fix it and make safe form hackers. Basically, ethical hackers are known as WhiteHat Hackers and the process is called Ethical hacking. Hacking is illegal and many people sent to the prisoner for lots of years. But it became legal when it has done with permission.
Types of Hackers
BlackHat hackers
They are also known as Crackers. People who break into someone's system and perform malicious activities like steal information or damage the system and much more for their own or commercial profit are BlackHat hackers. BlackHat hacking is always illegal.WhiteHat hackers
They are also known as Ethical Hackers. Peoples who use hacking tools to check vulnerability and weak point so they can fix it and make safe form hackers. They prevent information from any malicious activity like Delete files or Stealing sensitive information.GreyHat hackers
They blend of both BlackHat and WhiteHat hackers. They do hacking without any malicious purpose but for there own fun.Top 5 Hacking Attacks
1. MAN-IN-THE-MIDDLE (MITM) Attack

As its name suggests it is an attack in which the attacker makes independent connections with the victims and the attacker make-believe the victims that they communicate with each other over a private network but the fact is an overall conversation is control by the attacker.
2. DDoS (Distributed Denial-of-services) Attack
3. SQL injection

0 Comments