what is hacking? Introduction & Types

What is Hacking? Introduction & Types

Hacking is the process of finding a vulnerability in a system and using the found vulnerability to gain access into the system to perform malicious activities and deleting the system files or stealing the sensitive data (or) exploiting the vulnerability and loopholes in a system and deleting sensitive data.

Most of the people have the notion that "HACKING" is only used for illegal purposes and Hacking is related to Cybercrime or Computer related-crime but hacking is used for both legal and illegal purposes.

Types of Hacking
There are two types of Hacking
They are:-
* Ethical Hacking
*Unethical Hacking

Ethical Hacking:-
This is the process of finding and exploiting loopholes, weaknesses, bugs and deleting the sensitive data in a system or in a network system or in a website with the permission and it is completely legal and safe.
For more info click here>>

Unethical Hacking:-This is the process of finding a vulnerability in a system and using the found vulnerability to gain access into the system to perform malicious activities and deleting the system files and stealing the sensitive data and logging into others user accounts and extracting their details and leaking the data to others and accessing data without permission for money, or for fun, or for revenge,etc.....  and it is completely illegal. If anyone does unethical hacking he may have to face some serious consequences like fine or spending a few years in jail.

There are also other types of Hacking which can be done by the hackers
They are:- 
*Website Hacking
*Network Hacking
*Email Hacking
*Password Hacking
*Computer Hacking

Website Hacking:-
This is the process of taking unauthorised control over a web server and it's associated software such as database and other interfaces without permission (or) for testing the vulnerability and bugs and sensitive data and getting them fixed.

Network Hacking:- 
This is the process of gathering information about a network by using tools like:- Netstat, Tracery, Ping, Lookup, NS, Telnet, etc... with the intent to harm the network system and hamper its operation.

Email Hacking:-
This is the process of getting unauthorised access on an email account and using it without permission of its owner. If the Hacker gets the control over an email then the user cannot do anything and the hacker can do what he wanted with that email.

Password Hacking:- This is the process of accessing or recovering secret passwords from data that has been stored in or transmitted by a Computer system by using illegal techniques.

Computer Hacking:- This is the process of stealing computer ID and password by using special kind of techniques to get unauthorised access on a Computer system.

Thank you

Comments

Popular Posts