WHAT IS ETHICAL HACKING | TOP 5 HACKING ATTACKS


WHAT IS ETHICAL HACKING?

WHAT IS ETHICAL HACKING,TOP 5 HACKING ATTACKS ,ethical hacking

Hello guys, Welcome to Black'n'White Boxes and today I am going to share information about a very popular topic "ETHICAL HACKING".

So the first thing I am going to clear to that is ethical hacking and hacking both are different terms. Hacking is a process in which we found the vulnerability in the system and using these vulnerabilities we gain unauthorized access to perform malicious activities like deleting any file or stealing data for commercial or personal gain they are also known as BlackHat Hackers while in ethical hacking we use same tools to check vulnerability and weak point so they can fix it and make safe form hackers. Basically, ethical hackers are known as WhiteHat Hackers and the process is called Ethical hacking. Hacking is illegal and many people sent to the prisoner for lots of years. But it became legal when it has done with permission.


Types of Hackers

BlackHat hackers

  They are also known as Crackers. People who break into someone's system and perform malicious activities like steal information or damage the system and much more for their own or commercial profit are BlackHat hackers. BlackHat hacking is always illegal.


WhiteHat hackers

They are also known as Ethical Hackers. Peoples who use hacking tools to check vulnerability and weak point so they can fix it and make safe form hackers. They prevent information from any malicious activity like Delete files or Stealing sensitive information.


GreyHat hackers

They blend of both BlackHat and WhiteHat hackers. They do hacking without any malicious purpose but for there own fun.


Top 5 Hacking Attacks

1. MAN-IN-THE-MIDDLE (MITM) Attack

man in the middle attack,WHAT IS ETHICAL HACKING, TOP 5 HACKING ATTACKS,ethical hacking
As its name suggests it is an attack in which the attacker makes independent connections with the victims and the attacker make-believe the victims that they communicate with each other over a private network but the fact is an overall conversation is control by the attacker.



2. DDoS (Distributed Denial-of-services) Attack

man in the middle attack,WHAT IS ETHICAL HACKING, TOP 5 HACKING ATTACKS,ethical hacking,Ddos

Basically, there is a minor difference between DoS and DDoS. Denial of service is done by crowding the targeted PC with unneeded traffic to overload the systems due to this the system goes to crash while in DDOS the incoming traffic crowding the victim originates from many different sources (known as botnets) Because of this it is impossible to stop the attack if you block any single source you can not able to stop it.


3. SQL injection


man in the middle attack,WHAT IS ETHICAL HACKING, TOP 5 HACKING ATTACKS,ethical hacking,SQL injectionBasically, it is a code injection technique used to execute malicious SQL statements. It is a web-based attack by which you can take over database servers. If you want to execute SQL injection you have to need a web application that is using a database. Actually, when any web application using a database there maybe two functions execute. First, it may take input to the user and then store in the database or second it may fetch data from the database and then display on the web application. In both cases, the web application generates SQL queries and sent it to the database and then database response relevant results. But in SQL injection we manipulate that SQL and make it malicious and when it sends to the database, the database executes some undesirable function.

4.Brute Force Attack

man in the middle attack,WHAT IS ETHICAL HACKING, TOP 5 HACKING ATTACKS,ethical hacking,brute force attack

In this technique, we find out user credentials by trying various possible credentials. Basically in this technique, we are not exploiting any vulnerability in any web application we try to gausses the credentials or try all the possible combinations of username or password and try all one by one to find the correct password or username.



5. Phishing Attack


man in the middle attack,WHAT IS ETHICAL HACKING, TOP 5 HACKING ATTACKS,ethical hacking,phishing attack
In this attack, the hacker makes a fake page of any website and send it to the victim. The fake page looks similar to the original. So when the victim opens it makes no difference original and fake and he put his username and password. After doing login he directed to another page as you want and you get the password and username of the victim.




Final Words

Today there was a huge demand for an ethical hacker (WhiteHat hackers) to protect data from blackhat hackers during a cyber attack. There were some big attacks do by the BlackHat hacker on any startup or business of million to steal data or damage their system for their personal or commercial gain. Ethical hacker finds these vulnerabilities and protects the system with malicious activity by hackers. Today any startup or company of million needs an ethical hacker to find these vulnerabilities and protect the data. I hope you like this article and if you have any doubts regarding this article you can ask in the comment section.

Post a Comment

0 Comments