- Trending Categories
- Data Structure
- Operating System
- MS Excel
- C Programming
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
What is Hacking?
Hacking is the art of examining the private things that are being private from general usage and discovering loopholes in the security and facilitating them to benefit others. Hacking is the procedure of discovering vulnerabilities in a system and using these found vulnerabilities to boost unauthorized access into the system to implement malicious activities ranging from eliminating system files to stealing sensitive data.
Types of Hacking
The types of hacking are as follows −
Network Hacking − Network hacking defines gathering data about a network with the determination to harm the network system and hamper its services using multiple tools such as Telnet, NS lookup, Ping, Tracert, etc.
Website hacking − Website hacking defines taking unauthorized access over an internet server, database and developing a change in the data.
Computer hacking − Computer hacking defines unauthorized access to the Computer and steals data from the PC like Computer ID and password by implementing hacking techniques.
Password hacking − Password hacking is the procedure of recovering secret passwords from information that has been already saved in the computer system.
Email hacking − Email hacking defines unauthorized access on an Email account and using it without the owner's permission.
Phases of Hacking
There are various phases of hacking which are as follows −
Reconnaissance − Reconnaissance is the procedure of data gathering. In this phase, the hacker gathers relevant data regarding the target system. These contain detecting services, operating frameworks, packet-hops to reach the system, IP configuration, etc. There are multiple tools such as Nmap, Hping, Google Dorks, etc. that are used for reconnaissance objectives.
Scanning − In the scanning phase, the hacker initiates to actively probe the target device or network for susceptibility that can be used. There are various tools such as Nessus, Nexpose, and NMAP that are broadly used by hackers in this process.
Gaining Access − In this phase, the vulnerability placed during scanning is exploited using various techniques and the hacker tries to introduce the target system without increasing any alarms.
Maintaining Access − This is one of the most important phases. In this phase, the hacker installs several backdoors and payloads onto the target system. Payload is a method used for activities implemented on a system after gaining unauthorized access. Backdoors support the hacker gaining faster access to the destination system in the future.
Clearing Tracks − This process is an unethical event. It has to do with the elimination of logs of all the events that take place during the hacking procedure.
Reporting − Reporting is the last procedure of finishing the ethical hacking process. Therefore the Ethical Hacker compiles a document with his discovery and the job that was completed such as the tools used, the success rate, vulnerabilities found, and the exploit procedure.
Kickstart Your Career
Get certified by completing the courseGet Started